[strongSwan] Strongswan 5, IKEv1, Xauth and Radius?
Kimmo Koivisto
koippa at gmail.com
Fri Jun 22 16:14:34 CEST 2012
Hello Martin
Thanks for the clarification, I now understand :)
I tried to configure this, but got strange error in Xauth:
no XAuth method found named 'Pû'
and the name was changing when I tried, there seems to be missing
name-variable in xauth.c
DBG1(DBG_CFG, "no XAuth method found named '%s'");
I fixed this by adding the name variable:
DBG1(DBG_CFG, "no XAuth method found named '%s'",name);
and now getting error
no XAuth method found named 'eap'
So, my question is, do I need to compile something to get xauth-eap or
did I misunderstood something?
Regards,
Kimmo
My config:
conn ikev1
keyexchange=ikev1
ikelifetime=60m
keylife=20m
rekeymargin=3m
keyingtries=3
left=strong-5-server-ip
leftsubnet=0.0.0.0/0
leftcert=server.crt
leftid=@server-cert-cn
leftauth=pubkey
leftfirewall=no
right=%any
rightauth=pubkey
rightauth2=xauth-eap
rightsourceip=172.26.27.128/25
modeconfig=push
auto=add
and log full log is:
13[NET] received packet: from android-4-handser-ip[500] to
strong-5-server-ip[500]
13[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V ]
13[IKE] received NAT-T (RFC 3947) vendor ID
13[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
13[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
13[IKE] received draft-ietf-ipsec-nat-t-ike-00 vendor ID
13[IKE] received XAuth vendor ID
13[IKE] received Cisco Unity vendor ID
13[ENC] received unknown vendor ID:
40:48:b7:d5:6e:bc:e8:85:25:e7:de:7f:00:d6:c2:d3:80:00:00:00
13[IKE] received DPD vendor ID
13[IKE] android-4-handser-ip is initiating a Main Mode IKE_SA
13[ENC] generating ID_PROT response 0 [ SA V V V ]
13[NET] sending packet: from strong-5-server-ip[500] to
android-4-handser-ip[500]
02[NET] received packet: from android-4-handser-ip[500] to
strong-5-server-ip[500]
02[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
02[IKE] remote host is behind NAT
02[IKE] sending cert request for "DC=local, DC=s5-test, CN=s5-test Domain CA"
02[ENC] generating ID_PROT response 0 [ KE No CERTREQ NAT-D NAT-D ]
02[NET] sending packet: from strong-5-server-ip[500] to
android-4-handser-ip[500]
01[NET] received packet: from android-4-handser-ip[1024] to
strong-5-server-ip[4500]
01[ENC] parsed ID_PROT request 0 [ ID CERT SIG CERTREQ ]
01[IKE] received cert request for 'DC=local, DC=s5-test, CN=s5-test Domain CA'
01[IKE] received end entity cert "O=s5-test x, CN=Kimmo"
01[CFG] looking for XAuthInitRSA peer configs matching
strong-5-server-ip...android-4-handser-ip[O=s5-test x, CN=Kimmo]
01[CFG] selected peer config "ikev1"
01[CFG] using certificate "O=s5-test x, CN=Kimmo"
01[CFG] using trusted ca certificate "DC=local, DC=s5-test,
CN=s5-test Domain CA"
01[CFG] checking certificate status of "O=s5-test x, CN=Kimmo"
01[CFG] using trusted certificate "DC=local, DC=s5-test, CN=s5-test Domain CA"
01[CFG] crl correctly signed by "DC=local, DC=s5-test, CN=s5-test Domain CA"
01[CFG] crl is valid: until Jun 27 07:13:04 2012
01[CFG] using cached crl
J01[CFG] certificate status is good
J01[CFG] reached self-signed root ca with a path length of 0
J01[IKE] authentication of 'O=s5-test x, CN=Kimmo' with RSA successful
J01[IKE] authentication of 'vpn2.s5-test.com' (myself) successful
J01[IKE] sending end entity cert "O=s5-test, CN=vpn2.s5-test.com"
J01[ENC] generating ID_PROT response 0 [ ID CERT SIG ]
J01[NET] sending packet: from strong-5-server-ip[4500] to
android-4-handser-ip[1024]
J01[CFG] no XAuth method found named 'Pû'
2012/6/22 Martin Willi <martin at strongswan.org>:
> Hello Kimmo,
>
>> Does this mean that now the AAA server needs to be configured to use
>> EAP, let's say EAP-MSCHAPv2?
>
> With the xauth-eap plugin, yes. This is the same configuration that
> you'd use for IKEv2 clients, Windows 7 Agile VPN for example.
>
>> Then AAA receives the access request from Strongswan and AAA server
>> then responds or starts EAP and strongswan needs to have that
>> eap-mschapv2 enabled?
>
> Yes. AAA should request a (password based) EAP method, and the
> strongSwan gateway acts as client for this EAP method using XAuth
> credentials from the client. To use EAP-MSCHAPv2, pass
> --enable-eap-mschapv2 to ./configure (and enable a MD4 implementation,
> either through --enable-openssl or --enable-md4).
>
> Regards
> Martin
>
More information about the Users
mailing list