[strongSwan] IPSEC/l2TP Chrome OS
Ilan Caspi
ilan.caspi at gmail.com
Fri Feb 6 00:32:51 CET 2015
Hi Noel,
Unfortunately that wasn't the ticket
14[CFG] candidate "chromebook", match: 1/19/28 (me/other/ike)
14[IKE] no peer config found
14[IKE] queueing INFORMATIONAL task
14[IKE] activating new tasks
14[IKE] activating INFORMATIONAL task
14[ENC] generating INFORMATIONAL_V1 request 1417043180 [ HASH
N(AUTH_FAILED) ]
ipsec,conf
conn chromebook
keyexchange=ikev1
authby=rsasig
rekey=no
keyingtries=2
left=%defaultroute
leftsubnet=0.0.0.0/0
leftprotoport=udp/l2tp
leftcert=server.pem
right=%any
rightprotoport=udp/%any
rightrsasigkey=%cert
rightid="CN=*, OU=1957, O=mydomain.com, C=US"
auto=add
aggressive=yes
On Thu Feb 05 2015 at 1:27:22 PM Noel Kuntze <noel at familie-kuntze.de> wrote:
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> Hello Ilan,
>
> That could be the client trying to use agressive mode.
> Enable it in the conn section and see if it works with it.
>
> Mit freundlichen Grüßen/Regards,
> Noel Kuntze
>
> GPG Key ID: 0x63EC6658
> Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658
>
> Am 05.02.2015 um 19:17 schrieb Ilan Caspi:
> > Hi,
> >
> > I'm trying to connect a chromebook to Linux strongSwan
> U5.1.2/K3.13.0-43-generic with not much luck.
> >
> > Using a secret the connection is just fine but when moving the
> authentication using a CA things are going wrong. The certs should be ok
> because they work with a different connection
> >
> > From reading the logs the authentication is going well but things are
> starting to go wrong here:
> >
> > 15[ENC] generating ID_PROT response 0 [ ID CERT CERT CERT SIG ]
> >
> > 15[NET] sending packet: from 162.243.137.92[4500] to
> 50.204.245.210[4500] (2092 bytes)
> >
> > 04[NET] sending packet: from 162.243.137.92[4500] to 50.204.245.210[4500]
> >
> > 03[NET] received packet: from 50.204.245.210[4500] to
> 162.243.137.92[4500]
> >
> > 03[NET] waiting for data on sockets
> >
> > 06[NET] received packet: from 50.204.245.210[4500] to
> 162.243.137.92[4500] (68 bytes)
> >
> > 06[ENC] invalid HASH_V1 payload length, decryption failed?
> >
> > 06[ENC] could not decrypt payloads
> >
> > 06[IKE] message parsing failed
> >
> > 06[IKE] ignore malformed INFORMATIONAL request
> >
> > ipsec.conf
> >
> > config setup
> >
> > charondebug="cfg 2, dmn 2, ike 2, net 2"
> >
> > uniqueids=never
> >
> > conn %default
> >
> > authby=rsasig
> >
> > leftrsasigkey=%cert
> >
> > rightrsasigkey=%cert
> >
> > keyingtries=1
> >
> > keylife=60m
> >
> > ikelifetime=240m
> >
> > rightdns=8.8.8.8
> >
> >
> > conn ios
> >
> > keyexchange=ikev1
> >
> > xauth=server
> >
> > left=%defaultroute
> >
> > leftsubnet=0.0.0.0/0 <http://0.0.0.0/0>
> >
> > leftcert=server.pem
> >
> > right=%any
> >
> > rightid="CN=*, OU=1957, O=secretdomain.com <http://pertino.com>,
> C=US"
> >
> > rightsourceip=172.27.0.0/16 <http://172.27.0.0/16>
> >
> > rightsubnet=172.27.0.0/16 <http://172.27.0.0/16>
> >
> > rightauth2=xauth-noauth
> >
> > ike=aes128-sha1-modp2048,3des-sha1-modp1536
> >
> > esp=aes128-sha1-modp2048,3des-sha1-modp1536
> >
> > rekey=no
> >
> > reauth=no
> >
> > dpddelay=10
> >
> > dpdtimeout=30
> >
> > dpdaction=clear
> >
> > auto=add
> >
> > fragmentation=yes
> >
> >
> >
> > conn chromebook
> >
> > keyexchange=ikev1
> >
> > authby=rsasig
> >
> > rekey=no
> >
> > keyingtries=2
> >
> > left=%defaultroute
> >
> > leftsubnet=0.0.0.0/0 <http://0.0.0.0/0>
> >
> > leftprotoport=udp/l2tp
> >
> > leftcert=server.pem
> >
> > right=%any
> >
> > rightprotoport=udp/%any
> >
> > rightrsasigkey=%cert
> >
> > rightid="CN=*, OU=1957, O= secretdomain.com <http://pertino.com>,
> C=US"
> >
> > auto=add
> >
> > ipsec.secrets
> >
> > : RSA /etc/ipsec.d/private/newserverkey.pem
> >
> >
> >
> > _______________________________________________
> > Users mailing list
> > Users at lists.strongswan.org
> > https://lists.strongswan.org/mailman/listinfo/users
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2
>
> iQIcBAEBCAAGBQJU0+AqAAoJEDg5KY9j7GZYA9AP/0ufz0Ur1gbiPMPjr9xZR9w7
> ciRsuuGKZ8njpt36rGacFXDrD9X2dRtuYTa9UCkHo//e+nqZwB8JlK0f+sKePCqG
> FodwUubzmT8maARmE5x33B6O1sG8XHLdbWeNBoVY4N1Di1fjizPTqyxM1HCYZMtc
> WSN1FUQ2Rceo6NL6KGo8/IAtoIr+ovX0ok1hX5Jzd98bTUeGfcOVcedyX5auwEnZ
> efHqrkqaHwqCa6B3r/iOmDpW0A877hIYK45mBc87mF2k40l4zX97nbt/UM9BtSaX
> /xuhU4wS02HkGcSqp+z/d6CMgOsVLAjhgesyPZgzY+oNOvEHUDNOC0i5SV2uYBNY
> Z5mlL1ZPD/2fr4jDR1vfmQXiqo7jsJHdWjMT+X3zfptxDF1ek34PyyCc/fOq8zDK
> Xmk2hMi4Kr3ldE1+se8eERh7S0S1gNVrqoDkRN6OklwpwKiaJtgNT7OBZCl9Zhwn
> fuiB+0ilK6ADPtasSgw5IKXrLyNry+oh6lCHgJ2mrngfOfgxjxgoZLymMr6Ad9wC
> zgAhU+Ai4EJH3xQehfZYZV775KfDp22o5HCR/Ho2PaFuKxLnTFeXsQHltog/Jd0L
> 3seAqFSu7yEJ4DuDFzHCBiUdN9AQpYqj5fgIYbH2vo3/L7TqEDYqKUyylX3vvIYc
> 02x4JkZxJIZMAZh8yvdH
> =oI9J
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> Users mailing list
> Users at lists.strongswan.org
> https://lists.strongswan.org/mailman/listinfo/users
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20150205/a2697869/attachment-0001.html>
More information about the Users
mailing list