[strongSwan] Unable to establish ipsec tunnel using certs of intermediate CA's

Sriram sriram.ec at gmail.com
Mon Mar 3 15:44:39 CET 2014


Hi Everyone,



I have host -to-host ipsec setup between 2 ips 10.206.1.10 and 10.206.1.11

Tunnel is established using certificates. Tunnel is established properly,
when the certificates are generated using rootca.

But when the certificates are generated using intermediate CA's, tunnel is
not getting established.



In 10.206.1.10

Under /etc/ipsec.d/cacerts/ I have copied ca.crt(root ca),
*ca-int.crt(Intermediate
ca)*

In /etc/ipsec.d/certs/ I have copied end entity cert issued by ca-int.crt



In 10.206.1.11

Under /etc/ipsec.d/cacerts/ I have copied ca.crt(root ca),
*ca-int1.crt(Intermediate
ca)*

In /etc/ipsec.d/certs/ I have copied end entity cert issued by ca-int1.crt



I am getting below errors

Mar  3 19:34:45 localhost charon: 06[ENC] parsed IKE_AUTH request 1 [ IDi
CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR) SA TSi TSr N(MULT_AUTH)
N(EAP_ONLY) ]

Mar  3 19:34:45 localhost charon: 06[IKE] received cert request for
"CN=DaRoot"

Mar  3 19:34:45 localhost charon: 06[IKE] received end entity cert
"CN=1234abcd"

Mar  3 19:34:45 localhost charon: 06[CFG] looking for peer configs matching
10.206.1.11[CN=12345abcde]...10.206.1.10[CN=1234abcd]

Mar  3 19:34:45 localhost charon: 06[CFG] peer config match local: 20
(ID_DER_ASN1_DN ->
30:15:31:13:30:11:06:03:55:04:03:13:0a:31:32:33:34:35:61:62:63:64:65)

Mar  3 19:34:45 localhost charon: 06[CFG] peer config match remote: 20
(ID_DER_ASN1_DN ->
30:13:31:11:30:0f:06:03:55:04:03:13:08:31:32:33:34:61:62:63:64)

Mar  3 19:34:45 localhost charon: 06[CFG] ike config match: 3100
(10.206.1.11 10.206.1.10 IKEv2)

Mar  3 19:34:45 localhost charon: 06[CFG]   candidate "home1", match:
20/20/3100 (me/other/ike)

Mar  3 19:34:45 localhost charon: 06[CFG] selected peer config 'home1'

Mar  3 19:34:45 localhost charon: 06[IKE] IDx' => 25 bytes @ 0xb4d82fe0

Mar  3 19:34:45 localhost charon: 06[IKE]    0: 09 00 00 00 30 13 31 11 30
0F 06 03 55 04 03 13  ....0.1.0...U...

Mar  3 19:34:45 localhost charon: 06[IKE]   16: 08 31 32 33 34 61 62
63 64
.1234abcd

Mar  3 19:34:45 localhost charon: 06[IKE] SK_p => 16 bytes @ 0x91c5340

Mar  3 19:34:45 localhost charon: 06[IKE]    0: 43 85 1F D8 CA 8B BD 27 A0
58 B8 9F 18 5C E7 C0  C......'.X...\..

Mar  3 19:34:45 localhost charon: 06[IKE] octets = message + nonce +
prf(Sk_px, IDx') => 316 bytes @ 0x91c6d88

Mar  3 19:34:45 localhost charon: 06[IKE]    0: 95 B5 C1 A2 8D 13 C3 77 00
00 00 00 00 00 00 00  .......w........

Mar  3 19:34:45 localhost charon: 06[IKE]   16: 21 20 22 08 00 00 00 00 00
00 01 0C 22 00 00 2C  ! "........."..,

Mar  3 19:34:45 localhost charon: 06[IKE]   32: 00 00 00 28 01 01 00 04 03
00 00 08 01 00 00 03  ...(............

Mar  3 19:34:45 localhost charon: 06[IKE]   48: 03 00 00 08 03 00 00 01 03
00 00 08 02 00 00 01  ................

Mar  3 19:34:45 localhost charon: 06[IKE]   64: 00 00 00 08 04 00 00 01 28
00 00 68 00 01 00 00  ........(..h....

Mar  3 19:34:45 localhost charon: 06[IKE]   80: 23 F4 AC E7 E8 4E 55 80 54
B7 14 C8 48 B9 98 AE  #....NU.T...H...

Mar  3 19:34:45 localhost charon: 06[IKE]   96: 15 DB CA F8 93 BF 31 2D 59
89 77 52 32 A8 0A 2D  ......1-Y.wR2..-

Mar  3 19:34:45 localhost charon: 06[IKE]  112: 78 3E 6F EB 6D 33 5A E6 A5
B7 0F 9A 3C DA 4E D8  x>o.m3Z.....<.N.

Mar  3 19:34:45 localhost charon: 06[IKE]  128: E6 71 B4 C4 5A D7 20 48 61
B2 34 14 99 0A F6 AF  .q..Z. Ha.4.....

Mar  3 19:34:45 localhost charon: 06[IKE]  144: F8 DB 6D 82 B2 55 6C 1B 84
CA 37 8E C3 7F 50 8A  ..m..Ul...7...P.

Mar  3 19:34:45 localhost charon: 06[IKE]  160: 5C 2A 39 E4 27 FC 8D 23 38
95 E2 B2 F3 F9 8E CA  \*9.'..#8.......

Mar  3 19:34:45 localhost charon: 06[IKE]  176: 29 00 00 24 03 8D 56 09 5D
B1 17 D2 BA 29 D6 8B  )..$..V.]....)..

Mar  3 19:34:45 localhost charon: 06[IKE]  192: 7E 0B A5 2D 42 4C 1D 37 D9
EA 17 4A 0D 0C 77 67  ~..-BL.7...J..wg

Mar  3 19:34:45 localhost charon: 06[IKE]  208: E6 51 40 1D 29 00 00 1C 00
00 40 04 D5 2F E3 7F  .Q at .)..... at ../..

Mar  3 19:34:45 localhost charon: 06[IKE]  224: 13 80 F3 7A 91 9D F2 7A 0A
6E C0 A9 E7 B2 72 63  ...z...z.n....rc

Mar  3 19:34:45 localhost charon: 06[IKE]  240: 00 00 00 1C 00 00 40 05 BD
B4 3E 98 F1 EB F4 10  ...... at ...>.....

Mar  3 19:34:45 localhost charon: 06[IKE]  256: 44 06 6B 25 90 C4 30 CF BB
FB FE 4C 00 9B 1E AD  D.k%..0....L....

Mar  3 19:34:45 localhost charon: 06[IKE]  272: 19 7A F6 43 23 A9 8A C4 3C
EF 98 57 13 69 07 0E  .z.C#...<..W.i..

Mar  3 19:34:45 localhost charon: 06[IKE]  288: 9A E4 34 F1 A6 9B 48 65 E8
06 8A 6C 6D 30 6B C1  ..4...He...lm0k.

Mar  3 19:34:45 localhost charon: 06[IKE]  304: F2 2C 6E 19 39 37 C1 C6 2F
48 D2 18              .,n.97../H..

Mar  3 19:34:45 localhost charon: 06[CFG]   using certificate "CN=1234abcd"

Mar  3 19:34:45 localhost charon: 06[CFG]   certificate "CN=1234abcd" key:
2048 bit RSA

*Mar  3 19:34:45 localhost charon: 06[CFG] no issuer certificate found for
"CN=1234abcd"*

Mar  3 19:34:45 localhost charon: 06[IKE] no trusted RSA public key found
for 'CN=1234abcd'

Mar  3 19:34:45 localhost charon: 06[IKE] processing INTERNAL_IP4_ADDRESS
attribute



Please let me know, how to resolve this issue.



Below post suggests that the intermediate certs need to be sent along with
the end-entity certificates in ike_auth message.

If that can solve the issue, how can I achieve that.

https://lists.strongswan.org/pipermail/users/2013-March/008956.html



Any help in this regard is appreciated.



Regards,

Sriram.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20140303/34b2cff0/attachment.html>


More information about the Users mailing list