[strongSwan] IPSEC/l2TP Chrome OS
Noel Kuntze
noel at familie-kuntze.de
Thu Feb 5 22:27:10 CET 2015
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Hello Ilan,
That could be the client trying to use agressive mode.
Enable it in the conn section and see if it works with it.
Mit freundlichen Grüßen/Regards,
Noel Kuntze
GPG Key ID: 0x63EC6658
Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658
Am 05.02.2015 um 19:17 schrieb Ilan Caspi:
> Hi,
>
> I'm trying to connect a chromebook to Linux strongSwan U5.1.2/K3.13.0-43-generic with not much luck.
>
> Using a secret the connection is just fine but when moving the authentication using a CA things are going wrong. The certs should be ok because they work with a different connection
>
> From reading the logs the authentication is going well but things are starting to go wrong here:
>
> 15[ENC] generating ID_PROT response 0 [ ID CERT CERT CERT SIG ]
>
> 15[NET] sending packet: from 162.243.137.92[4500] to 50.204.245.210[4500] (2092 bytes)
>
> 04[NET] sending packet: from 162.243.137.92[4500] to 50.204.245.210[4500]
>
> 03[NET] received packet: from 50.204.245.210[4500] to 162.243.137.92[4500]
>
> 03[NET] waiting for data on sockets
>
> 06[NET] received packet: from 50.204.245.210[4500] to 162.243.137.92[4500] (68 bytes)
>
> 06[ENC] invalid HASH_V1 payload length, decryption failed?
>
> 06[ENC] could not decrypt payloads
>
> 06[IKE] message parsing failed
>
> 06[IKE] ignore malformed INFORMATIONAL request
>
> ipsec.conf
>
> config setup
>
> charondebug="cfg 2, dmn 2, ike 2, net 2"
>
> uniqueids=never
>
> conn %default
>
> authby=rsasig
>
> leftrsasigkey=%cert
>
> rightrsasigkey=%cert
>
> keyingtries=1
>
> keylife=60m
>
> ikelifetime=240m
>
> rightdns=8.8.8.8
>
>
> conn ios
>
> keyexchange=ikev1
>
> xauth=server
>
> left=%defaultroute
>
> leftsubnet=0.0.0.0/0 <http://0.0.0.0/0>
>
> leftcert=server.pem
>
> right=%any
>
> rightid="CN=*, OU=1957, O=secretdomain.com <http://pertino.com>, C=US"
>
> rightsourceip=172.27.0.0/16 <http://172.27.0.0/16>
>
> rightsubnet=172.27.0.0/16 <http://172.27.0.0/16>
>
> rightauth2=xauth-noauth
>
> ike=aes128-sha1-modp2048,3des-sha1-modp1536
>
> esp=aes128-sha1-modp2048,3des-sha1-modp1536
>
> rekey=no
>
> reauth=no
>
> dpddelay=10
>
> dpdtimeout=30
>
> dpdaction=clear
>
> auto=add
>
> fragmentation=yes
>
>
>
> conn chromebook
>
> keyexchange=ikev1
>
> authby=rsasig
>
> rekey=no
>
> keyingtries=2
>
> left=%defaultroute
>
> leftsubnet=0.0.0.0/0 <http://0.0.0.0/0>
>
> leftprotoport=udp/l2tp
>
> leftcert=server.pem
>
> right=%any
>
> rightprotoport=udp/%any
>
> rightrsasigkey=%cert
>
> rightid="CN=*, OU=1957, O= secretdomain.com <http://pertino.com>, C=US"
>
> auto=add
>
> ipsec.secrets
>
> : RSA /etc/ipsec.d/private/newserverkey.pem
>
>
>
> _______________________________________________
> Users mailing list
> Users at lists.strongswan.org
> https://lists.strongswan.org/mailman/listinfo/users
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=oI9J
-----END PGP SIGNATURE-----
More information about the Users
mailing list