Comment 5 for bug 332606

Revision history for this message
In , Gabriel (gabriel-redhat-bugs) wrote :

Description of problem:
Several bugs in latest ipsec-tools-0.7 prevent successful use as
a remote-access (road-warrior) client to a Cisco ASA 5500 vpn concentrator.

Attached are three patches which were also submitted to the upstream mailing
list which fix this problem.

Also attached are some packaging improvements: a phase1 mode config script,
an init script for the racoon daemon, and patches for the spec file to
incorporate the above mentioned patches and scripts.

Version-Release number of selected component (if applicable):
0.7

How reproducible:

Attempt to connect to a Cisco ASA in remote-access client mode with racoon.

Steps to Reproduce:
1. Configure racoon to connect to a Cisco ASA as suggested in the enclosed
racoon.conf example.
2. Start racoon daemon
3. run 'racoonctl vc <IP-of-Cisco-ASA>

Actual results:

vpn session fails to be established

Expected results:

successfully establish a vpn session

Additional info:

uploading tarball with the following content:

ipsec-tools.spec.diff changes to spec file
racoon.conf.diff changes to included config.file
ipsec-tools-0.7-cvs-dupmode.patch patch to handle dupe mode config packets
ipsec-tools-0.7-cvs-dupsplit.patch patch to handle dupe split networks
ipsec-tools-0.7-cvs-iface.patch patch to set SO_REUSEADDR on sockets
p1_up_down phase1 mode config script
racoon.init init script for racoon daemon