Koozali.org: home of the SME Server

Nortel Networks VPN Client and SME5 :(

BEAN

Nortel Networks VPN Client and SME5 :(
« on: March 08, 2002, 04:14:48 AM »
Ok......

I think I have tried everything I am trying to connect to my work with Nortel Networks VPN client through my SME5 server with no luck.  I have connect my computer directly to the internet and successfully connected to my work.  I have followed http://forums.contribs.org/index.php?topic=12107.msg45462#msg45462 instructions
ACCEPT udp ------ 0.0.0.0/0 68.39.131.101 500 -> 500
ACCEPT ipv6-crypt---0.0.0.0/0 68.39.131.101 n/a
and still I get the "Login Failure due to: Remote host not responding".  In the nortel client I have disabled keepalives. I have done a fresh install of SME5 and applied the command and still no go.

This is what I get when I do /sbin/ipchains -L -n

 Chain input (policy DENY):
target     prot opt     source                destination           ports
icmpIn     icmp ------  0.0.0.0/0            0.0.0.0/0             * ->   *
ACCEPT     all  ------  0.0.0.0/0            0.0.0.0/0             n/a
denylog    tcp  ------  0.0.0.0/0            0.0.0.0/0             0:19 ->   *
denylog    udp  ------  0.0.0.0/0            0.0.0.0/0             0:19 ->   *
denylog    tcp  ------  0.0.0.0/0            0.0.0.0/0             * ->   0:19
denylog    udp  ------  0.0.0.0/0            0.0.0.0/0             * ->   0:19
DENY       all  ------  224.0.0.0/4          0.0.0.0/0             n/a
DENY       all  ------  0.0.0.0/0            224.0.0.0/4           n/a
ACCEPT     tcp  ------  0.0.0.0/0            127.0.0.1             * ->   80
ACCEPT     tcp  ------  0.0.0.0/0            192.168.43.1          * ->   80
ACCEPT     tcp  ------  0.0.0.0/0            68.39.131.101         * ->   80
REDIRECT   tcp  ------  192.168.43.0/24      0.0.0.0/0             * ->   80 => 3128
ACCEPT     all  ------  192.168.43.0/24      0.0.0.0/0             n/a
ACCEPT     tcp  !y----  0.0.0.0/0            0.0.0.0/0             * ->   *
ACCEPT     tcp  ------  0.0.0.0/0            68.39.131.101         * ->   113
ACCEPT     udp  ------  0.0.0.0/0            68.39.131.101         * ->   113
ACCEPT     udp  ------  0.0.0.0/0            0.0.0.0/0             * ->   67:68
ACCEPT     udp  ------  0.0.0.0/0            0.0.0.0/0             67:68 ->   *
ACCEPT     tcp  ------  0.0.0.0/0            68.39.131.101         * ->   80
ACCEPT     tcp  ------  0.0.0.0/0            68.39.131.101         * ->   443
ACCEPT     ipv6-crypt------  0.0.0.0/0            68.39.131.101         n/a
ACCEPT     udp  ------  0.0.0.0/0            68.39.131.101         500 ->   500
ACCEPT     gre  ------  0.0.0.0/0            68.39.131.101         n/a
ACCEPT     tcp  ------  0.0.0.0/0            68.39.131.101         * ->   25
ACCEPT     tcp  ------  0.0.0.0/0            68.39.131.101         * ->   22
denylog    tcp  -y----  0.0.0.0/0            68.39.131.101         * ->   3306
DENY       udp  ------  0.0.0.0/0            0.0.0.0/0             * ->   520
DENY       tcp  ------  0.0.0.0/0            0.0.0.0/0             * ->   137:139
DENY       udp  ------  0.0.0.0/0            0.0.0.0/0             * ->   137:139
denylog    tcp  -y----  0.0.0.0/0            68.39.131.101         * ->   3128
ACCEPT     tcp  -y----  0.0.0.0/0            68.39.131.101         20 ->   1024:65535
ACCEPT     tcp  ------  0.0.0.0/0            0.0.0.0/0             * ->   1024:65535
ACCEPT     udp  ------  0.0.0.0/0            0.0.0.0/0             * ->   1024:65535
denylog    all  ------  0.0.0.0/0            0.0.0.0/0             n/a
Chain forward (policy DENY):
target     prot opt     source                destination           ports
ACCEPT     all  ------  192.168.43.0/24      192.168.43.0/24       n/a
ACCEPT     all  ------  192.168.43.0/24      192.168.43.0/24       n/a
MASQ       all  ------  192.168.43.0/24      0.0.0.0/0             n/a
DENY       all  ------  0.0.0.0/0            0.0.0.0/0             n/a
Chain output (policy ACCEPT):
target     prot opt     source                destination           ports
icmpOut    icmp ------  0.0.0.0/0            0.0.0.0/0             * ->   *
-          tcp  ------  0.0.0.0/0            0.0.0.0/0             * ->   80
-          tcp  ------  0.0.0.0/0            0.0.0.0/0             * ->   22
-          tcp  ------  0.0.0.0/0            0.0.0.0/0             * ->   23
-          tcp  ------  0.0.0.0/0            0.0.0.0/0             * ->   21
-          tcp  ------  0.0.0.0/0            0.0.0.0/0             * ->   110
-          tcp  ------  0.0.0.0/0            0.0.0.0/0             * ->   25
-          tcp  ------  0.0.0.0/0            0.0.0.0/0             * ->   20
ACCEPT     all  ------  0.0.0.0/0            0.0.0.0/0             n/a
DENY       all  ------  224.0.0.0/4          0.0.0.0/0             n/a
DENY       all  ------  0.0.0.0/0            224.0.0.0/4           n/a
ACCEPT     icmp ------  192.168.43.0/24      0.0.0.0/0             * ->   *
ACCEPT     all  ------  0.0.0.0/0            192.168.43.0/24       n/a
ACCEPT     tcp  !y----  68.39.131.101        0.0.0.0/0             80 ->   *
ACCEPT     tcp  !y----  68.39.131.101        0.0.0.0/0             443 ->   *
ACCEPT     tcp  !y----  68.39.131.101        0.0.0.0/0             25 ->   *
ACCEPT     tcp  !y----  68.39.131.101        0.0.0.0/0             22 ->   *
ACCEPT     all  ------  0.0.0.0/0            0.0.0.0/0             n/a
Chain denylog (9 references):
target     prot opt     source                destination           ports
DENY       all  ------  0.0.0.0/0            0.0.0.0/0             n/a
Chain icmpIn (1 references):
target     prot opt     source                destination           ports
ACCEPT     icmp ------  0.0.0.0/0            0.0.0.0/0             0 ->   *
ACCEPT     icmp ------  0.0.0.0/0            0.0.0.0/0             3 ->   *
ACCEPT     icmp ------  0.0.0.0/0            0.0.0.0/0             4 ->   *
ACCEPT     icmp ------  0.0.0.0/0            0.0.0.0/0             11 ->   *
ACCEPT     icmp ------  0.0.0.0/0            0.0.0.0/0             12 ->   *
ACCEPT     icmp ------  0.0.0.0/0            0.0.0.0/0             8 ->   *
denylog    all  ------  0.0.0.0/0            0.0.0.0/0             n/a
Chain icmpOut (1 references):
target     prot opt     source                destination           ports
ACCEPT     icmp ------  0.0.0.0/0            0.0.0.0/0             8 ->   *
ACCEPT     icmp ------  0.0.0.0/0            0.0.0.0/0             0 ->   *
ACCEPT     icmp ------  0.0.0.0/0            0.0.0.0/0             3 ->   *
ACCEPT     icmp ------  0.0.0.0/0            0.0.0.0/0             4 ->   *
ACCEPT     icmp ------  0.0.0.0/0            0.0.0.0/0             11 ->   *
ACCEPT     icmp ------  0.0.0.0/0            0.0.0.0/0             12 ->   *
denylog    all  ------  0.0.0.0/0            0.0.0.0/0             n/a

Bryan

Re: Nortel Networks VPN Client and SME5 :(
« Reply #1 on: March 08, 2002, 05:23:26 AM »
Bean -

I've taken the same steps you describe and run into the same problem, with Nortel client and SME - same error.  Please let me know if you solve the mystery.

Dan G.

Re: Nortel Networks VPN Client and SME5 :(
« Reply #2 on: March 08, 2002, 05:34:45 AM »
Port forwarding UDP 500 to ONE static IP on your internal network may do the trick.

You already have the first part:
/sbin/ipchains --append input -p 50 -s 0/0 -d -j ACCEPT
/sbin/ipchains --append input -p udp -s 0/0 500 -d 500 -j ACCEPT

The second part (if you don't have it already) is download: http://www.myezserver.com/downloads/mitel/contrib/portforwarding-0.0.1/
and set it up.  Then use it to push UDP 500 to the internal address of your choice.  Verify with:

/usr/sbin/ipmasqadm portfw -n -l

Hope it works out for you,

Dan

Bryan

Re: Nortel Networks VPN Client and SME5 :(
« Reply #3 on: March 08, 2002, 06:11:24 AM »
Thanks for the suggestion, but this didn't do the trick for me.  As I am relatively new to IP CHAINS, ideas for what to try next are hard to come by.

Dan G.

Re: Nortel Networks VPN Client and SME5 :(
« Reply #4 on: March 08, 2002, 06:50:13 AM »
From the Linux VPN Masquerade FAQ:

"The IPsec AH protocol (51/ip) incorporates a cryptographic checksum including the IP addresses in the IP header. Since masquerading changes those IP addresses and since the cryptographic checksum cannot be recalculated by the masquerading firewall, the masqueraded packets will fail the checksum test and will be discarded by the remote IPsec gateway. Therefore, IPsec VPNs that use the AH protocol cannot be successfully masqueraded. Sorry. (ESP with authentication can be masqueraded.) "

If everything else has failed, it comes down to this.  If this is the case, your only course of action is to speak with the administrator for the VPN gateway, and see if their policy and/or equipment can be modified to allow you to connect from behind NAT, but I'll bet $5 you're screwed.  I just finished a MAJOR firewall installation for a client, using routable IP addresses behind a Red Hat 7.2 box running IPTables.  Why?  Because this client needs almost every host on his LAN able to connect with just about ANY brand of VPN appliance, in order to do business.  IPChains/2.2 kernel is not up to the job for that kind of flexibility --- and the systems administrators at his client sites have been unwilling to modify policies to assist.  Until I got this system in, they had been running TOTALLY without a firewall for nearly a year, because they couldn't find a system suitable.  It's not an easy thing...

BEAN

Re: Nortel Networks VPN Client and SME5 :(
« Reply #5 on: March 08, 2002, 05:08:46 PM »
Oh well I really liked SME to!!!

Dan G.

Re: Nortel Networks VPN Client and SME5 :(
« Reply #6 on: March 08, 2002, 05:21:54 PM »
Does your ISP offer the possiblity of multiple IP addresses?  If you can get another IP, I have an elegant-yet-brute-force design that would allow you to keep that SME box, and use your VPN and your local network simultaneously.  Otherwise, you'll need to setup the system running the VPN client with the primary IP assigned by your ISP, and run personal firewall software on it.  Kinda sucks to have to keep switching cables and reconfiguring IP settings, but it's the sad reality...

BEAN

Re: Nortel Networks VPN Client and SME5 :(
« Reply #7 on: March 08, 2002, 09:42:26 PM »
Hey one more question I have read that a Linksys Cable DSL router supports IPsec AH protocol (51/ip) and that is using NAT why can't the SME foward AH protocol.

Dan G.

Re: Nortel Networks VPN Client and SME5 :(
« Reply #8 on: March 08, 2002, 10:12:42 PM »
Apparently, Linksys and some other proprietary implementations have a way of performing the authentication with the gateway _on behalf of_  one NAT'd client.  If I understand the protocol handling correctly, it knows how to spoof both the client and the gateway into a happy state.  I think there may be a limitation in Linux kernel that prevents it from doing likewise.

Dan

BEAN

Re: Nortel Networks VPN Client and SME5 :(
« Reply #9 on: March 09, 2002, 05:11:48 AM »
Thanks Dan G.

Bryan

Re: Nortel Networks VPN Client and SME5 :(
« Reply #10 on: March 09, 2002, 05:46:32 AM »
Where did you read that the Linksys router would solve this problem?  I looked on their website and they seem to confirm what Dan said earlier - that AH could not be routed period.  I'm anxious not to trash SME, but I'll do so if the Linksys solution works.


Ray Dias

Re: Nortel Networks VPN Client and SME5 :(
« Reply #12 on: March 09, 2002, 10:52:50 PM »
I have Nortel working through my SME system ver. 5.0, and have been able to
do multiple session to my work. It has been a while, but i think what I did
was install the Freswan, ip_masq_vpn and the e-smith-ipsec rpm's. With these
rpm's installed, I have had up to 6 computers connected with the Nortel
Exranet Access Client for over 7 months. I have included the links to the
rpm's but there maybe new ones. If anyone needs further info, let me know
offline

I have also included the firewall rules that I have on my gateway

Ray Dias (ray at raydias dot net)

ftp://ftp.e-smith.org/pub/e-smith/contrib/AndreCouture/RPMS/noarch/
e-smith-vpn-0.1-2.noarch.rpm
ftp://ftp.e-smith.org/pub/e-smith/contrib/CharlieBrady/RPMS/
freeswan-1.9105.i586.rpm
ftp://ftp.e-smith.org/pub/e-smith/contrib/CharlieBrady/RPMS/
freeswan-1.91-05.i686.rpm




Chain input (policy DENY):
target            prot             opt     source       destination
ports
ACCEPT     udp             ------  anywhere  anywhere             500 ->
any
ACCEPT     ipv6-crypt   ------  anywhere  adsl                      n/a

Chain output (policy ACCEPT):
target            prot             opt        source     destination
ports
ACCEPT     udp              ------    adsl         anywhere
            500 ->   any
ACCEPT     ipv6-crypt    ------  anywhere   adsl                     n/a
ACCEPT     ipv6-crypt    ------  adsl            anywhere            n/a

BEAN

Re: Nortel Networks VPN Client and SME5 :(
« Reply #13 on: March 10, 2002, 05:16:19 AM »
Do you know if you are using AH protocol (51/ip).

Trevor B

Re: Nortel Networks VPN Client and SME5 :(
« Reply #14 on: March 10, 2002, 11:36:12 AM »
Hi guys,

I too had the problem until I noticed the deliberate mistake in Ritchie's fix (thanks for pointing out the fix Ritchie - it was causing me some pain...)

The line
/sbin/e-smith/db configuration setprop masq ipseq yes

should be
/sbin/e-smith/db configuration setprop masq ipsec yes

so if you dis a cut-and-paste as I did, it didn't work. If you set ipsec to yes it is OK (well at least for me - I am using V03_70.30 of Nortel's Extranet Client).

Trevor B
P.S. I have also removed ALL of my custom tempaltes from the masq directory.