Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - Phomakesmehappy

#1
Hi,

follwing scenario: an IPSec roadwarrior setup in the legacy variant with card terminals who don't talk to me, so no logging accessible from the clientside.

The goal: you connect a card terminal to the internet at home, it connects via VPN to a so called connector and can be used as if it's connected locally.
There is a 3 step process involved from the connector point of view: knowing the card terminal , assigning the terminal to itself and pairing the terminal with itself.

The simple test setup with one device and a /32-net as virtual ip-pool was working as intended, hence I presume the firewall rules are also fine.

For "production" I need a bigger pool, so I defined a /24-net. Clients are getting a virtual IP as intended, I can ping them from the connector and the first 2 steps of the 3 step process are working fine - the third however isn't. It uses port 4742 tcp/udp.

Which begs the question : since the only difference in setup (iirc) is the size of the virtual ip net, is it at fault? If so, is there a way to assign static ips via the legacy interface?
In phase 2 configuration I declared the target net where the connector is located as the local subnet, did I accidentaly declare a split tunnel and that is causing problems?

Connector : 192.168.77.21
VPN net not fully working: 172.100.16.0/24
VPN net fully working: 172.100.16.101/32


I find it hard to troubleshoot, because I can only look at one side, and it's not throwing me any errors. Any help is greatly appreciated!
Do I need to switch to the new gui and assign static IPs ?
#2
Hi,

I have to get a roadwarrior EAP_MSCHAPV2 config to work with the additional obstacle of IoT clients, so I can't access any log on the client side.

I managed to get everything working under the legacy GUI, albeit not stable enough for my taste (no proposals found for renegotiating), and I would like to use the newer GUI.

I want to use static IPs for every client, but no IP from the pool gets assigned albeit phase 1 working.

024-02-01T11:08:10   Informational   charon   06[NET] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> sending packet: from 10.246.42.10[4500] to 10.246.42.51[4500] (500 bytes)   
2024-02-01T11:08:10   Informational   charon   06[NET] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> sending packet: from 10.246.42.10[4500] to 10.246.42.51[4500] (1236 bytes)   
2024-02-01T11:08:10   Informational   charon   06[IKE] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> received retransmit of request with ID 1, retransmitting response   
2024-02-01T11:08:10   Informational   charon   06[NET] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> received packet: from 10.246.42.51[4500] to 10.246.42.10[4500] (416 bytes)   
2024-02-01T11:08:06   Informational   charon   09[NET] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> sending packet: from 10.246.42.10[4500] to 10.246.42.51[4500] (500 bytes)   
2024-02-01T11:08:06   Informational   charon   09[NET] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> sending packet: from 10.246.42.10[4500] to 10.246.42.51[4500] (1236 bytes)   
2024-02-01T11:08:06   Informational   charon   09[ENC] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> generating IKE_AUTH response 1 [ EF(2/2) ]   
2024-02-01T11:08:06   Informational   charon   09[ENC] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> generating IKE_AUTH response 1 [ EF(1/2) ]   
2024-02-01T11:08:06   Informational   charon   09[ENC] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> splitting IKE message (1664 bytes) into 2 fragments   
2024-02-01T11:08:06   Informational   charon   09[ENC] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> generating IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/MSCHAPV2 ]   
2024-02-01T11:08:06   Informational   charon   09[IKE] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> sending end entity cert "C=DE, ST=Hamburg, L=Hamburg, O=Compugroup, E=joern.bonte@cgm.com, CN=opnSense-IPSec"   
2024-02-01T11:08:06   Informational   charon   09[IKE] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> authentication of '10.246.42.10' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful   
2024-02-01T11:08:06   Informational   charon   09[IKE] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> peer supports MOBIKE   
2024-02-01T11:08:06   Informational   charon   09[IKE] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> initiating EAP_MSCHAPV2 method (id 0x0A)   
2024-02-01T11:08:06   Informational   charon   09[IKE] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> using configured EAP-Identity kt1   
2024-02-01T11:08:06   Informational   charon   09[CFG] <c8d2c7ac-39de-4b39-aec4-21378f35744e|3> selected peer config 'c8d2c7ac-39de-4b39-aec4-21378f35744e'   
2024-02-01T11:08:06   Informational   charon   09[CFG] <3> looking for peer configs matching 10.246.42.10[%any]...10.246.42.51[10.246.42.51]   
2024-02-01T11:08:06   Informational   charon   09[IKE] <3> REDACTED"   
2024-02-01T11:08:06   Informational   charon   09[ENC] <3> parsed IKE_AUTH request 1 [ IDi CERTREQ CPRQ(ADDR DNS) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]   
2024-02-01T11:08:06   Informational   charon   09[NET] <3> received packet: from 10.246.42.51[4500] to 10.246.42.10[4500] (416 bytes)   
2024-02-01T11:08:05   Informational   charon   09[NET] <3> sending packet: from 10.246.42.10[500] to 10.246.42.51[500] (497 bytes)   
2024-02-01T11:08:05   Informational   charon   09[ENC] <3> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]   
2024-02-01T11:08:05   Informational   charon   09[IKE] <3> sending cert request for "REDACTED"   
2024-02-01T11:08:05   Informational   charon   09[IKE] <3> faking NAT situation to enforce UDP encapsulation   
2024-02-01T11:08:05   Informational   charon   09[CFG] <3> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048   
2024-02-01T11:08:05   Informational   charon   09[IKE] <3> 10.246.42.51 is initiating an IKE_SA   
2024-02-01T11:08:05   Informational   charon   09[ENC] <3> parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]   
2024-02-01T11:08:05   Informational   charon   09[NET] <3> received packet: from 10.246.42.51[500] to 10.246.42.10[500] (1156 bytes)

This is the log output. Any tips on how to troubleshoot this any further ? The connection tab shows an active connection, but the client in question still uses it's own static IP instead of the pool IP.

Thanks a lot in advance!