[strongSwan] IPSEC/l2TP Chrome OS

Ilan Caspi ilan.caspi at gmail.com
Thu Feb 5 19:17:32 CET 2015


Hi,

I'm trying to connect a chromebook to Linux strongSwan
U5.1.2/K3.13.0-43-generic with not much luck.

Using a secret the connection is just fine but when moving the
authentication using a CA things are going wrong. The certs should be ok
because they work with a different connection

>From reading the logs the authentication is going well but things are
starting to go wrong here:

15[ENC] generating ID_PROT response 0 [ ID CERT CERT CERT SIG ]

15[NET] sending packet: from 162.243.137.92[4500] to 50.204.245.210[4500]
(2092 bytes)

04[NET] sending packet: from 162.243.137.92[4500] to 50.204.245.210[4500]

03[NET] received packet: from 50.204.245.210[4500] to 162.243.137.92[4500]

03[NET] waiting for data on sockets

06[NET] received packet: from 50.204.245.210[4500] to 162.243.137.92[4500]
(68 bytes)

06[ENC] invalid HASH_V1 payload length, decryption failed?

06[ENC] could not decrypt payloads

06[IKE] message parsing failed

06[IKE] ignore malformed INFORMATIONAL request

ipsec.conf

config setup

    charondebug="cfg 2, dmn 2, ike 2, net 2"

    uniqueids=never

conn %default

authby=rsasig

  leftrsasigkey=%cert

  rightrsasigkey=%cert

  keyingtries=1

  keylife=60m

  ikelifetime=240m

rightdns=8.8.8.8


conn ios

    keyexchange=ikev1

    xauth=server

    left=%defaultroute

    leftsubnet=0.0.0.0/0

    leftcert=server.pem

    right=%any

    rightid="CN=*, OU=1957, O=secretdomain.com <http://pertino.com>, C=US"

    rightsourceip=172.27.0.0/16

    rightsubnet=172.27.0.0/16

    rightauth2=xauth-noauth

    ike=aes128-sha1-modp2048,3des-sha1-modp1536

    esp=aes128-sha1-modp2048,3des-sha1-modp1536

    rekey=no

    reauth=no

    dpddelay=10

    dpdtimeout=30

    dpdaction=clear

    auto=add

    fragmentation=yes



conn chromebook

    keyexchange=ikev1

    authby=rsasig

    rekey=no

    keyingtries=2

    left=%defaultroute

    leftsubnet=0.0.0.0/0

    leftprotoport=udp/l2tp

    leftcert=server.pem

    right=%any

    rightprotoport=udp/%any

    rightrsasigkey=%cert

    rightid="CN=*, OU=1957, O= secretdomain.com <http://pertino.com>, C=US"

    auto=add

ipsec.secrets

: RSA /etc/ipsec.d/private/newserverkey.pem
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20150205/e60f941c/attachment.html>


More information about the Users mailing list