[strongSwan] Looking for help with "no trusted RSA public key found for"
Jim Tessier
jimtess at gmail.com
Thu Apr 29 17:15:46 CEST 2010
Thanks for the tip! I added the subjectAltName to my openssl.cnf
file, regenerated the certificate and now it is working!
[ v3_req ]
basicConstraints = CA:FALSE
subjectKeyIdentifier = hash
subjectAltName = @alt_names
[alt_names]
IP.1 = 172.16.107.2
On Thu, Apr 29, 2010 at 12:41 AM, Andreas Steffen
<andreas.steffen at strongswan.org> wrote:
> Hi Jim,
>
> IPsec is not SSL! If your peer's identity is the IPv4 address
> 172.16.107.2 then it will not be checked against the CN= field
> in the certificate. Instead the certificate must contain the
> IP address as a subjectAltName extension.
>
> It also seems that the host itself is using the same certificate.
> You should use distinct certs for each VPN host.
>
> Regards
>
> Andreas
>
> Jim Tessier wrote:
>> Hello,
>> I am having no luck setting up a mutually authenticated tunnel
>> using certificates. I have tried mucking around with just about every
>> ipsec.conf parameter, but no luck. I also saw the FAQ, but could not
>> make sense of the answer. Any help is appreciated!!! Thanks.
>>
>> Here is my output:
>>
>> 04[CFG] added configuration 'home'
>> 08[CFG] received stroke: initiate 'load'
>> 08[CFG] no config named 'load'
>> 08[CFG]
>> 07[CFG] received stroke: initiate 'home'
>> 10[IKE] initiating IKE_SA home[1] to 172.16.107.2
>> 10[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
>> 10[NET] sending packet: from 2.2.2.3[500] to 172.16.107.2[500]
>> 12[NET] received packet: from 172.16.107.2[500] to 2.2.2.3[500]
>> 12[ENC] parsed IKE_SA_INIT response 0 [ N(COOKIE) ]
>> 12[IKE] initiating IKE_SA home[1] to 172.16.107.2
>> 12[ENC] generating IKE_SA_INIT request 0 [ N(COOKIE) SA KE No
>> N(NATD_S_IP) N(NATD_D_IP) ]
>> 12[NET] sending packet: from 2.2.2.3[500] to 172.16.107.2[500]
>> 16[NET] received packet: from 172.16.107.2[500] to 2.2.2.3[500]
>> 16[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP)
>> N(NATD_D_IP) CERTREQ ]
>> 16[IKE] local host is behind NAT, sending keep alives
>> 16[IKE] received cert request for "O=AcmePacket, OU=CSE,
>> E=akhindari at acmepacket.com, L=Burlington, ST=MA, C=US, CN=selab.com"
>> 16[IKE] sending cert request for "O=AcmePacket, OU=CSE,
>> E=akhindari at acmepacket.com, L=Burlington, ST=MA, C=US, CN=selab.com"
>> 16[IKE] authentication of 'C=US, ST=Massachusetts, O=Acme Packet,
>> OU=Systems Engineering, CN=172.16.107.2' (myself) with RSA signature
>> successful
>> 16[IKE] sending end entity cert "C=US, ST=Massachusetts, O=Acme
>> Packet, OU=Systems Engineering, CN=172.16.107.2"
>> 16[IKE] establishing CHILD_SA home
>> 16[ENC] generating IKE_AUTH request 1 [ IDi CERT CERTREQ IDr AUTH CP
>> SA TSi TSr N(EAP_ONLY) ]
>> 16[NET] sending packet: from 2.2.2.3[4500] to 172.16.107.2[4500]
>> 13[NET] received packet: from 172.16.107.2[4500] to 2.2.2.3[4500]
>> 13[ENC] parsed IKE_AUTH response 1 [ IDr CERT AUTH CP SA TSi TSr ]
>> 13[IKE] received end entity cert "C=US, ST=MA, L=Burlington,
>> O=Engineering, CN=172.16.107.2"
>> 13[IKE] no trusted RSA public key found for '172.16.107.2'
>> 00[DMN] signal of type SIGINT received. Shutting down
>> 00[KNL] received netlink error: Invalid argument (22)
>>
>> And here is my ipsec.conf file:
>> # ipsec.conf - strongSwan IPsec configuration file
>>
>> # basic configuration
>>
>> config setup
>> plutostart=no
>> charondebug=all
>>
>> ca msg1
>> cacert=CA-SS-acmesec1.pem
>> auto=add
>>
>> conn %default
>> ike=aes128-sha1-modp1024!
>> esp=aes128-sha1!
>> ikelifetime=23d
>> keylife=22d
>> rekeymargin=10m
>> keyingtries=1
>> keyexchange=ikev2
>> mobike=no
>> auto=add
>> lefthostaccess=no
>> dpdaction=restart
>> dpddelay=45
>> rekey=yes
>> reauth=no
>> forceencaps=yes
>>
>> conn home
>> left=%defaultroute
>> leftsourceip=%modeconfig
>> leftcert=acmesec1Cert.pem
>> leftfirewall=yes
>> rightfirewall=yes
>> right=172.16.107.2
>> rightid=%172.16.107.2
>> rightsubnet=192.168.105.0/24
>>
>> _______________________________________________
>> Users mailing list
>> Users at lists.strongswan.org
>> https://lists.strongswan.org/mailman/listinfo/users
>
>
> --
> ======================================================================
> Andreas Steffen andreas.steffen at strongswan.org
> strongSwan - the Linux VPN Solution! www.strongswan.org
> Institute for Internet Technologies and Applications
> University of Applied Sciences Rapperswil
> CH-8640 Rapperswil (Switzerland)
> ===========================================================[ITA-HSR]==
>
More information about the Users
mailing list