looks good ( conf wise ). What' s actually your problem?
What I would suggest;
1st capture IKE traffic to validate your sending and receiving ph1 packets
e,g
tcpdump -i " insert the interface" -vvv udp and port 500
if your you not seeing any traffic to the 2 end-points, I would suggest a top level firewall/acl is blocking traffic. I' ve been burned numerous times in regard to the above, where an external firewall/router was prevnting my IKE and ESP ( protocol 50 ) traffic. Also don' t forget any local ACL if your running a local filter like iptables. i' m assuming ClearOS supports iptables.
If IKE is being present, I would inspect for esp traffic next
e.g
tcpdump -i " insert interface' -vvv proto 50
You can also inspect from the FGt with the
diag sniffer packet commands. and validate correct packets are being sent to each en-points.
2nd, are you using certs or psk? if your using certs try a PSK and rekey the PSK on both openswan and fortigate .
look at your /etc/ipsec.secrets file
3rd,
make sure your FGt has matching quickmode src/dst selectors that matches your left/right subnets ( local/remote )
4th
When you bring up the tunnel, what does your ipsec status shows on openswan and what logs are generated on FGT and any logs on the openswan host?
5th
Do you have any NAT issues and rely on NAT-t keepalives
On openswan you will need the following in the ipsec.conf file
config setup
nat_traversa l= yes
watch I now see that you do have enabled in yout cfg ;)
Overall,
Openswan is not that hard to setup and just review the tips/trick from above and ensure you are matching the correct phase172 proposal and ensure PFS is surely enabled.
You have a host of means to debug and analyze any conditions from the linux host side of things.
lastly; are you running phase1-2 in interface modes? if yes, ensure you have a static route for the remote-destination.
And finally , good luck