[strongSwan] [Strongswan]expected hash algorithm HASH_SHA1, but found HASH_SHA256 error

Richard Andrews richard.andrews at symstream.com
Wed Aug 22 08:49:49 CEST 2012


Your Cisco must be configured to use sha-1 instead of sha-256.
Strongswan is using sha-256 which the Cisco is complaining about. Check
your crypto map and related isakmp profiles.

On Wed, 2012-08-22 at 12:16 +0530, SaRaVanAn wrote:
> Hi,
>    I am trying to form a tunnel using RSA authentication in Strongswan
> with CISCO as peer, but
> I am getting the below error message.
> 
> Aug 22 12:03:34 uxcasxxx charon: 08[CFG] selected peer config
> 'site-site'
> Aug 22 12:03:34 uxcasxxx charon: 08[CFG]   using certificate "C=IN,
> O=CAS"
> Aug 22 12:03:34 uxcasxxx charon: 08[CFG]   using trusted ca
> certificate "C=IN, ST=TN, L=CH, O=CAS, E=saravanan at strongswan.org"
> Aug 22 12:03:34 uxcasxxx charon: 08[CFG] checking certificate status
> of "C=IN, O=CAS"
> Aug 22 12:03:34 uxcasxxx charon: 08[CFG] certificate status is not
> available
> Aug 22 12:03:34 uxcasxxx charon: 08[CFG]   reached self-signed root ca
> with a path length of 0
> Aug 22 12:03:34 uxcasxxx charon: 08[LIB] expected hash algorithm
> HASH_SHA1, but found HASH_SHA256 (OID:
> 30:0d:06:09:60:86:48:01:65:03:04:02:01:05:00)
> Aug 22 12:03:34 uxcasxxx charon: 08[IKE] signature validation failed,
> looking for another key
> Aug 22 12:03:34 uxcasxxx charon: 08[ENC] generating IKE_AUTH response
> 1 [ N(AUTH_FAILED) ]
> 
> Please find my configurations below .
> 
> ca vpnca
>          cacert=ikeca_email.crt
>          auto=add
> 
> config setup
>           plutostart=yes
>           plutodebug=all
>           charonstart=yes
>           charondebug=all
>           nat_traversal=yes
>           crlcheckinterval=10m
>           strictcrlpolicy=no
> 
> conn %default
>         ikelifetime=8h
>         lifetime = 8h
>         rekeyfuzz = 100%
>         keyingtries=1
> 
> conn site-site
>     left=172.31.114.227
>     leftcert=LeftGty_email.crt
>     ike=aes128-sha256-modp1536!
>     esp=aes128-sha256!
>     leftid=carol at strongswan.org
>     rightsubnet=0.0.0.0/0
>     leftfirewall=yes
>     right=%any
>     rightid=saravanan at strongswan.org
>     keyexchange=ikev2
>     auto=add
> 
> ipsec.secrets
> : RSA LeftGty_email.key
> 
> I am suspecting the problem in configurations.If so, please help me to
> correct the configuration or else 
> what could be the reason for the failure?.
> 
> Regards,
> Saravanan N
> _______________________________________________
> Users mailing list
> Users at lists.strongswan.org
> https://lists.strongswan.org/mailman/listinfo/users





More information about the Users mailing list