[strongSwan] Auth Failed

Chris Arnold carnold at electrichendrix.com
Mon Dec 31 19:55:14 CET 2012


strongSwan 4.4.06 on SLES 11 SP2. This use to work, i am working on adding users with ios to strongSwan but have commented that out of ipsec.conf and ipsec.secret to verify this is not the problem. User with Windows 7 with client cert connects and receives:
Error 13801: IKE Authentication Credentials are unacceptable

All other VPN connections work (like the conn teknerds which is strongSwan to sonicwall).

Error in the charon.log:
13[IKE] received end entity cert "O=Chris VPN service, CN=Client2"
13[CFG] looking for peer configs matching 192.168.1.18[%any]...public.ip[O=Chris VPN service, CN=Client2]
13[CFG] selected peer config 'rclientscerts'
13[CFG]   using certificate "O=Chris VPN service, CN=Client2"
13[CFG]   using trusted ca certificate "C=US, ST=NC, L=Durham, O=Edens Land Corp, OU=ELC, CN=Jarrod, E=email at address"
13[CFG] checking certificate status of "O=Chris VPN service, CN=Client2"
13[CFG] certificate status is not available
13[CFG]   reached self-signed root ca with a path length of 0
13[IKE] authentication of 'O=Chris VPN service, CN=Client2' with RSA signature successful
13[IKE] peer supports MOBIKE
13[IKE] no private key found for 'O=Chris VPN service, CN=70.63.136.95'
13[ENC] generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]

Here is ipsec.conf:
config setup
	# plutodebug=all
	  crlcheckinterval=600
	  strictcrlpolicy=no
	# cachecrls=yes
	  nat_traversal=yes
	# charonstart=no
	  plutostart=no
	#charondebug="cfg 3,lib=3"

# Add connections here.

conn %default
	ikelifetime=28800s
	keylife=20m
	rekeymargin=3m
	keyingtries=1
	keyexchange=ikev2
	mobike=no

conn rclientseap
	rekey=no
	left=%any
	leftauth=pubkey
	leftcert=server_cert.crt
	leftid=@public.ip
	leftsubnet=0.0.0.0/0
	right=%any
	rightsourceip=192.168.2.0/24
	rightauth=eap-mschapv2
	rightsendcert=never
	eap_identity=%any
        mobike=yes
	auto=ignore

conn rclientscerts
        rekey=no
        left=%any
        leftauth=pubkey
        leftcert=server_cert.crt
        leftid=@public.ip
        leftsubnet=0.0.0.0/0
        right=%any
        rightsourceip=192.168.2.0/24
        #rightauth=eap-mschapv2
        #rightsendcert=never
        #eap_identity=%any
        mobike=yes
        auto=add




conn teknerds
	left=%defaultroute
	leftcert=elcCert.pem
	leftsubnet=192.168.1.0/24
	#leftid="C=XX, O=X, CN=Edens Land Corp VPN"
	#leftfirewall=yes
	right=sonicwall.public.ip
	rightsubnet=192.168.123.0/24
	rightcert=teknerdsCert.pem
	rightid="C=XX, O=X, CN=Tek-Nerds VPN"
	auto=add


#conn iOS
#	keyexchange=ikev1
#	authby=xauthrsasig
#	xauth=server
#	left=%defaultroute
#	leftsubnet=192.168.1.0/24
#	leftcert=elcCert.pem
#	right=%any
#	rightsourceip=192.168.3.0/24
#	#rightcert=
#	pfs=no
#	auto=add

Here is ipsec.secret:
: RSA elcKey.pem

Any help with this is greatly appreciated




More information about the Users mailing list