[strongSwan] Can't connect with chained certificates

Ygor Amadeo Sartori Regados ygor.regados at yahoo.com.br
Sun Apr 11 04:33:13 CEST 2010


Hi.

I have configured strongSwan with X.509 authentication for roadwarriors. 
It uses IKEv1 (for some Windows clients) and IKEv2 (some Linux clients).

I'm trying to change the PKI to one using chained CAs. I created a Sub-CA 
only for VPN roadwarriors' certificates. When I've changed the 
certificates, I couldn't connect anymore. When I used my previous single-
level CA, it worked fine.

Has anyone had such a problem? (sorry if my english is bad)

My configuration:
*Server:*
config setup
    nat_traversal=yes
    plutostderrlog=/var/log/pluto.log

ca principal
    cacert = ca-principal.pem
    auto = add

ca vpn
    cacert = ca-vpn.pem
    auto = add

conn %default
    auto=add
    leftfirewall=yes
    rekey=no
    dpdaction=clear
    dpddelay=60
    dpdtimeout=180

conn rw
    left=%defaultroute
    leftcert=rw.pem
    leftsubnet=192.168.0.0/24
    pfs=no
    right=%any
    rightsubnetwithin=0.0.0.0/0

*Client:*
config setup
    nat_traversal = yes
    plutostart = yes
    charonstart = yes
    plutostderrlog = /var/log/pluto.log

conn %default
    leftfirewall=yes
    mobike=yes
    compress=yes
    auto=start

conn rw
    leftcert = dst.pem
    keyexchange=ikev2
    left = %defaultroute
    right = ***.***.***.***
    rightsubnet = 192.168.0.0/24

Log on server (masked IP addresses and certificate info):

Apr 10 23:18:46 mailproxy charon: 13[NET] received packet: from +++.++.++
+.+++[17615] to ***.***.***.***[500] 
Apr 10 23:18:46 mailproxy charon: 13[ENC] parsed IKE_SA_INIT request 0 
[ SA KE No N(NATD_S_IP) N(NATD_D_IP) ] 
Apr 10 23:18:46 mailproxy charon: 13[IKE] +++.++.+++.+++ is initiating an 
IKE_SA 
Apr 10 23:18:46 mailproxy charon: 13[IKE] remote host is behind NAT 
Apr 10 23:18:46 mailproxy charon: 13[IKE] sending cert request for 
"O=***, OU=***, E=****, L=****, ST=**, C=**, CN=AC Raiz"
Apr 10 23:18:46 mailproxy charon: 13[IKE] sending cert request for "C=**, 
ST=**, O=***, OU=***, CN=AC para VPNs, E=****" 
Apr 10 23:18:46 mailproxy charon: 13[ENC] generating IKE_SA_INIT response 
0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(MULT_AUTH) ] 
Apr 10 23:18:46 mailproxy charon: 13[NET] sending packet: from 
***.***.***.***[500] to +++.++.+++.+++[17615] 
Apr 10 23:18:46 mailproxy charon: 14[NET] received packet: from +++.++.++
+.+++[17619] to ***.***.***.***[4500] 
Apr 10 23:18:46 mailproxy charon: 14[ENC] parsed IKE_AUTH request 1 [ IDi 
CERT CERTREQ IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N
(MULT_AUTH) ] 
Apr 10 23:18:46 mailproxy charon: 14[IKE] received cert request for 
"C=**, ST=**, O=***, OU=***, CN=AC para VPNs, E=****" 
Apr 10 23:18:46 mailproxy charon: 14[IKE] received cert request for 
"O=***, OU=***, E=****, L=****, ST=**, C=**, CN=AC Raiz"
Apr 10 23:18:46 mailproxy charon: 14[IKE] received end entity cert "C=**, 
ST=**, O=***, OU=****, CN=Ygor A. S. Regados (PC), E=*******" 
Apr 10 23:18:46 mailproxy charon: 14[CFG] looking for peer configs 
matching ***.***.***.***[***.***.***.***]...+++.++.+++.+++[C=**, ST=**, 
O=***, OU=***, CN=Ygor A. S. Regados (PC), E=*******] 
Apr 10 23:18:46 mailproxy charon: 14[CFG] no matching peer config found 
Apr 10 23:18:46 mailproxy charon: 14[IKE] peer supports MOBIKE 
Apr 10 23:18:46 mailproxy charon: 14[ENC] generating IKE_AUTH response 1 
[ N(AUTH_FAILED) ] 
Apr 10 23:18:46 mailproxy charon: 14[NET] sending packet: from 
***.***.***.***[4500] to +++.++.+++.+++[17619] 

-- 
Ygor





More information about the Users mailing list