[strongSwan] Problem with CRLs

Daniel Riedemann stigmayta at googlemail.com
Wed Feb 17 01:05:47 CET 2010


Hello all,

I am using StrongSWAN the first time and I am using the tool xca to 
build a PKI. So far everything works fine (connection from a windows 7 
host to a linux strongswan gateway). The Connection get started correctly.

Now I wanted to test the CRLs. And installed a certificate at the 
windows client which I revoked later. But the CRL I am generating with 
xca can't be read by charon:

Feb 17 00:03:17 vpn charon: 14[CFG]   fetching crl from 
'http://192.168.1.50/StrongSWAN_Root_CA.crl' ...
Feb 17 00:03:17 vpn charon: 14[LIB] L0 - certificateList: ASN1 tag 0x30 
expected, but is 0x2d
Feb 17 00:03:17 vpn charon: 14[LIB] building CRED_CERTIFICATE - X509_CRL 
failed, tried 2 builders
Feb 17 00:03:17 vpn charon: 14[CFG] crl fetched successfully but parsing 
failed

I generated a CRL with an other tool (gnomint) also, but charon is 
telling me the same...

If I place the CRL directly into /etc/ipsec.d/crls I just see this on 
the log:

Feb 17 00:51:28 vpn charon: 00[CFG] loading crls from '/etc/ipsec.d/crls'
Feb 17 00:51:28 vpn charon: 00[CFG]   loaded crl from 
'/etc/ipsec.d/crls/StrongSWAN_Root_CA.crl'

But the connection get started normaly, so the CRL in this directory is 
also not read correctly.

I'am using RSA certificates with 4096 bit for the CA, and 2048 bit for 
gateway and client. Hashing algorithm is sha-256.

What am I doing wrong? Or is there a bug in both tools (or strongswan)?
I really appreciate your help.

Best Regards
Daniel Riedemann


ipsec.conf:

config setup
         crlcheckinterval=600
         cachecrls=yes
         nat_traversal=yes
         charonstart=yes
         plutostart=no

ca StrongSWAN_Root_CA
         cacert=StrongSWAN_Root_CA.crt
         crluri="http://192.168.1.50/StrongSWAN_Root_CA.crl"
         auto=add

conn roadwarrior-ikev2
         authby=pubkey
         auth=esp
         type=tunnel
         keyexchange=ikev2
         auto=add
         compress=yes
         dpddelay=15
         dpdtimeout=60
         esp=aes256-sha1-modp2048
         ike=aes256-sha1-modp2048
         rekey=yes
         ikelifetime=10800
         lifetime=3600
         reauth=yes
         margintime=180
         pfs=yes
         left=%defaultroute
         leftcert=vpn.project.lan.crt
         leftfirewall=yes
leftid=@vpn.project.lan
         leftsendcert=ifasked
         leftsubnet=10.0.0.0/8
         right=%any
         rightsourceip=172.17.0.0/16




More information about the Users mailing list