[strongSwan] Certificates no longer valid
NGO MAEMBLE Ruth-Stephanie
ruth-stephanie.ngomaemble at thalesgroup.com
Tue Apr 3 16:00:46 CEST 2012
Hello,
I am sorry but after updating carol's ocsp certificates according to the patch, both tests "ikev2/ocsp-signer-cert" and "ikev2/ocsp-timeouts-good" still fail... Here is moon's daemon.log file from test "ikev2/ocsp-signer-cert" :
Apr 3 15:53:56 moon charon: 00[DMN] Starting IKEv2 charon daemon (strongSwan 4.6.2)
Apr 3 15:53:56 moon charon: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
Apr 3 15:53:56 moon charon: 00[CFG] loaded ca certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA" from '/etc/ipsec.d/cacerts/strongswanCert.pem'
Apr 3 15:53:56 moon charon: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
Apr 3 15:53:56 moon charon: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
Apr 3 15:53:56 moon charon: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
Apr 3 15:53:56 moon charon: 00[CFG] loading crls from '/etc/ipsec.d/crls'
Apr 3 15:53:56 moon charon: 00[CFG] loading secrets from '/etc/ipsec.secrets'
Apr 3 15:53:56 moon charon: 00[CFG] loaded RSA private key from '/etc/ipsec.d/private/moonKey.pem'
Apr 3 15:53:56 moon charon: 00[KNL] listening on interfaces:
Apr 3 15:53:56 moon charon: 00[KNL] eth0
Apr 3 15:53:56 moon charon: 00[KNL] 192.168.0.1
Apr 3 15:53:56 moon charon: 00[KNL] fec0::1
Apr 3 15:53:56 moon charon: 00[KNL] fe80::fcfd:c0ff:fea8:1
Apr 3 15:53:56 moon charon: 00[KNL] eth1
Apr 3 15:53:56 moon charon: 00[KNL] 10.1.0.1
Apr 3 15:53:56 moon charon: 00[KNL] fec1::1
Apr 3 15:53:56 moon charon: 00[KNL] fe80::fcfd:aff:fe01:1
Apr 3 15:53:56 moon charon: 00[DMN] loaded plugins: curl aes des sha1 sha2 md5 pem pkcs1 gmp random x509 revocation hmac xcbc stroke kernel-netlink socket-default
Apr 3 15:53:56 moon charon: 00[JOB] spawning 16 worker threads
Apr 3 15:53:56 moon charon: 14[CFG] received stroke: add connection 'rw'
Apr 3 15:53:56 moon charon: 14[CFG] loaded certificate "C=CH, O=Linux strongSwan, CN=moon.strongswan.org" from 'moonCert.pem'
Apr 3 15:53:56 moon charon: 14[CFG] added configuration 'rw'
Apr 3 15:53:59 moon charon: 06[NET] received packet: from 192.168.0.100[500] to 192.168.0.1[500]
Apr 3 15:53:59 moon charon: 06[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
Apr 3 15:53:59 moon charon: 06[IKE] 192.168.0.100 is initiating an IKE_SA
Apr 3 15:53:59 moon charon: 06[IKE] sending cert request for "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
Apr 3 15:53:59 moon charon: 06[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(MULT_AUTH) ]
Apr 3 15:53:59 moon charon: 06[NET] sending packet: from 192.168.0.1[500] to 192.168.0.100[500]
Apr 3 15:53:59 moon charon: 07[NET] received packet: from 192.168.0.100[4500] to 192.168.0.1[4500]
Apr 3 15:53:59 moon charon: 07[ENC] parsed IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(ADD_6_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
Apr 3 15:53:59 moon charon: 07[IKE] received cert request for "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
Apr 3 15:53:59 moon charon: 07[IKE] received end entity cert "C=CH, O=Linux strongSwan, OU=OCSP, CN=carol at strongswan.org"
Apr 3 15:53:59 moon charon: 07[CFG] looking for peer configs matching 192.168.0.1[moon.strongswan.org]...192.168.0.100[carol at strongswan.org]
Apr 3 15:53:59 moon charon: 07[CFG] selected peer config 'rw'
Apr 3 15:53:59 moon charon: 07[CFG] using certificate "C=CH, O=Linux strongSwan, OU=OCSP, CN=carol at strongswan.org"
Apr 3 15:53:59 moon charon: 07[CFG] using trusted ca certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
Apr 3 15:53:59 moon charon: 07[CFG] checking certificate status of "C=CH, O=Linux strongSwan, OU=OCSP, CN=carol at strongswan.org"
Apr 3 15:53:59 moon charon: 07[CFG] requesting ocsp status from 'http://ocsp.strongswan.org:8880' ...
Apr 3 15:53:59 moon charon: 07[CFG] using certificate "C=CH, O=Linux strongSwan, OU=OCSP Signing Authority, CN=ocsp.strongswan.org"
Apr 3 15:53:59 moon charon: 07[CFG] using trusted ca certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
Apr 3 15:53:59 moon charon: 07[CFG] reached self-signed root ca with a path length of 0
Apr 3 15:53:59 moon charon: 07[CFG] ocsp response correctly signed by "C=CH, O=Linux strongSwan, OU=OCSP Signing Authority, CN=ocsp.strongswan.org"
Apr 3 15:53:59 moon charon: 07[CFG] ocsp response contains no status on our certificate
Apr 3 15:53:59 moon charon: 07[CFG] ocsp check failed, fallback to crl
Apr 3 15:53:59 moon charon: 07[CFG] fetching crl from 'http://crl.strongswan.org/strongswan.crl' ...
Apr 3 15:53:59 moon charon: 07[CFG] using trusted certificate "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
Apr 3 15:53:59 moon charon: 07[CFG] crl correctly signed by "C=CH, O=Linux strongSwan, CN=strongSwan Root CA"
Apr 3 15:53:59 moon charon: 07[CFG] crl is valid: until May 03 15:49:26 2012
Apr 3 15:53:59 moon charon: 07[CFG] certificate status is good
Apr 3 15:53:59 moon charon: 07[CFG] reached self-signed root ca with a path length of 0
Apr 3 15:53:59 moon charon: 07[IKE] authentication of 'carol at strongswan.org' with RSA signature successful
Apr 3 15:53:59 moon charon: 07[IKE] peer supports MOBIKE
Apr 3 15:53:59 moon charon: 07[IKE] authentication of 'moon.strongswan.org' (myself) with RSA signature successful
Apr 3 15:53:59 moon charon: 07[IKE] IKE_SA rw[1] established between 192.168.0.1[moon.strongswan.org]...192.168.0.100[carol at strongswan.org]
Apr 3 15:53:59 moon charon: 07[IKE] scheduling reauthentication in 3348s
Apr 3 15:53:59 moon charon: 07[IKE] maximum IKE_SA lifetime 3528s
Apr 3 15:53:59 moon charon: 07[IKE] sending end entity cert "C=CH, O=Linux strongSwan, CN=moon.strongswan.org"
Apr 3 15:53:59 moon charon: 07[IKE] CHILD_SA rw{1} established with SPIs c6235c4c_i c7a5fcbe_o and TS 10.1.0.0/16 === 192.168.0.100/32
Apr 3 15:53:59 moon charon: 07[ENC] generating IKE_AUTH response 1 [ IDr CERT AUTH SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) ]
Apr 3 15:53:59 moon charon: 07[NET] sending packet: from 192.168.0.1[4500] to 192.168.0.100[4500]
Apr 3 15:54:03 moon charon: 00[DMN] signal of type SIGINT received. Shutting down
Apr 3 15:54:03 moon charon: 00[IKE] deleting IKE_SA rw[1] between 192.168.0.1[moon.strongswan.org]...192.168.0.100[carol at strongswan.org]
Apr 3 15:54:03 moon charon: 00[IKE] sending DELETE for IKE_SA rw[1]
Apr 3 15:54:03 moon charon: 00[ENC] generating INFORMATIONAL request 0 [ D ]
Apr 3 15:54:03 moon charon: 00[NET] sending packet: from 192.168.0.1[4500] to 192.168.0.100[4500]
Is that normal ?
Thanks,
Stéphanie
-----Message d'origine-----
De : Andreas Steffen [mailto:andreas.steffen at strongswan.org]
Envoyé : lundi 2 avril 2012 15:08
À : NGO MAEMBLE Ruth-Stephanie
Cc : users at lists.strongswan.org
Objet : Re: [strongSwan] Certificates no longer valid
Hello Stéphanie,
the expired OCSP key/certificate pair was renewed with the following
patch:
http://git.strongswan.org/?p=strongswan.git;a=commit;h=ebf292bad0bd4cafb6edc3f49ae35804277874ea
The updated test will be contained in the upcoming 4.6.3dr2 release.
Regards
Andreas
On 02.04.2012 14:53, NGO MAEMBLE Ruth-Stephanie wrote:
> Hello,
>
>
>
> I'm working on the automated tests of strongSwan-4.6.2. I have a problem
> with two tests of yours : "ikev2/ocsp-signer-cert" and
> "ikev2/ocsp-timeouts-good". The second one is based on the first. Both
> indicate a certificate invalidity (see moon's /daemon.log/ file below).
> On your website they probably passed because you launched them on
> February 20^th 2012, and these certificate were valid until February
> 24^th 2012.
>
> Could you please let me know if there is an evolution of these tests ?
> Should I regenerate certificates by myself to pass them ?
>
>
>
> Moon's /daemon.log/ file extracted from the test "ikev2/ocsp-signer-cert" :
>
>
>
> /Mar 28 21:23:20 moon charon: 00[DMN] Starting IKEv2 charon daemon
> (strongSwan 4.6.2) /
>
> /Mar 28 21:23:20 moon charon: 00[CFG] loading ca certificates from
> '/etc/ipsec.d/cacerts' /
>
> /Mar 28 21:23:20 moon charon: 00[CFG] loaded ca certificate "C=CH,
> O=Linux strongSwan, CN=strongSwan Root CA" from
> '/etc/ipsec.d/cacerts/strongswanCert.pem' /
>
> /Mar 28 21:23:20 moon charon: 00[CFG] loading aa certificates from
> '/etc/ipsec.d/aacerts' /
>
> /Mar 28 21:23:20 moon charon: 00[CFG] loading ocsp signer certificates
> from '/etc/ipsec.d/ocspcerts' /
>
> /Mar 28 21:23:20 moon charon: 00[CFG] loading attribute certificates
> from '/etc/ipsec.d/acerts' /
>
> /Mar 28 21:23:20 moon charon: 00[CFG] loading crls from
> '/etc/ipsec.d/crls' /
>
> /Mar 28 21:23:20 moon charon: 00[CFG] loading secrets from
> '/etc/ipsec.secrets' /
>
> /Mar 28 21:23:20 moon charon: 00[CFG] loaded RSA private key from
> '/etc/ipsec.d/private/moonKey.pem' /
>
> /Mar 28 21:23:20 moon charon: 00[KNL] listening on interfaces: /
>
> /Mar 28 21:23:20 moon charon: 00[KNL] eth0 /
>
> /Mar 28 21:23:20 moon charon: 00[KNL] 192.168.0.1 /
>
> /Mar 28 21:23:20 moon charon: 00[KNL] fec0::1 /
>
> /Mar 28 21:23:20 moon charon: 00[KNL] fe80::fcfd:c0ff:fea8:1 /
>
> /Mar 28 21:23:20 moon charon: 00[KNL] eth1 /
>
> /Mar 28 21:23:20 moon charon: 00[KNL] 10.1.0.1 /
>
> /Mar 28 21:23:20 moon charon: 00[KNL] fec1::1 /
>
> /Mar 28 21:23:20 moon charon: 00[KNL] fe80::fcfd:aff:fe01:1 /
>
> /Mar 28 21:23:20 moon charon: 00[DMN] loaded plugins: curl aes des sha1
> sha2 md5 pem pkcs1 gmp random x509 revocation hmac xcbc stroke
> kernel-netlink socket-default /
>
> /Mar 28 21:23:20 moon charon: 00[JOB] spawning 16 worker threads /
>
> /Mar 28 21:23:20 moon charon: 08[CFG] received stroke: add ca
> 'strongswan-ca' /
>
> /Mar 28 21:23:20 moon charon: 08[CFG] added ca 'strongswan-ca' /
>
> /Mar 28 21:23:20 moon charon: 09[CFG] received stroke: add connection 'rw' /
>
> /Mar 28 21:23:20 moon charon: 09[CFG] loaded certificate "C=CH,
> O=Linux strongSwan, CN=moon.strongswan.org" from 'moonCert.pem' /
>
> /Mar 28 21:23:20 moon charon: 09[CFG] added configuration 'rw' /
>
> /Mar 28 21:23:22 moon charon: 05[NET] received packet: from
> 192.168.0.100[500] to 192.168.0.1[500] /
>
> /Mar 28 21:23:22 moon charon: 05[ENC] parsed IKE_SA_INIT request 0 [ SA
> KE No N(NATD_S_IP) N(NATD_D_IP) ] /
>
> /Mar 28 21:23:22 moon charon: 05[IKE] 192.168.0.100 is initiating an
> IKE_SA /
>
> /Mar 28 21:23:23 moon charon: 05[IKE] sending cert request for "C=CH,
> O=Linux strongSwan, CN=strongSwan Root CA" /
>
> /Mar 28 21:23:23 moon charon: 05[ENC] generating IKE_SA_INIT response 0
> [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(MULT_AUTH) ] /
>
> /Mar 28 21:23:23 moon charon: 05[NET] sending packet: from
> 192.168.0.1[500] to 192.168.0.100[500] /
>
> /Mar 28 21:23:23 moon charon: 04[NET] received packet: from
> 192.168.0.100[4500] to 192.168.0.1[4500] /
>
> /Mar 28 21:23:23 moon charon: 04[ENC] parsed IKE_AUTH request 1 [ IDi
> CERT N(INIT_CONTACT) CERTREQ IDr AUTH SA TSi TSr N(MOBIKE_SUP)
> N(ADD_6_ADDR) N(MULT_AUTH) N(EAP_ONLY) ] /
>
> /Mar 28 21:23:23 moon charon: 04[IKE] received cert request for "C=CH,
> O=Linux strongSwan, CN=strongSwan Root CA" /
>
> /Mar 28 21:23:23 moon charon: 04[IKE] received end entity cert "C=CH,
> O=Linux strongSwan, OU=OCSP, CN=carol at strongswan.org
> <mailto:CN=carol at strongswan.org>" /
>
> /Mar 28 21:23:23 moon charon: 04[CFG] looking for peer configs matching
> 192.168.0.1[moon.strongswan.org]...192.168.0.100[carol at strongswan.org] /
>
> /Mar 28 21:23:23 moon charon: 04[CFG] selected peer config 'rw' /
>
> /Mar 28 21:23:23 moon charon: 04[CFG] using certificate "C=CH, O=Linux
> strongSwan, OU=OCSP, CN=carol at strongswan.org
> <mailto:CN=carol at strongswan.org>" /
>
> /Mar 28 21:23:23 moon charon: 04[CFG] using trusted ca certificate
> "C=CH, O=Linux strongSwan, CN=strongSwan Root CA" /
>
> /Mar 28 21:23:23 moon charon: 04[CFG] subject certificate invalid (valid
> from Feb 25 08:58:57 2007 to Feb 24 08:58:57 2012) /
>
> /Mar 28 21:23:23 moon charon: 04[IKE] no trusted RSA public key found
> for 'carol at strongswan.org' /
>
> /Mar 28 21:23:23 moon charon: 04[IKE] peer supports MOBIKE /
>
> /Mar 28 21:23:23 moon charon: 04[ENC] generating IKE_AUTH response 1 [
> N(AUTH_FAILED) ] /
>
> /Mar 28 21:23:23 moon charon: 04[NET] sending packet: from
> 192.168.0.1[4500] to 192.168.0.100[4500] /
>
> /Mar 28 21:23:26 moon charon: 00[DMN] signal of type SIGINT received.
> Shutting down/
>
>
>
> Thanks and best regards,
>
>
>
> Stéphanie Ngo Maemble
>
======================================================================
Andreas Steffen andreas.steffen at strongswan.org
strongSwan - the Linux VPN Solution! www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[ITA-HSR]==
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20120403/5d5d15e6/attachment.html>
More information about the Users
mailing list