Portál AbcLinuxu, 9. května 2025 00:03
Dec 13 2012 13:19:31 FW-ASA : %ASA-4-402114: IPSEC: Received an ESP packet (SPI= 0x9560A834, sequence number= 0x3153) from 159.181.37.30 to 192.168.72.2 with an invalid SPI.
FreeBSD:
2012-12-13 13:19:37: DEBUG: 68 bytes message received from
192.168.72.2[500] to
159.181.37.30[500]
2012-12-13 13:19:37: DEBUG:
83ace3cd 9453a654 c7ff589d 79dac762 08100501 971f521c 00000044 bf1367d5
ca16ec3e 71f99632 06cdb877 08131115 9d458edf 9d196689 c60b51a6 3999ff4c
77ebc114
2012-12-13 13:19:37: DEBUG: receive Information.
2012-12-13 13:19:37: DEBUG: compute IV for phase2
2012-12-13 13:19:37: DEBUG: phase1 last IV:
2012-12-13 13:19:37: DEBUG:
5d0a6ae7 6c8ec4c0 971f521c
2012-12-13 13:19:37: DEBUG: hash(sha1)
2012-12-13 13:19:37: DEBUG: encryption(3des)
2012-12-13 13:19:37: DEBUG: phase2 IV computed:
2012-12-13 13:19:37: DEBUG:
9091c420 5bd3fcab
2012-12-13 13:19:37: DEBUG: begin decryption.
2012-12-13 13:19:37: DEBUG: encryption(3des)
2012-12-13 13:19:37: DEBUG: IV was saved for next processing:
2012-12-13 13:19:37: DEBUG:
3999ff4c 77ebc114
2012-12-13 13:19:37: DEBUG: encryption(3des)
2012-12-13 13:19:37: DEBUG: with key:
2012-12-13 13:19:37: DEBUG:
7d3ea450 a7dd6d85 5c49c919 9956a4a6 b076d4ea 8248db5e
2012-12-13 13:19:37: DEBUG: decrypted payload by IV:
2012-12-13 13:19:37: DEBUG:
9091c420 5bd3fcab
2012-12-13 13:19:37: DEBUG: decrypted payload, but not trimed.
2012-12-13 13:19:37: DEBUG:
0b000018 c8ce3caf a945270c df09bafd b70783f0 72b7fbf3 00000010 00000001
0304000b e9a942da
2012-12-13 13:19:37: DEBUG: padding len=218
2012-12-13 13:19:37: DEBUG: skip to trim padding.
2012-12-13 13:19:37: DEBUG: decrypted.
2012-12-13 13:19:37: DEBUG:
83ace3cd 9453a654 c7ff589d 79dac762 08100501 971f521c 00000044 0b000018
c8ce3caf a945270c df09bafd b70783f0 72b7fbf3 00000010 00000001 0304000b
e9a942da
2012-12-13 13:19:37: DEBUG: IV freed
2012-12-13 13:19:37: DEBUG: HASH with:
2012-12-13 13:19:37: DEBUG:
971f521c 00000010 00000001 0304000b e9a942da
2012-12-13 13:19:37: DEBUG: hmac(hmac_sha1)
2012-12-13 13:19:37: DEBUG: HASH computed:
2012-12-13 13:19:37: DEBUG:
c8ce3caf a945270c df09bafd b70783f0 72b7fbf3
2012-12-13 13:19:37: DEBUG: hash validated.
2012-12-13 13:19:37: DEBUG: begin.
2012-12-13 13:19:37: DEBUG: seen nptype=8(hash)
2012-12-13 13:19:37: DEBUG: seen nptype=11(notify)
2012-12-13 13:19:37: DEBUG: succeed.
2012-12-13 13:19:37: [192.168.72.2] ERROR: notification INVALID-SPI received in informational exchange.
Konfigurace ASY:
access-list 101 remark IPSec range
access-list 101 extended permit ip 191.37.111.160 255.255.255.240 object-group NET_Central
access-list 101 extended permit ip 191.37.111.176 255.255.255.248 object-group NET_Central
access-list 101 extended permit ip 191.37.111.184 255.255.255.248 object-group NET_Central
crypto ipsec transform-set IPSEC esp-aes-256 esp-sha-hmac
crypto ipsec security-association lifetime seconds 3600
crypto ipsec security-association lifetime kilobytes 2147483647
crypto map VPN 1 match address 101
crypto map VPN 1 set peer 159.181.37.30 159.181.37.38 159.181.37.39
crypto map VPN 1 set transform-set IPSEC
crypto map VPN 1 set security-association lifetime seconds 3600
crypto map VPN interface outside
crypto isakmp identity address
crypto isakmp enable outside
crypto isakmp policy 1
authentication pre-share
encryption 3des
hash sha
group 1
lifetime 7200
tunnel-group 159.181.37.30 type ipsec-l2l
tunnel-group 159.181.37.30 ipsec-attributes
pre-shared-key *
isakmp keepalive disable
tunnel-group 159.181.37.39 type ipsec-l2l
tunnel-group 159.181.37.39 ipsec-attributes
pre-shared-key *
tunnel-group 159.181.37.38 type ipsec-l2l
tunnel-group 159.181.37.38 ipsec-attributes
pre-shared-key *
Konfigurace racoonu:
padding {
maximum_length 20;
randomize off;
strict_check off;
exclusive_tail off;
}
timer {
counter 5;
interval 20 sec;
persend 1;
phase1 30 sec;
phase2 15 sec;
}
listen {
isakmp 159.181.37.30 [500];
}
remote "ASA-remote" {
remote_address 192.168.72.2;
exchange_mode main;
proposal_check obey;
lifetime time 7200 sec;
my_identifier address;
proposal {
authentication_method pre_shared_key;
encryption_algorithm 3des;
hash_algorithm sha1;
dh_group 1;
}
}
sainfo address xxx.xxx.xxx.xxx/32 4 address xxx.xxx.xxx.xxx/32 4 {
lifetime time 86400 sec;
encryption_algorithm aes;
authentication_algorithm hmac_sha1;
compression_algorithm deflate;
}
V čem by mohl být problém?
Díky
Řešení dotazu:
ASA: crypto map VPN 1 set security-association lifetime seconds 3600 racoon: lifetime time 7200 sec;take muzes na ASA jeste pouzit, prikaz:
crypto isakmp invalid-spi-recoveryktery bude informovat protistranu o problemu.
xxx.xxx.0.0/16 xxx.xxx.xxx.160/28 any -P out ipsec esp/tunnel/xxx.xxx.xxx.10-xxx.xxx.xxx.210/unique;
xxx.xxx.xxx.160/28 xxx.xxx.0.0/16 any -P in ipsec esp/tunnel/xxx.xxx.xxx.210-xxx.xxx.xxx.10/unique;
xxx.xxx.0.0/16 xxx.xxx.xxx.176/29 any -P out ipsec esp/tunnel/xxx.xxx.xxx.10-xxx.xxx.xxx.210/unique;
xxx.xxx.xxx.176/29 xxx.xxx.0.0/16 any -P in ipsec esp/tunnel/xxx.xxx.xxx.210-xxx.xxx.xxx.10/unique;
atd.
Tiskni
Sdílej:
ISSN 1214-1267, (c) 1999-2007 Stickfish s.r.o.