[strongSwan] [Strongswan]expected hash algorithm HASH_SHA1, but found HASH_SHA256 error
Richard Andrews
richard.andrews at symstream.com
Wed Aug 22 09:02:38 CEST 2012
I'll try again
You have the rightid configured to use only the email adress part of the
Cisco's ID trusted CA. I think the ID doesn't match so it does not
consider the auth policy defined in conn site-site.
What has worked for me in this situation (IOS 12.4 and IOS 15.1) is to
export the cert from the Cisco as PEM. Then use eg.
rightauth=rsasig
rightcert=cisco.crt.pem
This should unblock you. The cert forms a convenient container for the
peer ID + RSA pubkey. You probably then want to get the rightid= syntax
figured out and go back to your original config.
The identity in that Cisco cert looks awfully short.
Can someone show how to convert "C=IN, O=CAS" to a rightid= config line.
I remember it wasn't what I expected in some way.
On Wed, 2012-08-22 at 12:16 +0530, SaRaVanAn wrote:
> Hi,
> I am trying to form a tunnel using RSA authentication in Strongswan
> with CISCO as peer, but
> I am getting the below error message.
>
> Aug 22 12:03:34 uxcasxxx charon: 08[CFG] selected peer config
> 'site-site'
> Aug 22 12:03:34 uxcasxxx charon: 08[CFG] using certificate "C=IN,
> O=CAS"
> Aug 22 12:03:34 uxcasxxx charon: 08[CFG] using trusted ca
> certificate "C=IN, ST=TN, L=CH, O=CAS, E=saravanan at strongswan.org"
> Aug 22 12:03:34 uxcasxxx charon: 08[CFG] checking certificate status
> of "C=IN, O=CAS"
> Aug 22 12:03:34 uxcasxxx charon: 08[CFG] certificate status is not
> available
> Aug 22 12:03:34 uxcasxxx charon: 08[CFG] reached self-signed root ca
> with a path length of 0
> Aug 22 12:03:34 uxcasxxx charon: 08[LIB] expected hash algorithm
> HASH_SHA1, but found HASH_SHA256 (OID:
> 30:0d:06:09:60:86:48:01:65:03:04:02:01:05:00)
> Aug 22 12:03:34 uxcasxxx charon: 08[IKE] signature validation failed,
> looking for another key
> Aug 22 12:03:34 uxcasxxx charon: 08[ENC] generating IKE_AUTH response
> 1 [ N(AUTH_FAILED) ]
>
> Please find my configurations below .
>
> ca vpnca
> cacert=ikeca_email.crt
> auto=add
>
> config setup
> plutostart=yes
> plutodebug=all
> charonstart=yes
> charondebug=all
> nat_traversal=yes
> crlcheckinterval=10m
> strictcrlpolicy=no
>
> conn %default
> ikelifetime=8h
> lifetime = 8h
> rekeyfuzz = 100%
> keyingtries=1
>
> conn site-site
> left=172.31.114.227
> leftcert=LeftGty_email.crt
> ike=aes128-sha256-modp1536!
> esp=aes128-sha256!
> leftid=carol at strongswan.org
> rightsubnet=0.0.0.0/0
> leftfirewall=yes
> right=%any
> rightid=saravanan at strongswan.org
> keyexchange=ikev2
> auto=add
>
> ipsec.secrets
> : RSA LeftGty_email.key
>
> I am suspecting the problem in configurations.If so, please help me to
> correct the configuration or else
> what could be the reason for the failure?.
>
> Regards,
> Saravanan N
> _______________________________________________
> Users mailing list
> Users at lists.strongswan.org
> https://lists.strongswan.org/mailman/listinfo/users
More information about the Users
mailing list