Hi,<div><br></div><div>I'm trying to connect a chromebook to <span style="font-size:13.1999998092651px">Linux strongSwan U5.1.2/K3.13.0-43-generic with not much luck.</span></div><div><span style="font-size:13.1999998092651px"><br></span></div><div>Using a secret the connection is just fine but when moving the authentication using a CA things are going wrong. <span style="font-size:13.1999998092651px">The certs should be ok because they work with a different connection</span></div><div><br></div><div>From reading the logs the authentication is going well but things are starting to go wrong here:</div><div><br></div><div>
<p>15[ENC] generating ID_PROT response 0 [ ID CERT CERT CERT SIG ]</p>
<p>15[NET] sending packet: from 162.243.137.92[4500] to 50.204.245.210[4500] (2092 bytes)</p>
<p>04[NET] sending packet: from 162.243.137.92[4500] to 50.204.245.210[4500]</p>
<p>03[NET] received packet: from 50.204.245.210[4500] to 162.243.137.92[4500]</p>
<p>03[NET] waiting for data on sockets</p>
<p>06[NET] received packet: from 50.204.245.210[4500] to 162.243.137.92[4500] (68 bytes)</p>
<p>06[ENC] invalid HASH_V1 payload length, decryption failed?</p>
<p>06[ENC] could not decrypt payloads</p>
<p>06[IKE] message parsing failed</p>
<p>06[IKE] ignore malformed INFORMATIONAL request</p><p>ipsec.conf</p><p>config setup</p><p> charondebug="cfg 2, dmn 2, ike 2, net 2"</p><p> uniqueids=never</p><p>conn %default</p><p><span> </span>authby=rsasig</p><p> <span> </span>leftrsasigkey=%cert</p><p> <span> </span>rightrsasigkey=%cert</p><p> <span> </span>keyingtries=1</p><p> <span> </span>keylife=60m</p><p> <span> </span>ikelifetime=240m</p><p><span> </span>rightdns=8.8.8.8</p><p><br></p><p>conn ios</p><p> keyexchange=ikev1</p><p> xauth=server</p><p> left=%defaultroute</p><p> leftsubnet=<a href="http://0.0.0.0/0" target="_blank">0.0.0.0/0</a></p><p> leftcert=server.pem</p><p> right=%any</p><p> rightid="CN=*, OU=1957, O=secretdomain<a href="http://pertino.com" target="_blank">.com</a>, C=US"</p><p> rightsourceip=<a href="http://172.27.0.0/16" target="_blank">172.27.0.0/16</a> </p><p> rightsubnet=<a href="http://172.27.0.0/16" target="_blank">172.27.0.0/16</a></p><p> rightauth2=xauth-noauth</p><p> ike=aes128-sha1-modp2048,3des-sha1-modp1536</p><p> esp=aes128-sha1-modp2048,3des-sha1-modp1536</p><p> rekey=no</p><p> reauth=no</p><p> dpddelay=10</p><p> dpdtimeout=30</p><p> dpdaction=clear</p><p> auto=add</p><p> fragmentation=yes</p><p> </p><p>conn chromebook</p><p> keyexchange=ikev1</p><p> authby=rsasig</p><p> rekey=no</p><p> keyingtries=2</p><p> left=%defaultroute</p><p> leftsubnet=<a href="http://0.0.0.0/0" target="_blank">0.0.0.0/0</a></p><p> leftprotoport=udp/l2tp</p><p> leftcert=server.pem</p><p> right=%any</p><p> rightprotoport=udp/%any</p><p> rightrsasigkey=%cert</p><p> rightid="CN=*, OU=1957, O= secretdomain<a href="http://pertino.com" target="_blank">.com</a>, C=US"</p><p>
</p><p> auto=add</p><p>ipsec.secrets</p><p>
</p><p class="p1">: RSA /etc/ipsec.d/private/newserverkey.pem </p></div>