[strongSwan] Strongswan+RADIUS secret code problem?
Tony Zhou
tonytzhou at gmail.com
Fri Oct 28 14:49:16 CEST 2011
Freeradius log without eap-identity enabled:
rad_recv: Access-Request packet from host 127.0.0.1 port 54333, id=149,
length=73
User-Name = "\254\020J\367"
EAP-Message = 0x0200000901ac104af7
NAS-Port-Type = Virtual
NAS-Identifier = "strongSwan"
Message-Authenticator = 0x804aa820651189b312713567d5ce2064
# Executing section authorize from file
/etc/freeradius/sites-enabled/default
+- entering group authorize {...}
++[preprocess] returns ok
++[chap] returns noop
++[mschap] returns noop
++[digest] returns noop
[suffix] No '@' in User-Name = "-?J-", looking up realm NULL
[suffix] No such realm "NULL"
Module list I loaded:
load = curl aes des sha1 sha2 md5 pem pkcs1 gmp random x509 hmac xcbc stroke
kernel-netlink fips-prf eap-md5 eap-mschapv2 eap-radius updown socket-raw
As indicated before, loading eap-identity would prevent strongswan sending
packets to freeradius.
-----Original Message-----
From: Andreas Steffen [mailto:andreas.steffen at strongswan.org]
Sent: Friday, October 28, 2011 1:47 AM
To: T Z
Cc: users at lists.strongswan.org
Subject: Re: [strongSwan] Strongswan+RADIUS secret code problem?
Hello,
did you enable EAP Identity?
./configure ... --enable-eap-identity
Regards
Andreas
On 10/28/2011 06:37 AM, T Z wrote:
> Hi all,
>
> I'm using Strongswan 4.5.2 (from Debian squeeze-backports) and
> Freeradius 2.1.0 (from Debian stable) to construct an IKEv2 VPN for my
> clients. It seems that Strongswan is connected with Freeradius, but
> client connection just fails. Testing with Windows 7 IKEv2 client, it
> prompts "Error 13801: IKE authentication credentials are unacceptable."
>
> Here's the log:
>
> /var/log/syslog:
> Oct 28 13:31:06 vpn charon: 08[NET] received packet: from
> client.ip.address[500] to server.ip.address[500] Oct 28 13:31:06 vpn
> charon: 08[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP)
> N(NATD_D_IP) ] Oct 28 13:31:06 vpn charon: 08[IKE] client.ip.address
> is initiating an IKE_SA Oct 28 13:31:06 vpn charon: 08[IKE] remote
> host is behind NAT Oct 28 13:31:06 vpn charon: 08[IKE] sending cert
> request for "C=CH, O=TonyVPN, CN=TonyVPN CA"
> Oct 28 13:31:06 vpn charon: 08[ENC] generating IKE_SA_INIT response 0
> [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(MULT_AUTH) ] Oct 28
> 13:31:06 vpn charon: 08[NET] sending packet: from
> server.ip.address[500] to client.ip.address[500] Oct 28 13:31:07 vpn
> charon: 10[NET] received packet: from client.ip.address[4500] to
> server.ip.address[4500] Oct 28 13:31:07 vpn charon: 10[ENC] unknown
> attribute type INTERNAL_IP4_SERVER Oct 28 13:31:07 vpn charon: 10[ENC]
> unknown attribute type INTERNAL_IP6_SERVER Oct 28 13:31:07 vpn charon:
> 10[ENC] parsed IKE_AUTH request 1 [ IDi CERTREQ N(MOBIKE_SUP) CP(ADDR
> DNS NBNS SRV ADDR6 DNS6 SRV6) SA TSi TSr ] Oct 28 13:31:07 vpn charon:
> 10[IKE] received 32 cert requests for an unknown ca Oct 28 13:31:07
> vpn charon: 10[CFG] looking for peer configs matching
> server.ip.address[%any]...client.ip.address[client.nat.ip.address]
> Oct 28 13:31:07 vpn charon: 10[CFG] selected peer config 'L2TP-PSK-NAT'
> Oct 28 13:31:07 vpn charon: 10[IKE] peer requested EAP, config
> inacceptable Oct 28 13:31:07 vpn charon: 10[CFG] switching to peer config
'IPSec-IKEv2'
> Oct 28 13:31:07 vpn charon: 10[IKE] EAP-Identity request configured,
> but not supported Oct 28 13:31:07 vpn charon: 10[CFG] sending RADIUS
> Access-Request to server 'vpnserver'
> Oct 28 13:31:07 vpn charon: 10[CFG] received RADIUS Access-Challenge
> from server 'vpnserver'
> Oct 28 13:31:07 vpn charon: 10[IKE] initiating EAP_RADIUS method (id
> 0x01) Oct 28 13:31:07 vpn charon: 10[IKE] peer supports MOBIKE Oct 28
> 13:31:07 vpn charon: 10[IKE] authentication of 'C=CH, O=VPN,
> CN=server.ip.address' (myself) with RSA signature successful Oct 28
> 13:31:07 vpn charon: 10[IKE] sending end entity cert "C=CH, O=VPN,
> CN=server.ip.address"
> Oct 28 13:31:07 vpn charon: 10[ENC] generating IKE_AUTH response 1 [
> IDr CERT AUTH EAP/REQ/MD5 ] Oct 28 13:31:07 vpn charon: 10[NET]
> sending packet: from server.ip.address[4500] to
> client.ip.address[4500] Oct 28 13:31:36 vpn charon: 13[JOB] deleting
> half open IKE_SA after timeout
>
> /var/log/auth.log:
> Oct 28 13:31:06 japanvpn charon: 08[IKE] client.ip.address is
> initiating an IKE_SA
>
> /etc/ipsec.conf:
> conn IPSec-IKEv2
> keyexchange=ikev2
> auto=add
> left=server.ip.address
> leftsubnet=0.0.0.0/0
> leftauth=pubkey
> leftcert=serverCert.pem
> right=%any
> rightsourceip=192.168.104.0/0
> rightauth=eap-radius
> rightsendcert=never
> eap_identity=%any
>
> /etc/strongswan.conf:
> eap-radius {
> servers {
> vpnserver {
> secret = somesecret
> address = 127.0.0.1
> }
> }
> }
>
> By setting FreeRADIUS to debug mode I found that the user name
> Strongswan passed to FreeRADIUS was incorrect (some gibberish), so I
> guess it's a secret code problem but I'm 100% sure the secret code is
> correct. Also I've tried changing it to some other string like 123456
> but Strongswan passes the username as the same gibberish as before,
> thus I don't think it's a secret code problem.
>
> Any suggestions/advices would be appreciated.
======================================================================
Andreas Steffen andreas.steffen at strongswan.org
strongSwan - the Linux VPN Solution! www.strongswan.org
Institute for Internet Technologies and Applications University of Applied
Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[ITA-HSR]==
More information about the Users
mailing list