Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Error when opening tunnel #393

Open
missionceo opened this issue Aug 21, 2019 · 1 comment
Open

Error when opening tunnel #393

missionceo opened this issue Aug 21, 2019 · 1 comment

Comments

@missionceo
Copy link

using /dev/urandom as source of random entropy
using /dev/urandom as source of random entropy
using /dev/urandom as source of random entropy
adding connection: "test"
listening for IKE messages
adding interface ipsec0/eth0.2 192.168.20.193:500
adding interface ipsec0/eth0.2 192.168.20.193:4500
adding interface ipsec0/eth0.2 fd7d:1ae2:819c:0:12ea:daff:fe11:2a32:500
adding interface ipsec0/eth0.2 fd7d:1ae2:819c::8c6:500
loading secrets from "/etc/ipsec.secrets"
[ 6507.895264] do_page_fault(): sending SIGSEGV to pluto for invalid read access from 000001b8
[ 6507.911912] epc = 55659933 in pluto[555ef000+bb000]
[ 6507.921665] ra = 55631057 in pluto[555ef000+bb000]
packet from 192.168.20.221:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
packet from 192.168.20.221:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] method set to=106
packet from 192.168.20.221:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] method set to=108
packet from 192.168.20.221:500: received Vendor ID payload [RFC 3947] method set to=115
packet from 192.168.20.221:500: received Vendor ID payload [Dead Peer Detection]
"test" #1: responding to Main Mode
"test" #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
"test" #1: STATE_MAIN_R1: sent MR1, expecting MI2
"test" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): no NAT detected
"test" #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
"test" #1: STATE_MAIN_R2: sent MR2, expecting MI3
| WARNING: openswan-2.6.51.5/programs/pluto/crypt_start_dh.c:160: encryptor '3des' expects keylen 24/192, SA #1 INITIATOR keylen is 20
| WARNING: openswan-2.6.51.5/programs/pluto/crypt_start_dh.c:160: encryptor '3des' expects keylen 24/192, SA #1 RESPONDER keylen is 0
| WARNING: openswan-2.6.51.5/programs/pluto/ikev1_main.c:1206: encryptor '3des' expects keylen 24/192, SA #1 INITIATOR keylen is 20
| WARNING: openswan-2.6.51.5/programs/pluto/ikev1_main.c:1206: encryptor '3des' expects keylen 24/192, SA #1 RESPONDER keylen is 0
"test" #1: Main mode peer ID is ID_IPV4_ADDR: '192.168.20.221'
"test" #1: switched from "test" to "test"
"test"[1] 192.168.20.221 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
"test"[1] 192.168.20.221 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY oursig= theirsig= cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
"test"[1] 192.168.20.221 #1: the peer proposed: 192.168.1.0/24:0/0 -> 192.168.20.221/32:0/0
"test"[1] 192.168.20.221 #2: responding to Quick Mode proposal {msgid:06ccbd3e}
"test"[1] 192.168.20.221 #2: us: 192.168.1.0/24===192.168.20.193
"test"[1] 192.168.20.221 #2: them: 192.168.20.221
"test"[1] 192.168.20.221 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
"test"[1] 192.168.20.221 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
pluto_crypto_helper: helper (2) is normal exiting
pluto_crypto_helper: helper (0) is normal exiting
pluto_crypto_helper: helper (1) is normal exiting
### Segmentation fault

It's been a long time coming,I hope it works out

@missionceo
Copy link
Author

I used openswan2.6.51.5 and linux 4.14

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant