[strongSwan] IKEv2 problems on iOS8

Milen Pankov mail at milen.pankov.eu
Mon Feb 23 08:05:24 CET 2015


Hi,

The problem was that I forgot to include the
ServerCertificateIssuerCommonName in the iOS profile.

Thank you for your help.

Milen



On 02/21/2015 08:17 PM, Noel Kuntze wrote:
> 
> Hello Milen,
> 
> Without any information from the iOS device, it is impossible to 
> pin down what the problem is. You might want to try sending the DN 
> of the certificate as ID and/or check the settings on your iOS 
> device. Also, checking the certificate flags might be needed.
> 
> Mit freundlichen Grüßen/Regards, Noel Kuntze
> 
> GPG Key ID: 0x63EC6658 Fingerprint: 23CA BB60 2146 05E7 7278 6592 
> 3839 298F 63EC 6658
> 
> Am 21.02.2015 um 17:03 schrieb Milen Pankov:
>> Hi,
> 
>> I have a Strongswan IKEv2 connection working on Windows clients, 
>> but failing on iOS8. I have included the CA certificate in the 
>> iOS8 configuration profile I have imported on the iOS device and 
>> the certificate is installed under Settings > General > Profiles.
>> I can't figure out what was the problem is.
> 
>> My config is:
> 
>> conn ipsec-ikev2 type=tunnel keyexchange=ikev2 left=1.2.3.4 
>> leftsubnet=0.0.0.0/0 leftauth=pubkey 
>> leftcert=co1.dir.sub.example.com.crt 
>> leftid=co1.dir.sub.example.com right=%any 
>> rightsourceip=10.1.0.0/23 rightauth=eap-radius 
>> rightsendcert=never eap_identity=%any auto=add
> 
>> Log file says:
> 
>> Feb 21 08:43:45 server1 charon: 10[NET] received packet: from 
>> 5.6.7.8[500] to 1.2.3.4[500] (284 bytes) Feb 21 08:43:45 server1 
>> charon: 10[ENC] parsed IKE_SA_INIT request 0 [ SA KE No 
>> N(NATD_S_IP) N(NATD_D_IP) ] Feb 21 08:43:45 server1 charon: 
>> 10[IKE] 5.6.7.8 is initiating an IKE_SA Feb 21 08:43:45 server1 
>> charon: 10[IKE] remote host is behind NAT Feb 21 08:43:45
>> server1 charon: 10[ENC] generating IKE_SA_INIT response 0 [ SA KE
>> No N(NATD_S_IP) N(NATD_D_IP) N(MULT_AUTH) ] Feb 21 08:43:45
>> server1 charon: 10[NET] sending packet: from 1.2.3.4[500] to
>> 5.6.7.8[500] (308 bytes) Feb 21 08:43:46 server1 charon: 13[NET]
>> received packet: from 5.6.7.8[4500] to 1.2.3.4[4500] (332 bytes)
>> Feb 21 08:43:46 server1 charon: 13[ENC] parsed IKE_AUTH request 1
>> [ IDi N(INIT_CONTACT) IDr CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6
>> DNS6) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ] Feb 21
>> 08:43:46 server1 charon: 13[CFG] looking for peer configs
>> matching 
>> 1.2.3.4[co1.dir.sub.example.com]...5.6.7.8[192.168.0.103] Feb 21 
>> 08:43:46 server1 charon: 13[CFG] selected peer config 
>> 'ipsec-ikev2' Feb 21 08:43:46 server1 charon: 13[IKE] initiating 
>> EAP_IDENTITY method (id 0x00) Feb 21 08:43:46 server1 charon: 
>> 13[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 
>> TFC padding Feb 21 08:43:46 server1 charon: 13[IKE] 
>> authentication of 'co1.dir.sub.example.com' (myself) with RSA 
>> signature successful Feb 21 08:43:46 server1 charon: 13[ENC] 
>> generating IKE_AUTH response 1 [ IDr AUTH EAP/REQ/ID ] Feb 21 
>> 08:43:46 server1 charon: 13[NET] sending packet: from 
>> 1.2.3.4[4500] to 5.6.7.8[4500] (236 bytes) Feb 21 08:44:15 
>> server1 charon: 11[JOB] deleting half open IKE_SA after timeout
> 
> 
>> Regards, Milen _______________________________________________ 
>> Users mailing list Users at lists.strongswan.org 
>> https://lists.strongswan.org/mailman/listinfo/users
> 
> 
> 
> _______________________________________________ Users mailing list
>  Users at lists.strongswan.org 
> https://lists.strongswan.org/mailman/listinfo/users
> 


More information about the Users mailing list