[strongSwan] Antw: Re: NO_PROPOSAL_CHOSEN error notify
Noel Kuntze
noel at familie-kuntze.de
Mon Nov 11 10:37:10 CET 2013
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Bjoern,
Try it with an exclamation mark at the end.
Regards
Noel Kuntze
Am 11.11.2013 10:28, schrieb bjoern wahl:
> Hello Noel,
>
> thanks for the fast response.
>
> I did that already:
>
> ======================================================================
> ike=aes128-sha1-modp1536,aes128-md5-modp1536,3des-md5-modp1024,aes128-sha1-modp1024,aes256-sha-modp1024,3des-md5-modp1024
> esp=aes128-sha1,aes128-md5,aes256-md5,aes256-sha1,3des-sha1,3des-md5
> ======================================================================
>
> Did not help.
>
> björn
>
>
> Mit freundlichen Grüßen
>
> __________________________________
>
> Björn Wahl
> Leiter EDV-Abteilung
> Betriebswirt Fachrichtung Wirtschaftsinformatik
>
>
> St.-Marien Hospital Borken GmbH
> Am Boltenhof 7 - D-46325 Borken
> Telefon: +49 (0) 2861 97 - 1125
> Telefax: +49 (0) 2861 97 - 5 1122
> bjoern.wahl at hospital-borken.de
> www.hospital-borken.de
>
> Registergericht: Amtsgericht Coesfeld
> Registernummer : HR B 4914
> Vertretungsberechtigter Geschäftsführer: Dipl.-Kfm. Christoph Bröcker
> Umsatzsteuer-Identifikationsnummer gem 27 a Umsatzsteuergesetz: DE
> 307/5937/0049
> _________________________________
>>>> Noel Kuntze <noel at familie-kuntze.de> 11.11.13 10.16 Uhr >>>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Hello Bjoern,
>
> In this case, you need to set the cipher settings for IKE by hand.
> You can do this using the "ike" statement (and maybe the esp" statement,
> too) in ipsec.conf
> See the manpage for further information.
>
> Regards
> Noel Kuntze
>
> Am 11.11.2013 09:57, schrieb bjoern wahl:
>> Hello!
>>
>> Just after solving the problem with my Certs for WIN7 ( thanks to
> Martin
>> for the good hint) i hit the next Problem.
>>
>> I would like to migrate old VPNs to my new VPN-GW.
>>
>> >From Linux Openswan U2.4.4/K2.6.16.60-0.83.2-smp (netkey) to Linux
>> strongSwan U5.1.1/K3.0.93-0.8-default.
>>
>> With my first try i got a problem, the logs telling me:
>>
>>
> ========================================================================
>> 13[IKE] IKE_SA p123[1] established between
>> 11.11.11.11[11.11.11.11]...22.22.22.22[22.22.22.22]
>> 13[ENC] generating QUICK_MODE request 1243619134 [ HASH SA No ID ID ]
>> 13[NET] sending packet: from 11.11.11.11[500] to 22.22.22.22[500] (284
>> bytes)
>> 14[NET] received packet: from 22.22.22.22[500] to 11.11.11.11[500] (92
>> bytes)
>> 14[ENC] parsed INFORMATIONAL_V1 request 2876618417 [ HASH N(NO_PROP) ]
>> 14[IKE] received NO_PROPOSAL_CHOSEN error notify
>>
> ========================================================================
>>
>> On my old GW everything till working fine:
>>
>>
> ========================================================================
>> 003 "p123" #13615: NAT-Traversal: Result using 3: no NAT detected
>> 002 "p123" #13615: transition from state STATE_MAIN_I2 to state
>> STATE_MAIN_I3
>> 108 "p123" #13615: STATE_MAIN_I3: sent MI3, expecting MR3
>> 002 "p123" #13615: Main mode peer ID is ID_IPV4_ADDR: '22.22.22.22'
>> 002 "p123" #13615: transition from state STATE_MAIN_I3 to state
>> STATE_MAIN_I4
>> 004 "p123" #13615: STATE_MAIN_I4: ISAKMP SA established
>> {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha
> group=modp1024}
>> 002 "p123" #13616: initiating Quick Mode PSK+ENCRYPT+TUNNEL+PFS+UP
>> {using isakmp#13615}
>> 117 "p123" #13616: STATE_QUICK_I1: initiate
>> 003 "p123" #13616: ignoring informational payload, type
>> IPSEC_RESPONDER_LIFETIME
>> 002 "p123" #13616: transition from state STATE_QUICK_I1 to state
>> STATE_QUICK_I2
>> 004 "p123" #13616: STATE_QUICK_I2: sent QI2, IPsec SA established
>> {ESP=>0xeaaec3ed <0x3f7a355f xfrm=AES_256-HMAC_SHA1
>> NATD=212.159.204.76:500 DPD=none}
>>
> ========================================================================
>>
>> I just tought it might be because the cipher is not included in my new
>> Strongswan and so did look that up i did not find aes_256 in
>> my new Strongswan, is that the problem ?
>> How to add that cipher ?
>>
>>
> ========================================================================
>> List of X.509 End Entity Certificates:
>>
>> altNames: ....
>>
>> List of X.509 CA Certif
> icates:
>>
>> s....
>>
>> List of registered IKE algorithm> integrity: HMAC_MD5_96[hmac] HMAC_SHA1_96[hmac] AES_XCBC_96[xcbc]
>> HMAC_MD5_128[hmac] HMAC_SHA1_160[hmac]
>> AES_CMAC_96[cmac] HMAC_SHA2_256_128[hmac]
>> HMAC_SHA2_384_192[hmac] HMAC_SHA2_512_256[hmac]
>> HMAC_SHA1_128[hmac] HMAC_SHA2_256_256[hmac]
>> HMAC_SHA2_384_384[hmac] HMAC_SHA2_512_512[hmac]
>> aead:
>> hasher: HASH_MD4[md4] HASH_MD5[md5] HASH_SHA1[sha1]
>> HASH_SHA224[sha2] HASH_SHA256[sha2] HASH_SHA384[sha2]
>> HASH_SHA512[sha2]
>> prf: PRF_HMAC_MD5[hmac] PRF_HMAC_SHA1[hmac]
>> PRF_AES128_XCBC[xcbc] PRF_HMAC_SHA2_256[hmac]
>> PRF_HMAC_SHA2_384[hmac] PRF_HMAC_SHA2_512[hmac]
>> PRF_AES128_CMAC[cmac] PRF_FIPS_SHA1_160[fips-prf]
>> PRF_KEYED_SHA1[sha1]
>> dh-group: MODP_768[gmp] MODP_1024[gmp] MODP_1536[gmp]
> MODP_2048[gmp]
>> MODP_3072[gmp] MODP_4096[gmp] MODP_6144[gmp]
>> MODP_8192[gmp] MODP_1024_160[gmp] MODP_2048_224[gmp]
>> MODP_2048_256[gmp] MODP_CUSTOM[gmp]
>> random-gen: RNG_STRONG[random] RNG_TRUE[random]
>> nonce-gen: [nonce]
>>
>> List of loaded Plugins:
>>
>> charon:
>> CUSTOM:libcharon
>> NONCE_GEN
>> CUSTOM:libcharon-receiver
>> CUSTOM:kernel-ipsec
>> CUSTOM:kernel-net
>> CUSTOM:libcharon-receiver
>> HASHER:HASH_SHA1
>> RNG:RNG_STRONG
>> CUSTOM:socket
>> aes:
>> CRYPTER:AES_CBC-16
>> CRYPTER:AES_CBC-24
>> CRYPTER:AES_CBC-32
>> des:
>> CRYPTER:3DES_CBC-24
>> CRYPTER:DES_
>> CBC-8
>> CRYPTER:DES_ECB-8
>> rc2:
>> CRYPTER:RC2_CBC-0
>> sha HASHER:HASH_SHA384
>> HASHER:HASH_SHA512
>> md4:
>> HASHER:HASH_MD4
>> md5:
>> HASHER:HASH_MD5
>> random:
>> RNG:RNG_STRONG
>> RNG:RNG_TRUE
>> nonce:
>> NONCE_GEN
>> RNG:RNG_WEAK
>> x509:
>> CERT_ENCODE:X509
>> HASHER:HASH_SHA1
>> CERT_DECODE:X509
>> HASHER:HASH_SHA1
>> PUBKEY:RSA (soft)
>> PUBKEY:ECDSA (soft)
>> PUBKEY:DSA (soft)
>> CERT_ENCODE:X509_AC
>> CERT_DECODE:X509_AC
>> CERT_ENCODE:X509_CRL
>> CERT_DECODE:X509_CRL
>> CERT_ENCODE:X509_OCSP_REQUEST
>> HASHER:HASH_SHA1
>> RNG:RNG_WEAK
>> CERT_DECODE:X509_OCSP_RESPONSE
>> CERT_ENCODE:PKCS10_REQUEST
>> CERT_DECODE:PKCS10_REQUEST
>> revocation:
>> CUSTOM:revocation
>> CERT_ENCODE:X509_OCSP_REQUEST (soft)
>> CERT_DECODE:X509_OCSP_RESPONSE (soft)
>> CERT_DECODE:X509_CRL (soft)
>> CERT_DECODE:X509 (soft)
>> FETCHER:(null) (soft)
>> constraints:
>> CUSTOM:constraints
>> CERT_DECODE:X509 (soft)
>> pubkey:
>> CERT_ENCODE:TRUSTED_PUBKEY
>> CERT_DECODE:TRUSTED_PUBKEY
>> PUBKEY:RSA (soft)
>> PUBKEY:ECDSA (soft)
>> PUBKEY:DSA (soft)
>> pkcs1:
>> PRIVKEY:RSA
>> PUBKEY:ANY
>> PUBKEY:RSA
>> pkcs7:
>> CONTAINER_DECODE:PKCS7
>> CONTAINER_ENCODE:PKCS7_DATA
>> CONTAINER_ENCODE:PKCS7_SIGNED_DATA
>> CONTAINER_ENCODE:PKCS7_ENVELOPED_DATA
>> pkcs8:
>> PRIVKEY:ANY
>> PRIVKEY:RSA
>> PRIVKEY:ECDSA
>> pkcs12:
>> CONTAINER_DECODE:PKCS12
>> CONTAINER_DECODE:PKCS7
>> CERT_DECODE:X509 (soft)
>> PRIVKEY:ANY (soft)
>> HASHER:HASH_SHA1 (soft)
>> CRYPTER:3DES_CBC-24 (soft)
>> CRYPTER:RC2_CBC-0 (soft)
>> pgp:
>> PRIVKEY:ANY
>> PRIVKEY:RSA
>> PUBKEY:ANY
>> PUBKEY:RSA
>> CERT_DECODE:PGP
>> dnskey:
>> PUBKEY:ANY
>> PUBKEY:RSA
>> sshkey:
>> PUBKEY:ANY
>> pem:
>> PRIVKEY:ANY
>> PRIVKEY:ANY
>> HASHER:HASH_MD5 (soft)
>> PRIVKEY:RSA
>> PRIVKEY:RSA
>> HASHER:HASH_MD5 (soft)
>> PRIVKEY:ECDSA
>> PRIVKEY:ECDSA
>> HASHER:HASH_MD5 (soft)
>> PRIVKEY:DSA (not loaded)
>> PRIVKEY:DSA
>> HASHER:HASH_MD5 (soft)
>> PUBKEY:ANY
>> PUBKEY:ANY
>> PUBKEY:RSA
>> PUBKEY:RSA
>> PUBKEY:ECDSA (not loaded)
>> PUBKEY:ECDSA
>> PUBKEY:DSA (not loaded)
>>
> PUBKEY:DSA
>> CERT_DECODE:ANY
>> CERT_DECOD> CERT_DECODE:X509_CRL
>> CERT_DECODE:X509_OCSP_REQUEST (not loaded)
>> CERT_DECODE:X509_OCSP_REQUEST
>> CERT_DECODE:X509_OCSP_RESPONSE
>> CERT_DECODE:X509_OCSP_RESPONSE
>> CERT_DECODE:X509_AC
>> CERT_DECODE:X509_AC
>> CERT_DECODE:PKCS10_REQUEST
>> CERT_DECODE:PKCS10_REQUEST
>> CERT_DECODE:TRUSTED_PUBKEY
>> CERT_DECODE:TRUSTED_PUBKEY
>> CERT_DECODE:PGP
>> CERT_DECODE:PGP
>> CONTAINER_DECODE:PKCS12
>> CONTAINER_DECODE:PKCS12
>> fips-prf:
>> PRF:PRF_FIPS_SHA1_160
>> PRF:PRF_KEYED_SHA1
>> gmp:
>> DH:MODP_2048
>> RNG:RNG_STRONG
>> DH:MODP_2048_224
>> RNG:RNG_STRONG
>> DH:MODP_2048_256
>> RNG:RNG_STRONG
>> DH:MODP_1536
>> RNG:RNG_STRONG
>> DH:MODP_3072
>> RNG:RNG_STRONG
>> DH:MODP_4096
>> RNG:RNG_STRONG
>> DH:MODP_6144
>> RNG:RNG_STRONG
>> DH:MODP_8192
>> RNG:RNG_STRONG
>> DH:MODP_1024
>> RNG:RNG_STRONG
>> DH:MODP_1024_160
>> RNG:RNG_STRONG
>> DH:MODP_768
>> RNG:RNG_STRONG
>> DH:MODP_CUSTOM
>> RNG:RNG_STRONG
>> PRIVKEY:RSA
>> PRIVKEY_GEN:RSA
>> RNG:RNG_TRUE
>> PUBKEY:RSA
>> PRIVKEY_SIGN:RSA_EMSA_PKCS1_NULL
>> PRIVKEY_SIGN:RSA_EMSA_PKCS1_SHA1
>> HASHER:HASH_SHA1
>> PRIVKEY_SIGN:RSA_EMSA_PKCS1_SHA224
>> HASHER:HASH_SHA224
>> PRIVKEY_SIGN:RSA_EMSA_PKCS1_SHA256
>> HASHER:HASH_SHA256
>> PRIVKEY_SIGN:RSA_EMSA_PKCS1_SHA384
>> HASHER:HASH_SHA384
>> PRIVKEY_SIGN:RSA_EMSA_PKCS1_SHA512
>> HASHER:HASH_SHA512
>> PRIVKEY_SIGN:RSA_EMSA_PKCS1_MD5
>> HASHER:HASH_MD5
>> PUBKEY_VERIFY:RS
>> A_EMSA_PKCS1_NULL
>> PUBKEY_VERIFY:RSA_EMSA_PKCS1_SHA1
>> PUBKEY_VERIFY:RSA_EMSA_PKCS1_SHA384
>> HASHER:HASH_SHA384
>> PUBKEY_VERIFY:RSA_EMSA_PKCS1_SHA512
>> HASHER:HASH_SHA512
>> PUBKEY_VERIFY:RSA_EMSA_PKCS1_MD5
>> HASHER:HASH_MD5
>> PRIVKEY_DECRYPT:ENCRYPT_RSA_PKCS1
>> PUBKEY_ENCRYPT:ENCRYPT_RSA_PKCS1
>> RNG:RNG_WEAK
>> xcbc:
>> PRF:PRF_AES128_XCBC
>> CRYPTER:AES_CBC-16
>> PRF:PRF_CAMELLIA128_XCBC (not loaded)
>> CRYPTER:CAMELLIA_CBC-16
>> SIGNER:CAMELLIA_XCBC_96 (not loaded)
>> CRYPTER:CAMELLIA_CBC-16
>> SIGNER:AES_XCBC_96
>> CRYPTER:AES_CBC-16
>> cmac:
>> PRF:PRF_AES128_CMAC
>> CRYPTER:AES_CBC-16
>> SIGNER:AES_CMAC_96
>> CRYPTER:AES_CBC-16
>> hmac:
>> PRF:PRF_HMAC_SHA1
>> HASHER:HASH_SHA1
>> PRF:PRF_HMAC_MD5
>> HASHER:HASH_MD5
>> PRF:PRF_HMAC_SHA2_256
>> HASHER:HASH_SHA256
>> PRF:PRF_HMAC_SHA2_384
>> HASHER:HASH_SHA384
>> PRF:PRF_HMAC_SHA2_512
>> HASHER:HASH_SHA512
>> SIGNER:HMAC_SHA1_96
>> HASHER:HASH_SHA1
>> SIGNER:HMAC_SHA1_128
>> HASHER:HASH_SHA1
>> SIGNER:HMAC_SHA1_160
>> HASHER:HASH_SHA1
>> SIGNER:HMAC_MD5_96
>> HASHER:HASH_MD5
>> SIGNER:HMAC_MD5_128
>> HASHER:HASH_MD5
>> SIGNER:HMAC_SHA2_256_128
>> HASHER:HASH_SHA256
>> SIGNER:HMAC_SHA2_256_256
>> HASHER:HASH_SHA256
>> SIGNER:HMAC_SHA2_384_192
>> HASHER:HASH_SHA384
>> SIGNER:HMAC_SHA2_384_384
>> HASHER:HASH_SHA384
>> SIGNER:HMAC_SHA2_512_256
>> HASHER:HASH_SHA512
>> SIGNER:HMAC_SHA2_512_512
>> HASHER:HASH_SHA512
>> attr:
>> CUSTOM:attr
>> kernel-netlink:
>> CUSTOM:kernel-ipsec
>> CUSTOM:kernel-net
>> resolve:
>> CUSTOM:resolve
>> socket-default:
>> CUSTOM:socket
>> CUSTOM:kernel-ipsec (soft)
>> stroke:
>> CUSTOM:stroke
>> PRIVKEY:RSA (soft)
>> PRIVKEY:ECDSA (soft)
>> PRIVKEY:DSA (soft)
>> CERT_DECODE:ANY (soft)
>> CERT_DECODE:X509 (soft)
>> CERT_DECODE:X509_CRL (soft)
>> CERT_DECODE:X509_AC (soft)
>> CERT_DECODE:TRUSTED_PUBKEY (soft)
>> updown:
>> CUSTOM:updown
>> eap-identity:
>>
> EAP_SERVER:ID
>> EAP_CLIENT:ID
>> eap-mschapv2:
>> > EAP_CLIENT:MSCHAPV2
>> CRYPTER:DES_ECB-8
>> HASHER:HASH_MD4
>> HASHER:HASH_SHA1
>> RNG:RNG_WEAK
>> eap-radius:
>> EAP_SERVER:RAD
>> CUSTOM:eap-radius
>> XAUTH_SERVER:radius
>> CUSTOM:eap-radius
>> CUSTOM:eap-radius
>> HASHER:HASH_MD5
>> SIGNER:HMAC_MD5_128
>> RNG:RNG_WEAK
>> eap-tls:
>> EAP_SERVER:TLS
>> HASHER:HASH_MD5
>> HASHER:HASH_SHA1
>> RNG:RNG_WEAK
>> EAP_CLIENT:TLS
>> HASHER:HASH_MD5
>> HASHER:HASH_SHA1
>> RNG:RNG_WEAK
>> RNG:RNG_STRONG
>> xauth-generic:
>> XAUTH_SERVER:generic
>> XAUTH_CLIENT:generic
>>
>>
> ========================================================================
>>
>>
> ----------------------------------------------------------------------------------------------------
>> Klinikverbund Westmünsterland gGmbH
>> Jur. Sitz der Gesellschaft: Am Boltenhof 7, 46325 Borken
>> Registergericht Coesfeld, HRB Nr. 8983
>> Ust.-Id.Nr.: DE 222740345
>> Hauptgeschäftsführer: Hermann Nientiedt
>> Geschäftsführer: Christoph Bröcker, Ludger Hellmann
>>
>> Diese E-Mail enthält vertrauliche oder rechtlich geschützte
>> Informationen. Wenn Sie nicht der beabsichtige Empfänger sind,
>> informieren Sie bitte sofort den Absender und löschen Sie diese
> E-Mail.
>>
>> Das unbefugte Kopieren dieser E-Mail oder die unbefugte Weitergabe
> der
>> enthaltenen Informationen ist nicht gestattet.
>>
>> Dem Klinikverbund Westmünsterland sind fünf Krankenhäuser mit 1.332
>> Planbetten und mehrere Einrichtungen der Altenhilfe angeschlossen.
> Mehr
>> als 50 Fachbereiche orientieren sich an neusten medizinischen
> Standards
>> und erfüllen die hohen Anforderungen einer qualifizierten und
>> zertifizierten Versorgung. Rund 50.000 Patienten werden jährlich in
> den
>> Krankenhäusern station�
>> �r behandelt. Mit über 3.800 Mitarbeitern gehört
>> der Verbund zu den größten Arbeitgebern der Region.
>>
>>
>>
>>
>> _______________________________________________
>> Users mailing list
>> Users at lists.strongswan.org
>> https://lists.strongswan.org/mailman/listinfo/users
>>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2.0.22 (GNU/Linux)
> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
>
> iQIcBAEBAgAGBQJSgKC0AAoJEDg5KY9j7GZY1z8P/jbOCJLXjA1R6dR/VrUCF1nc
> KLHwtG9zEJYAnCtPIUfaGtiaRACE5Vunte1OIEAvs5NZQvl9sfRASvpwpmpZAAp9
> FReP0oxq026ofGUMleqaB5Ug2YhgWYJmwzhZWRK/cveUYNn5xUjg5dzdsWU6JZsL
> oX6rK0xgsolnaI61OSGq3X3boIitTE4fQgrQkGz4RDzYWtMkloRMN1MSjCG5iryT
> KBil3bC/vAiZjfJ6Ebb2R/Ib/FNFVw9cVFInrbud6s/2Dy9YSJw6B/J1psTm0aDQ
> Fzftrkvoj8g3BLxmrdVmNNQE1yon044OtMnv8mk9FOykXfIqpNQEVV8HRatQfBZD
> 6iptFA2up7BR0J0F6BZzoW0Pq0JochHlDiycQtzsfEBgMInQ1uKR95wdHn5Lce+4
> onOj8f4U7jDRApyELrTp8n5ZTx2g+G7OTMBtY6Sl6lu6o+RYmwUqnfKHpb/hd/i5
> 0wx0RDBMagRu9Vj0nii67lV76JBXREf7E2egHuGJPG3hecGkbejbu0wDkcQdWwCZ
> AlhBJYD22D5sTPTWpOYMyuiz7BkqPWXzCRBq44JR1t7k+vSy9tpjzceLe87NVJyL
> n8UO8TZ+GMCGEg3h1PqsxkMpxKKxPMybRen0t4FxebqDJP3Rleb8c295l/PLmH+F
> mqRPWEuUbEOyzf9HTpxv
> =D3Fk
> -----END PGP SIGNATURE-----
>
>
>
>
>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/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=tINk
-----END PGP SIGNATURE-----
More information about the Users
mailing list