[strongSwan] DH group MODP_2048 inacceptable, requesting MODP_1024

Kevin Clark kevin.clark at csoft.co.uk
Wed Jan 19 11:31:45 CET 2011


Been scratching my head over this for a couple of hours now.  Time for the experts to take a look ;-)

Everything was working fine with Ubuntu 10.04 (Strongswan 4.3.2).  A colleague has updated to Ubuntu 10.10 (Strongswan 4.4.0) and now we get:

[IKE] DH group MODP_2048 inacceptable, requesting MODP_1024

Here's the setup:

initiator: Strongswan 4.4.0 (Ubuntu 10.10)
responder: Strongswan 4.4.1 (Centos 5.5)

responder config:

config setup
	# plutodebug=all
	# crlcheckinterval=600
	# strictcrlpolicy=yes
	# cachecrls=yes
	 nat_traversal=yes
	 charonstart=yes
	 plutostart=yes

#conn %default
#    left=aaa.bbb.ccc.ddd
#    leftsubnet=111.222.333.444/24
#    leftid=@aaa.bbb.ccc.ddd
#    leftcert=aaa.bbb.ccc.ddd.crt
#    leftfirewall=yes

conn rw-linux-kclark
    left=aaa.bbb.ccc.ddd
    leftsubnet=111.222.333.444/24
    leftid=@aaa.bbb.ccc.ddd
    leftcert=aaa.bbb.ccc.ddd.crt
    leftfirewall=yes
    right=%any
    rightsourceip=192.168.100.0/24
    rightcert=initiator.crt
    auto=add

The Strongswan documentation indicates that MODP_2048 is supported through the GMP plugin, which is loaded:
 
[root at responder ~]# ipsec listalgs
---<snip>---
Status of IKEv2 charon daemon (strongSwan 4.4.1):
  uptime: 88 days, since Oct 22 18:56:34 2010
  malloc: sbrk 385024, mmap 0, used 229096, free 155928
  worker threads: 9 idle of 16, job queue load: 0, scheduled events: 0
  loaded plugins: aes des sha1 sha2 md4 md5 random x509 revocation pubkey pkcs1 pgp dnskey pem fips-prf xcbc hmac gmp attr resolve kernel-netlink socket-raw stroke updown eap-identity eap-mschapv2

And the MODP_2048 algorithm is registered:

[root at responder ~]# ipsec listalgs
---<snip>---
List of registered IKEv2 Algorithms:

  encryption: AES_CBC 3DES_CBC DES_CBC DES_ECB 
  integrity:  AES_XCBC_96 HMAC_SHA1_96 HMAC_SHA1_128 HMAC_SHA1_160 HMAC_SHA2_256_128 HMAC_MD5_96 HMAC_MD5_128 HMAC_SHA2_384_192 HMAC_SHA2_512_256 
  hasher:     HASH_SHA1 HASH_SHA224 HASH_SHA256 HASH_SHA384 HASH_SHA512 HASH_MD4 HASH_MD5 
  prf:        PRF_KEYED_SHA1 PRF_FIPS_SHA1_160 PRF_AES128_XCBC PRF_HMAC_SHA2_256 PRF_HMAC_SHA1 PRF_HMAC_MD5 PRF_HMAC_SHA2_384 PRF_HMAC_SHA2_512 
  dh-group:   MODP_2048 MODP_2048_224 MODP_2048_256 MODP_1536 MODP_3072 MODP_4096 MODP_6144 MODP_8192 MODP_1024 MODP_1024_160 MODP_768 

So why does the responder reject MODP_2048 when it is a supported algorithm?

Kevin




More information about the Users mailing list