последние новости такие.
сам роутер мне удалось зарегистрировать на сервере сертификатов
фишка была в том что при регистрации строка должна была выглядеть вот так
crypto ca auth CA-local, а не crypto ca auth с2811crypto pki server c2811
grant auto
lifetime certificate 3
lifetime ca-certificate 1825
!
crypto pki trustpoint с2811
enrollment url http://с2811:80
revocation-check crl
rsakeypair с2811
!
crypto pki trustpoint CA-local
enrollment url http://192.168.1.2:80
serial-number
revocation-check none
теперь в логаз ipsec исчезли те ошибки которые были, зато появились другие, вот полный лог:
Jun 9 12:18:58 192.168.1.2 95534: Jun 9 09:15:08.386: ISAKMP:(1021):purging SA., sa=49E0E13C, delme=49E0E13C
Jun 9 12:18:58 192.168.1.2 95535: Jun 9 09:15:09.358: ISAKMP (0:0): received packet from 192.168.1.33 dport 500 sport 500 Global (N) NEW SA
Jun 9 12:18:58 192.168.1.2 95536: Jun 9 09:15:09.358: ISAKMP: Created a peer struct for 192.168.1.33, peer port 500
Jun 9 12:18:58 192.168.1.2 95537: Jun 9 09:15:09.358: ISAKMP: New peer created peer = 0x476B8514 peer_handle = 0x80001021
Jun 9 12:18:58 192.168.1.2 95538: Jun 9 09:15:09.362: ISAKMP: Locking peer struct 0x476B8514, refcount 1 for crypto_isakmp_process_block
Jun 9 12:18:58 192.168.1.2 95539: Jun 9 09:15:09.362: ISAKMP: local port 500, remote port 500
Jun 9 12:18:58 192.168.1.2 95540: Jun 9 09:15:09.362: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 499C2A0C
Jun 9 12:18:58 192.168.1.2 95541: Jun 9 09:15:09.362: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun 9 12:18:58 192.168.1.2 95542: Jun 9 09:15:09.362: ISAKMP:(0):Old State = IKE_READY New State = IKE_R_MM1
Jun 9 12:18:58 192.168.1.2 95543:
Jun 9 12:18:58 192.168.1.2 95544: Jun 9 09:15:09.362: ISAKMP:(0): processing SA payload. message ID = 0
Jun 9 12:18:58 192.168.1.2 95545: Jun 9 09:15:09.362: ISAKMP:(0): processing vendor id payload
Jun 9 12:18:58 192.168.1.2 95546: Jun 9 09:15:09.362: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismatch
Jun 9 12:18:58 192.168.1.2 95547: Jun 9 09:15:09.366: ISAKMP (0:0): vendor ID is NAT-T v7
Jun 9 12:18:58 192.168.1.2 95548: Jun 9 09:15:09.366: ISAKMP:(0): processing vendor id payload
Jun 9 12:18:58 192.168.1.2 95549: Jun 9 09:15:09.366: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch
Jun 9 12:18:58 192.168.1.2 95550: Jun 9 09:15:09.366: ISAKMP:(0): vendor ID is NAT-T v3
Jun 9 12:18:58 192.168.1.2 95551: Jun 9 09:15:09.366: ISAKMP:(0): processing vendor id payload
Jun 9 12:18:58 192.168.1.2 95552: Jun 9 09:15:09.366: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch
Jun 9 12:18:58 192.168.1.2 95553: Jun 9 09:15:09.366: ISAKMP:(0): vendor ID is NAT-T v2
Jun 9 12:18:58 192.168.1.2 95554: Jun 9 09:15:09.366: ISAKMP : Scanning profiles for xauth ...
Jun 9 12:18:58 192.168.1.2 95555: Jun 9 09:15:09.366: ISAKMP:(0):Checking ISAKMP transform 1 against priority 2 policy
Jun 9 12:18:58 192.168.1.2 95556: Jun 9 09:15:09.366: ISAKMP: encryption 3DES-CBC
Jun 9 12:18:58 192.168.1.2 95557: Jun 9 09:15:09.366: ISAKMP: hash MD5
Jun 9 12:18:58 192.168.1.2 95558: Jun 9 09:15:09.366: ISAKMP: default group 2
Jun 9 12:18:58 192.168.1.2 95559: Jun 9 09:15:09.366: ISAKMP: auth RSA sig
Jun 9 12:18:58 192.168.1.2 95560: Jun 9 09:15:09.366: ISAKMP: life type in seconds
Jun 9 12:18:58 192.168.1.2 95561: Jun 9 09:15:09.366: ISAKMP: life duration (VPI) of 0x0 0x1 0x51 0x80
Jun 9 12:18:58 192.168.1.2 95562: Jun 9 09:15:09.366: ISAKMP:(0):atts are acceptable. Next payload is 3
Jun 9 12:18:58 192.168.1.2 95563: Jun 9 09:15:09.366: ISAKMP:(0): processing vendor id payload
Jun 9 12:18:58 192.168.1.2 95564: Jun 9 09:15:09.366: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismatch
Jun 9 12:18:58 192.168.1.2 95565: Jun 9 09:15:09.366: ISAKMP (0:0): vendor ID is NAT-T v7
Jun 9 12:18:58 192.168.1.2 95566: Jun 9 09:15:09.366: ISAKMP:(0): processing vendor id payload
Jun 9 12:18:58 192.168.1.2 95567: Jun 9 09:15:09.366: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch
Jun 9 12:18:58 192.168.1.2 95568: Jun 9 09:15:09.366: ISAKMP:(0): vendor ID is NAT-T v3
Jun 9 12:18:58 192.168.1.2 95569: Jun 9 09:15:09.366: ISAKMP:(0): processing vendor id payload
Jun 9 12:18:58 192.168.1.2 95570: Jun 9 09:15:09.370: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch
Jun 9 12:18:58 192.168.1.2 95571: Jun 9 09:15:09.370: ISAKMP:(0): vendor ID is NAT-T v2
Jun 9 12:18:58 192.168.1.2 95572: Jun 9 09:15:09.370: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun 9 12:18:58 192.168.1.2 95573: Jun 9 09:15:09.370: ISAKMP:(0):Old State = IKE_R_MM1 New State = IKE_R_MM1
Jun 9 12:18:58 192.168.1.2 95574:
Jun 9 12:18:58 192.168.1.2 95575: Jun 9 09:15:09.374: ISAKMP:(0): constructed NAT-T vendor-07 ID
Jun 9 12:18:58 192.168.1.2 95576: Jun 9 09:15:09.374: ISAKMP:(0): sending packet to 192.168.1.33 my_port 500 peer_port 500 (R) MM_SA_SETUP
Jun 9 12:18:58 192.168.1.2 95577: Jun 9 09:15:09.374: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun 9 12:18:59 192.168.1.2 95578: Jun 9 09:15:09.374: ISAKMP:(0):Old State = IKE_R_MM1 New State = IKE_R_MM2
Jun 9 12:18:59 192.168.1.2 95579:
Jun 9 12:18:59 192.168.1.2 95580: Jun 9 09:15:09.386: ISAKMP (0:0): received packet from 192.168.1.33 dport 500 sport 500 Global (R) MM_SA_SETUP
Jun 9 12:18:59 192.168.1.2 95581: Jun 9 09:15:09.386: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun 9 12:18:59 192.168.1.2 95582: Jun 9 09:15:09.386: ISAKMP:(0):Old State = IKE_R_MM2 New State = IKE_R_MM3
Jun 9 12:18:59 192.168.1.2 95584: Jun 9 09:15:09.386: ISAKMP:(0): processing KE payload. message ID = 0
Jun 9 12:18:59 192.168.1.2 95585: Jun 9 09:15:09.458: ISAKMP:(0): processing NONCE payload. message ID = 0
Jun 9 12:18:59 192.168.1.2 95586: Jun 9 09:15:09.514: ISAKMP:(1023): processing CERT_REQ payload. message ID = 0
Jun 9 12:18:59 192.168.1.2 95587: Jun 9 09:15:09.514: ISAKMP:(1023): peer wants a CT_X509_SIGNATURE cert
Jun 9 12:18:59 192.168.1.2 95588: Jun 9 09:15:09.514: ISAKMP:(1023): peer wants cert issued by cn=c2811
Jun 9 12:18:59 192.168.1.2 95589: Jun 9 09:15:09.514: Choosing trustpoint CA-local as issuer
Jun 9 12:18:59 192.168.1.2 95590: Jun 9 09:15:09.514: ISAKMP:(1023): processing vendor id payload
Jun 9 12:18:59 192.168.1.2 95591: Jun 9 09:15:09.514: ISAKMP:(1023): vendor ID is Unity
Jun 9 12:18:59 192.168.1.2 95592: Jun 9 09:15:09.514: ISAKMP:(1023): processing vendor id payload
Jun 9 12:18:59 192.168.1.2 95593: Jun 9 09:15:09.514: ISAKMP:(1023): vendor ID is DPD
Jun 9 12:18:59 192.168.1.2 95594: Jun 9 09:15:09.518: ISAKMP:(1023): processing vendor id payload
Jun 9 12:18:59 192.168.1.2 95595: Jun 9 09:15:09.518: ISAKMP:(1023): speaking to another IOS box!
Jun 9 12:18:59 192.168.1.2 95596: Jun 9 09:15:09.518: ISAKMP:(1023):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun 9 12:18:59 192.168.1.2 95597: Jun 9 09:15:09.518: ISAKMP:(1023):Old State = IKE_R_MM3 New State = IKE_R_MM3
Jun 9 12:18:59 192.168.1.2 95598:
Jun 9 12:18:59 192.168.1.2 95599: Jun 9 09:15:09.518: ISAKMP (0:1023): constructing CERT_REQ for issuer cn=c2811
Jun 9 12:18:59 192.168.1.2 95600: Jun 9 09:15:09.522: ISAKMP:(1023): sending packet to 192.168.1.33 my_port 500 peer_port 500 (R) MM_KEY_EXCH
Jun 9 12:18:59 192.168.1.2 95601: Jun 9 09:15:09.522: ISAKMP:(1023):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun 9 12:18:59 192.168.1.2 95602: Jun 9 09:15:09.522: ISAKMP:(1023):Old State = IKE_R_MM3 New State = IKE_R_MM4
Jun 9 12:18:59 192.168.1.2 95603:
Jun 9 12:18:59 192.168.1.2 95604: Jun 9 09:15:09.618: ISAKMP (0:1023): received packet from 192.168.1.33 dport 500 sport 500 Global (R) MM_KEY_EXCH
Jun 9 12:18:59 192.168.1.2 95605: Jun 9 09:15:09.622: ISAKMP:(1023):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Jun 9 12:18:59 192.168.1.2 95606: Jun 9 09:15:09.622: ISAKMP:(1023):Old State = IKE_R_MM4 New State = IKE_R_MM5
Jun 9 12:18:59 192.168.1.2 95607:
Jun 9 12:18:59 192.168.1.2 95608: Jun 9 09:15:09.622: ISAKMP:(1023): processing ID payload. message ID = 0
Jun 9 12:18:59 192.168.1.2 95609: Jun 9 09:15:09.622: ISAKMP (0:1023): ID payload
Jun 9 12:18:59 192.168.1.2 95610: next-payload : 6
Jun 9 12:18:59 192.168.1.2 95611: type : 2
Jun 9 12:18:59 192.168.1.2 95612: FQDN name : 871k.flowers.local
Jun 9 12:18:59 192.168.1.2 95613:
Jun 9 12:18:59 192.168.1.2 95614: protocol : 17
Jun 9 12:18:59 192.168.1.2 95615: port : 500
Jun 9 12:18:59 192.168.1.2 95616: length : 29
Jun 9 12:18:59 192.168.1.2 95617: Jun 9 09:15:09.622: ISAKMP:(0):: peer matches *none* of the profiles
>>>>>>>во-первых мне не нравится вот это ^^^^^^^^^^^^^^^^^^^^^^^^
Jun 9 12:18:59 192.168.1.2 95618: Jun 9 09:15:09.622: ISAKMP:(1023): processing CERT payload. message ID = 0
Jun 9 12:18:59 192.168.1.2 95619: Jun 9 09:15:09.622: ISAKMP:(1023): processing a CT_X509_SIGNATURE cert
Jun 9 12:18:59 192.168.1.2 95620: Jun 9 09:15:09.626: ISAKMP:(1023): peer's pubkey isn't cached
Jun 9 12:18:59 192.168.1.2 95621: Jun 9 09:15:09.638: ISAKMP:(1023): Unable to get DN from certificate!
>>>>>>>во-первых мне не нравится вот это ^^^^^^^^^^^^^^^^^^^^^^^^
Jun 9 12:18:59 192.168.1.2 95622: Jun 9 09:15:09.638: ISAKMP:(1023): Cert presented by peer contains no OU field.
Jun 9 12:18:59 192.168.1.2 95623: Jun 9 09:15:09.638: ISAKMP:(0):: peer matches *none* of the profiles
Jun 9 12:18:59 192.168.1.2 95624: Jun 9 09:15:09.638: ISAKMP:(1023): processing SIG payload. message ID = 0
Jun 9 12:18:59 192.168.1.2 95625: Jun 9 09:15:09.642: ISAKMP:(1023): processing NOTIFY INITIAL_CONTACT protocol 1
Jun 9 12:18:59 192.168.1.2 95626: spi 0, message ID = 0, sa = 499C2A0C
Jun 9 12:18:59 192.168.1.2 95627: Jun 9 09:15:09.642: ISAKMP:(1023):SA authentication status:
Jun 9 12:18:59 192.168.1.2 95628: authenticated
Jun 9 12:18:59 192.168.1.2 95629: Jun 9 09:15:09.642: ISAKMP:(1023):SA has been authenticated with 192.168.1.33
Jun 9 12:18:59 192.168.1.2 95630: Jun 9 09:15:09.642: ISAKMP:(1023):SA authentication status:
Jun 9 12:18:59 192.168.1.2 95631: authenticated
Jun 9 12:18:59 192.168.1.2 95632: Jun 9 09:15:09.642: ISAKMP:(1023): Process initial contact,
Jun 9 12:18:59 192.168.1.2 95633: bring down existing phase 1 and 2 SA's with local 192.168.1.2 remote 192.168.1.33 remote port 500
Jun 9 12:18:59 192.168.1.2 95635: Jun 9 09:15:09.642: ISAKMP:(1023):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Jun 9 12:18:59 192.168.1.2 95636: Jun 9 09:15:09.642: ISAKMP:(1023):Old State = IKE_R_MM5 New State = IKE_R_MM5
Jun 9 12:18:59 192.168.1.2 95638: Jun 9 09:15:09.650: ISAKMP:(1023):My ID configured as IPv4 Addr, but Addr not in Cert!
Jun 9 12:18:59 192.168.1.2 95639: Jun 9 09:15:09.650: ISAKMP:(1023):Using FQDN as My ID
Jun 9 12:18:59 192.168.1.2 95640: Jun 9 09:15:09.650: ISAKMP:(1023):SA is doing RSA signature authentication using id type ID_FQDN
Jun 9 12:18:59 192.168.1.2 95641: Jun 9 09:15:09.650: ISAKMP (0:1023): ID payload
Jun 9 12:18:59 192.168.1.2 95642: next-payload : 6
Jun 9 12:18:59 192.168.1.2 95643: type : 2
Jun 9 12:18:59 192.168.1.2 95644: FQDN name : c2811.flowers.local
Jun 9 12:18:59 192.168.1.2 95645: protocol : 17
Jun 9 12:18:59 192.168.1.2 95646: port : 500
Jun 9 12:18:59 192.168.1.2 95647: length : 30
Jun 9 12:18:59 192.168.1.2 95648: Jun 9 09:15:09.650: ISAKMP:(1023):Total payload length: 30
Jun 9 12:18:59 192.168.1.2 95649: Jun 9 09:15:09.658: ISAKMP (0:1023): constructing CERT payload for serialNumber=FHK1117F16C+hostname=c2811.flowers.loc
al
Jun 9 12:18:59 192.168.1.2 95650: Jun 9 09:15:09.662: ISAKMP:(1023): using the CA-local trustpoint's keypair to sign
Jun 9 12:18:59 192.168.1.2 95651: Jun 9 09:15:09.686: ISAKMP:(1023): sending packet to 192.168.1.33 my_port 500 peer_port 500 (R) MM_KEY_EXCH
Jun 9 12:18:59 192.168.1.2 95652: Jun 9 09:15:09.686: ISAKMP: set new node 1733839686 to QM_IDLE
Jun 9 12:18:59 192.168.1.2 95653: Jun 9 09:15:09.686: ISAKMP:(1023):Sending NOTIFY RESPONDER_LIFETIME protocol 1
Jun 9 12:18:59 192.168.1.2 95654: spi 1209941784, message ID = 1733839686
Jun 9 12:18:59 192.168.1.2 95655: Jun 9 09:15:09.686: ISAKMP:(1023): sending packet to 192.168.1.33 my_port 500 peer_port 500 (R) MM_KEY_EXCH
Jun 9 12:18:59 192.168.1.2 95656: Jun 9 09:15:09.686: ISAKMP:(1023):purging node 1733839686
Jun 9 12:18:59 192.168.1.2 95657: Jun 9 09:15:09.686: ISAKMP: Sending phase 1 responder lifetime 28800
Jun 9 12:18:59 192.168.1.2 95658:
Jun 9 12:18:59 192.168.1.2 95659: Jun 9 09:15:09.686: ISAKMP:(1023):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Jun 9 12:18:59 192.168.1.2 95660: Jun 9 09:15:09.686: ISAKMP:(1023):Old State = IKE_R_MM5 New State = IKE_P1_COMPLETE
Jun 9 12:18:59 192.168.1.2 95661:
Jun 9 12:18:59 192.168.1.2 95662: Jun 9 09:15:09.694: ISAKMP:(1023):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
Jun 9 12:18:59 192.168.1.2 95663: Jun 9 09:15:09.694: ISAKMP:(1023):Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
Jun 9 12:18:59 192.168.1.2 95664:
Jun 9 12:19:14 192.168.1.2 95665: Jun 9 09:15:24.470: ISAKMP: set new node 0 to QM_IDLE
Jun 9 12:19:14 192.168.1.2 95666: Jun 9 09:15:24.470: ISAKMP:(1023): sitting IDLE. Starting QM immediately (QM_IDLE )
Jun 9 12:19:14 192.168.1.2 95667: Jun 9 09:15:24.470: ISAKMP:(1023):beginning Quick Mode exchange, M-ID of -1035258245
Jun 9 12:19:14 192.168.1.2 95668: Jun 9 09:15:24.470: ISAKMP:(1023):QM Initiator gets spi
Jun 9 12:19:14 192.168.1.2 95669: Jun 9 09:15:24.474: ISAKMP:(1023): sending packet to 192.168.1.33 my_port 500 peer_port 500 (R) QM_IDLE
Jun 9 12:19:14 192.168.1.2 95670: Jun 9 09:15:24.474: ISAKMP:(1023):Node -1035258245, Input = IKE_MESG_INTERNAL, IKE_INIT_QM
Jun 9 12:19:14 192.168.1.2 95671: Jun 9 09:15:24.474: ISAKMP:(1023):Old State = IKE_QM_READY New State = IKE_QM_I_QM1
Jun 9 12:19:24 192.168.1.2 95672: Jun 9 09:15:34.474: ISAKMP:(1023): retransmitting phase 2 QM_IDLE -1035258245 ...
>>>>>>>во-вторых вот это ^^^^^^^^^^^^^^^^^^^^^^^^
Jun 9 12:19:24 192.168.1.2 95673: Jun 9 09:15:34.474: ISAKMP (0:1023): incrementing error counter on node, attempt 1 of 5: retransmit phase 2
Jun 9 12:19:24 192.168.1.2 95674: Jun 9 09:15:34.474: ISAKMP (0:1023): incrementing error counter on sa, attempt 1 of 5: retransmit phase 2
Jun 9 12:19:24 192.168.1.2 95675: Jun 9 09:15:34.474: ISAKMP:(1023): retransmitting phase 2 -1035258245 QM_IDLE
Jun 9 12:19:24 192.168.1.2 95676: Jun 9 09:15:34.474: ISAKMP:(1023): sending packet to 192.168.1.33 my_port 500 peer_port 500 (R) QM_IDLE
Jun 9 12:19:28 192.168.1.2 95677: Jun 9 09:15:39.762: ISAKMP (0:1023): received packet from 192.168.1.33 dport 500 sport 500 Global (R) QM_IDLE
Jun 9 12:19:28 192.168.1.2 95678: Jun 9 09:15:39.762: ISAKMP: set new node 1939849356 to QM_IDLE
Jun 9 12:19:28 192.168.1.2 95679: Jun 9 09:15:39.762: ISAKMP: reserved not zero on HASH payload!
Jun 9 12:19:28 192.168.1.2 95680: Jun 9 09:15:39.762: %CRYPTO-4-IKMP_BAD_MESSAGE: IKE message from 192.168.1.33 failed its sanity check or is malformed
Jun 9 12:19:29 192.168.1.2 95681: Jun 9 09:15:39.762: ISAKMP:(1023):deleting node 1939849356 error TRUE reason "Invalid payload"
Jun 9 12:19:29 192.168.1.2 95682: Jun 9 09:15:40.762: ISAKMP (0:1023): received packet from 192.168.1.33 dport 500 sport 500 Global (R) QM_IDLE
Jun 9 12:19:29 192.168.1.2 95683: Jun 9 09:15:40.762: ISAKMP:(1023): phase 1 packet is a duplicate of a previous packet.
Jun 9 12:19:29 192.168.1.2 95684: Jun 9 09:15:40.762: ISAKMP:(1023): retransmitting due to retransmit phase 1
Jun 9 12:19:30 192.168.1.2 95685: Jun 9 09:15:41.266: ISAKMP:(1023): retransmitting phase 1 QM_IDLE ...
Jun 9 12:19:30 192.168.1.2 95686: Jun 9 09:15:41.266: ISAKMP (0:1023): incrementing error counter on sa, attempt 2 of 5: retransmit phase 1
Jun 9 12:19:30 192.168.1.2 95687: Jun 9 09:15:41.266: ISAKMP:(1023): retransmitting phase 1 QM_IDLE
Jun 9 12:19:30 192.168.1.2 95688: Jun 9 09:15:41.270: ISAKMP:(1023): sending packet to 192.168.1.33 my_port 500 peer_port 500 (R) QM_IDLE
Jun 9 12:19:34 192.168.1.2 95689: Jun 9 09:15:44.474: ISAKMP:(1023): retransmitting phase 2 QM_IDLE -1035258245 ...
Jun 9 12:19:34 192.168.1.2 95690: Jun 9 09:15:44.474: ISAKMP (0:1023): incrementing error counter on node, attempt 2 of 5: retransmit phase 2
Jun 9 12:19:34 192.168.1.2 95691: Jun 9 09:15:44.474: ISAKMP (0:1023): incrementing error counter on sa, attempt 3 of 5: retransmit phase 2
Jun 9 12:19:34 192.168.1.2 95692: Jun 9 09:15:44.474: ISAKMP:(1023): retransmitting phase 2 -1035258245 QM_IDLE
не знаю важно это или нет но крипто мапы у меня висят на тех интерфейсах на которых висит сервер и т.д. Может быть после включения криптомапов у меня пиры не могу договориться потому что ipsec не поднялся?