[strongSwan] No trusted RSA public key

Noel Kuntze noel at familie-kuntze.de
Tue Jan 6 23:34:05 CET 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hello Justin,

Okay, I overlooked that. I looked for the certificate in the very large message (IKE_AUTH response).
Can you check if the DNS name of the server is contained in a SAN field on the server certificate? I think strongSwan requires that,
but don't nail me down on that. I do that on all my installations and it works just fine.

Did you check that all CAs in the trust chain are available in /etc/ipsec.d/cacerts/?
There is an error  message about an unknown CA in the log.

The wiki [1] states that it's possible to skip IKEv2 server authentication if you use EAP-TLS. Does your server configuration reflect this,
or did you configure it to authenticate itself using IKE and then EAP-TLS (EAP-TLS is mutual authentication)?

[1] https://wiki.strongswan.org/projects/strongswan/wiki/EapTls

Mit freundlichen Grüßen/Regards,
Noel Kuntze

GPG Key ID: 0x63EC6658
Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658

Am 06.01.2015 um 23:22 schrieb Justin Michael Schwartzbeck:
> Hi Noel,
>
> My VPN server is an IOS router with certificates configured as part of the trustpoint. You said that the server does not send its certificate. What about the message "received end entity cert "CN=my-vpn-server.company.com <http://my-vpn-server.company.com>, O=Company"" that appears above "no trusted RSA public key found for 'CN=my-vpn-server.company.com <http://my-vpn-server.company.com>, O=Company'". Is this end entity cert not the server certificate being sent? Also setting rightca to the DN of the CA certificate is not working either, same error message. According to the log, the CA certificate is being loaded correctly on the client side:
>
> Jan  6 11:18:11 my-vpn-client charon: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
> Jan  6 11:18:11 my-vpn-client charon: 00[CFG]   loaded ca certificate "C=US, ST=Colorado, L=Denver, O=Company, OU=NET, CN=Company" from '/etc/ipsec.d/cacerts/ca.crt'
>
> So the question remains, why is strongswan not verifying the server certificate by this CA?
>
> I could provide the log and config for my IOS router but I figured that would not be your area of expertise. There is no error message on the router side, only the client, so it seems the problem is with strongswan.
>
> On Tue, Jan 6, 2015 at 3:48 PM, Noel Kuntze <noel at familie-kuntze.de <mailto:noel at familie-kuntze.de>> wrote:
>
>
> Hello Justin,
>
> I looked through the log and saw that the other peer never sent his certificate.
> Please show us the log and configuraton of the server and check if the whole certificate chain from the root
> to the server certificate is available in /etc/ipsec.d/cacerts.
> I can see, that the server sends certificate requests for two CAs, one of which is unknown.
> > Jan  6 14:50:59 my-vpn-client charon: 11[IKE] received 1 cert requests for an unknown ca
>
> You might be able to work around that by setting leftsendcert=always on the server side.
>
> Also, setting rightca to the path to the servercertificate doesn't seem to have helped, as it seems strongSwan expects
> the CA certificate DN here.
>
> Mit freundlichen Grüßen/Regards,
> Noel Kuntze
>
> GPG Key ID: 0x63EC6658
> Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658
>
> Am 06.01.2015 um 22:19 schrieb Justin Michael Schwartzbeck:
> > Hi Noel,
>
> > I have tried all of those things and get the same results. Here is the log file after using your method:
>
> > Jan  6 14:50:54 my-vpn-client charon: 00[DMN] Starting IKE charon daemon (strongSwan 5.2.0, Linux 2.6.32-431.el6.x86_64, x86_64)
> > Jan  6 14:50:54 my-vpn-client charon: 00[KNL] detected Linux 2.6.32, no support for RTA_PREFSRC for IPv6 routes
> > Jan  6 14:50:54 my-vpn-client charon: 00[KNL] known interfaces and IP addresses:
> > Jan  6 14:50:54 my-vpn-client charon: 00[KNL]   lo
> > Jan  6 14:50:54 my-vpn-client charon: 00[KNL]     127.0.0.1
> > Jan  6 14:50:54 my-vpn-client charon: 00[KNL]     ::1
> > Jan  6 14:50:54 my-vpn-client charon: 00[KNL]   eth0
> > Jan  6 14:50:54 my-vpn-client charon: 00[KNL]     192.168.2.227
> > Jan  6 14:50:54 my-vpn-client charon: 00[KNL]     192.168.2.103
> > Jan  6 14:50:54 my-vpn-client charon: 00[KNL]     fe80::250:56ff:feaa:6249
> > Jan  6 14:50:54 my-vpn-client charon: 00[KNL]   eth1
> > Jan  6 14:50:54 my-vpn-client charon: 00[KNL]     fe80::250:56ff:feaa:b96
> > Jan  6 14:50:54 my-vpn-client charon: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
> > Jan  6 14:50:54 my-vpn-client charon: 00[CFG]   loaded ca certificate "C=US, ST=Colorado, L=Denver, O=Company, OU=NET, CN=Company" from '/etc/ipsec.d/cacerts/ca.crt'
> > Jan  6 14:50:54 my-vpn-client charon: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
> > Jan  6 14:50:54 my-vpn-client charon: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
> > Jan  6 14:50:54 my-vpn-client charon: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
> > Jan  6 14:50:54 my-vpn-client charon: 00[CFG] loading crls from '/etc/ipsec.d/crls'
> > Jan  6 14:50:54 my-vpn-client charon: 00[CFG] loading secrets from '/etc/ipsec.secrets'
> > Jan  6 14:50:54 my-vpn-client charon: 00[CFG]   loaded RSA private key from '/etc/ipsec.d/private/server.key'
> > Jan  6 14:50:54 my-vpn-client charon: 00[LIB] loaded plugins: charon curl aes des rc2 sha1 sha2 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem fips-prf gmp xcbc cmac hmac attr kernel-netlink resolve socket-default stroke vici updown eap-identity eap-aka eap-md5 eap-tls xauth-generic xauth-noauth lookip
> > Jan  6 14:50:54 my-vpn-client charon: 00[LIB] unable to load 6 plugin features (6 due to unmet dependencies)
> > Jan  6 14:50:54 my-vpn-client charon: 00[JOB] spawning 16 worker threads
> > Jan  6 14:50:54 my-vpn-client charon: 02[NET] waiting for data on sockets
> > Jan  6 14:50:54 my-vpn-client charon: 05[CFG] received stroke: add connection 'client-ha'
> > Jan  6 14:50:59 my-vpn-client charon: 05[KNL] 192.168.2.213 is not a local address or the interface is down
> > Jan  6 14:50:59 my-vpn-client charon: 05[CFG]   loaded certificate "CN=my-vpn-client.company.com <http://my-vpn-client.company.com> <http://my-vpn-client.company.com>, O=Company" from 'server.crt'
> > Jan  6 14:50:59 my-vpn-client charon: 05[CFG]   id 'my-vpn-client.company.com <http://my-vpn-client.company.com> <http://my-vpn-client.company.com>' not confirmed by certificate, defaulting to 'CN=my-vpn-client.company.com <http://my-vpn-client.company.com> <http://my-vpn-client.company.com>, O=Company'
> > Jan  6 14:50:59 my-vpn-client charon: 05[CFG]   loaded certificate "CN=my-vpn-server.company.com <http://my-vpn-server.company.com> <http://my-vpn-server.company.com>, O=Company" from '/etc/ipsec.d/certs/cws.crt'
> > Jan  6 14:50:59 my-vpn-client charon: 05[CFG]   id '%any' not confirmed by certificate, defaulting to 'CN=my-vpn-server.company.com <http://my-vpn-server.company.com> <http://my-vpn-server.company.com>, O=Company'
> > Jan  6 14:50:59 my-vpn-client charon: 05[CFG] CA certificate "/etc/ipsec.d/cacerts/ca.crt" not found, discarding CA constraint
> > Jan  6 14:50:59 my-vpn-client charon: 05[CFG] added configuration 'client-ha'
> > Jan  6 14:50:59 my-vpn-client charon: 07[CFG] received stroke: initiate 'client-ha'
> > Jan  6 14:50:59 my-vpn-client charon: 09[MGR] checkout IKE_SA by config
> > Jan  6 14:50:59 my-vpn-client charon: 09[MGR] created IKE_SA (unnamed)[1]
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE] queueing IKE_VENDOR task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE] queueing IKE_INIT task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE] queueing IKE_NATD task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE] queueing IKE_CERT_PRE task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE] queueing IKE_AUTH task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE] queueing IKE_CERT_POST task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE] queueing IKE_CONFIG task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE] queueing IKE_AUTH_LIFETIME task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE] queueing IKE_MOBIKE task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE] queueing CHILD_CREATE task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE] activating new tasks
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE]   activating IKE_VENDOR task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE]   activating IKE_INIT task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE]   activating IKE_NATD task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE]   activating IKE_CERT_PRE task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE]   activating IKE_AUTH task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE]   activating IKE_CERT_POST task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE]   activating IKE_CONFIG task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE]   activating CHILD_CREATE task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE]   activating IKE_AUTH_LIFETIME task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE]   activating IKE_MOBIKE task
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE] initiating IKE_SA client-ha[1] to 192.168.2.213
> > Jan  6 14:50:59 my-vpn-client charon: 09[IKE] IKE_SA client-ha[1] state change: CREATED => CONNECTING
> > Jan  6 14:50:59 my-vpn-client charon: 09[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
> > Jan  6 14:50:59 my-vpn-client charon: 09[NET] sending packet: from 192.168.2.227[500] to 192.168.2.213[500] (708 bytes)
> > Jan  6 14:50:59 my-vpn-client charon: 09[MGR] checkin IKE_SA client-ha[1]
> > Jan  6 14:50:59 my-vpn-client charon: 03[NET] sending packet: from 192.168.2.227[500] to 192.168.2.213[500]
> > Jan  6 14:50:59 my-vpn-client charon: 02[NET] received packet: from 192.168.2.213[500] to 192.168.2.227[500]
> > Jan  6 14:50:59 my-vpn-client charon: 02[NET] waiting for data on sockets
> > Jan  6 14:50:59 my-vpn-client charon: 10[MGR] checkout IKE_SA by message
> > Jan  6 14:50:59 my-vpn-client charon: 10[MGR] IKE_SA client-ha[1] successfully checked out
> > Jan  6 14:50:59 my-vpn-client charon: 10[NET] received packet: from 192.168.2.213[500] to 192.168.2.227[500] (38 bytes)
> > Jan  6 14:50:59 my-vpn-client charon: 10[ENC] parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
> > Jan  6 14:50:59 my-vpn-client charon: 10[IKE] peer didn't accept DH group MODP_2048, it requested MODP_1024
> > Jan  6 14:50:59 my-vpn-client charon: 10[IKE] IKE_SA client-ha[1] state change: CONNECTING => CREATED
> > Jan  6 14:50:59 my-vpn-client charon: 10[IKE] activating new tasks
> > Jan  6 14:50:59 my-vpn-client charon: 10[IKE]   activating IKE_INIT task
> > Jan  6 14:50:59 my-vpn-client charon: 10[IKE]   activating IKE_NATD task
> > Jan  6 14:50:59 my-vpn-client charon: 10[IKE]   activating IKE_CERT_PRE task
> > Jan  6 14:50:59 my-vpn-client charon: 10[IKE]   activating IKE_AUTH task
> > Jan  6 14:50:59 my-vpn-client charon: 10[IKE]   activating IKE_CERT_POST task
> > Jan  6 14:50:59 my-vpn-client charon: 10[IKE]   activating IKE_CONFIG task
> > Jan  6 14:50:59 my-vpn-client charon: 10[IKE]   activating CHILD_CREATE task
> > Jan  6 14:50:59 my-vpn-client charon: 10[IKE]   activating IKE_AUTH_LIFETIME task
> > Jan  6 14:50:59 my-vpn-client charon: 10[IKE]   activating IKE_MOBIKE task
> > Jan  6 14:50:59 my-vpn-client charon: 10[IKE] initiating IKE_SA client-ha[1] to 192.168.2.213
> > Jan  6 14:50:59 my-vpn-client charon: 10[IKE] IKE_SA client-ha[1] state change: CREATED => CONNECTING
> > Jan  6 14:50:59 my-vpn-client charon: 10[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
> > Jan  6 14:50:59 my-vpn-client charon: 10[NET] sending packet: from 192.168.2.227[500] to 192.168.2.213[500] (580 bytes)
> > Jan  6 14:50:59 my-vpn-client charon: 10[MGR] checkin IKE_SA client-ha[1]
> > Jan  6 14:50:59 my-vpn-client charon: 10[MGR] check-in of IKE_SA successful.
> > Jan  6 14:50:59 my-vpn-client charon: 03[NET] sending packet: from 192.168.2.227[500] to 192.168.2.213[500]
> > Jan  6 14:50:59 my-vpn-client charon: 02[NET] received packet: from 192.168.2.213[500] to 192.168.2.227[500]
> > Jan  6 14:50:59 my-vpn-client charon: 02[NET] waiting for data on sockets
> > Jan  6 14:50:59 my-vpn-client charon: 11[MGR] checkout IKE_SA by message
> > Jan  6 14:50:59 my-vpn-client charon: 11[MGR] IKE_SA client-ha[1] successfully checked out
> > Jan  6 14:50:59 my-vpn-client charon: 11[NET] received packet: from 192.168.2.213[500] to 192.168.2.227[500] (381 bytes)
> > Jan  6 14:50:59 my-vpn-client charon: 11[ENC] parsed IKE_SA_INIT response 0 [ SA KE No V V N(NATD_S_IP) N(NATD_D_IP) CERTREQ ]
> > Jan  6 14:50:59 my-vpn-client charon: 11[IKE] received cert request for unknown ca with keyid 4e:e1:18:20:b8:6b:65:0e:f3:40:51:73:88:dd:fe:d2:91:52:11:c0
> > Jan  6 14:50:59 my-vpn-client charon: 11[IKE] received cert request for "C=US, ST=Colorado, L=Denver, O=Company, OU=NET, CN=Company"
> > Jan  6 14:50:59 my-vpn-client charon: 11[IKE] received 1 cert requests for an unknown ca
> > Jan  6 14:50:59 my-vpn-client charon: 11[IKE] reinitiating already active tasks
> > Jan  6 14:50:59 my-vpn-client charon: 11[IKE]   IKE_CERT_PRE task
> > Jan  6 14:50:59 my-vpn-client charon: 11[IKE]   IKE_AUTH task
> > Jan  6 14:50:59 my-vpn-client charon: 11[IKE] sending cert request for "C=US, ST=Colorado, L=Denver, O=Company, OU=NET, CN=Company"
> > Jan  6 14:50:59 my-vpn-client charon: 11[IKE] building INTERNAL_IP4_DNS attribute
> > Jan  6 14:50:59 my-vpn-client charon: 11[IKE] establishing CHILD_SA client-ha
> > Jan  6 14:50:59 my-vpn-client charon: 11[KNL] getting SPI for reqid {1}
> > Jan  6 14:50:59 my-vpn-client charon: 11[KNL] got SPI c837be50 for reqid {1}
> > Jan  6 14:50:59 my-vpn-client charon: 11[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ IDr CPRQ(ADDR DNS) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(EAP_ONLY) ]
> > Jan  6 14:50:59 my-vpn-client charon: 11[NET] sending packet: from 192.168.2.227[4500] to 192.168.2.213[4500] (492 bytes)
> > Jan  6 14:50:59 my-vpn-client charon: 11[MGR] checkin IKE_SA client-ha[1]
> > Jan  6 14:50:59 my-vpn-client charon: 11[MGR] check-in of IKE_SA successful.
> > Jan  6 14:50:59 my-vpn-client charon: 03[NET] sending packet: from 192.168.2.227[4500] to 192.168.2.213[4500]
> > Jan  6 14:50:59 my-vpn-client charon: 02[NET] received packet: from 192.168.2.213[4500] to 192.168.2.227[4500]
> > Jan  6 14:50:59 my-vpn-client charon: 02[NET] waiting for data on sockets
> > Jan  6 14:50:59 my-vpn-client charon: 12[MGR] checkout IKE_SA by message
> > Jan  6 14:50:59 my-vpn-client charon: 12[MGR] IKE_SA client-ha[1] successfully checked out
> > Jan  6 14:50:59 my-vpn-client charon: 12[NET] received packet: from 192.168.2.213[4500] to 192.168.2.227[4500] (972 bytes)
> > Jan  6 14:50:59 my-vpn-client charon: 12[ENC] parsed IKE_AUTH response 1 [ V IDr CERT AUTH EAP/REQ/ID ]
> > Jan  6 14:50:59 my-vpn-client charon: 12[IKE] received end entity cert "CN=my-vpn-server.company.com <http://my-vpn-server.company.com> <http://my-vpn-server.company.com>, O=Company"
> > Jan  6 14:50:59 my-vpn-client charon: 12[IKE] no trusted RSA public key found for 'CN=my-vpn-server.company.com <http://my-vpn-server.company.com> <http://my-vpn-server.company.com>, O=Company'
> > Jan  6 14:50:59 my-vpn-client charon: 12[ENC] generating INFORMATIONAL request 2 [ N(AUTH_FAILED) ]
> > Jan  6 14:50:59 my-vpn-client charon: 12[NET] sending packet: from 192.168.2.227[4500] to 192.168.2.213[4500] (76 bytes)
> > Jan  6 14:50:59 my-vpn-client charon: 12[KNL] deleting SAD entry with SPI c837be50  (mark 0/0x00000000)
> > Jan  6 14:50:59 my-vpn-client charon: 03[NET] sending packet: from 192.168.2.227[4500] to 192.168.2.213[4500]
> > Jan  6 14:50:59 my-vpn-client charon: 12[KNL] deleted SAD entry with SPI c837be50 (mark 0/0x00000000)
> > Jan  6 14:50:59 my-vpn-client charon: 12[MGR] checkin and destroy IKE_SA client-ha[1]
> > Jan  6 14:50:59 my-vpn-client charon: 12[IKE] IKE_SA client-ha[1] state change: CONNECTING => DESTROYING
> > Jan  6 14:50:59 my-vpn-client charon: 12[MGR] check-in and destroy of IKE_SA successful
>
>
> > On Tue, Jan 6, 2015 at 2:48 PM, Noel Kuntze <noel at familie-kuntze.de <mailto:noel at familie-kuntze.de> <mailto:noel at familie-kuntze.de <mailto:noel at familie-kuntze.de>>> wrote:
>
>
> > Hello Justin,
>
> > Set rightca to the DN of the CA certificate or to the file name or file path of the Ca certificate.
> > As an alternative, you can get a copy of the server's certificate and do the same for rightcert.
>
> > Mit freundlichen Grüßen/Regards,
> > Noel Kuntze
>
> > GPG Key ID: 0x63EC6658
> > Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658
>
> > Am 06.01.2015 um 21:23 schrieb Justin Michael Schwartzbeck:
> > > Hello,
>
> > > I am trying to set up a strongswan client to connect to a VPN endpoint. Here is my configuration:
>
> > > # ipsec.conf - strongSwan IPsec configuration file
> > > config setup
> > >                charondebug="ike 2, knl 2, mgr 2, net 2"
> > > ca main
> > >                cacert=ca.crt
> > > conn client-ha
> > >      aaa_identity="CN=my-radius-server.company.com <http://my-radius-server.company.com> <http://my-radius-server.company.com> <http://my-radius-server.company.com>, O=Company"
> > >      keyexchange=ikev2
> > >      right=my-vpn-server.company.com <http://my-vpn-server.company.com> <http://my-vpn-server.company.com> <http://my-vpn-server.company.com>
> > >      rightid=%any
> > >      rightsubnet=0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>
> > >      leftsourceip=%config
> > >      leftsubnet=0.0.0.0/0 <http://0.0.0.0/0> <http://0.0.0.0/0> <http://0.0.0.0/0>
> > >      leftauth=eap-tls
> > >      left=10.89.150.227
> > >      leftid="my-radius-client.company.com <http://my-radius-client.company.com> <http://my-radius-client.company.com> <http://my-radius-client.company.com>"
> > >      leftcert=server.crt
> > >      auto=add
>
> > > I have my ca.crt in /etc/ipsec.d/cacerts, my client certificate (server.crt) in /etc/ipsec.d/certs, and my client key (server.key) in /etc/ipsec.d/private. I also have the server.key listed in /etc/ipsec.secrets. My strongswan client's certificate and my vpn endpoint's certificate are both signed by the same CA. I have checked the vpn's cert against the ca.crt on my strongswan client to make sure that it was properly signed. However for some reason my strongswan client is not verifying the VPN's certificate. Below is the complete error output starting with an "ipsec restart" and then followed by an "ipsec up" on that profile:
>
> > > Jan  6 11:18:11 my-vpn-client charon: 00[DMN] Starting IKE charon daemon (strongSwan 5.2.0, Linux 2.6.32-431.el6.x86_64, x86_64)
> > > Jan  6 11:18:11 my-vpn-client charon: 00[KNL] detected Linux 2.6.32, no support for RTA_PREFSRC for IPv6 routes
> > > Jan  6 11:18:11 my-vpn-client charon: 00[KNL] known interfaces and IP addresses:
> > > Jan  6 11:18:11 my-vpn-client charon: 00[KNL]   lo
> > > Jan  6 11:18:11 my-vpn-client charon: 00[KNL]     127.0.0.1
> > > Jan  6 11:18:11 my-vpn-client charon: 00[KNL]     ::1
> > > Jan  6 11:18:11 my-vpn-client charon: 00[KNL]   eth0
> > > Jan  6 11:18:11 my-vpn-client charon: 00[KNL]     192.168.2.227
> > > Jan  6 11:18:11 my-vpn-client charon: 00[KNL]     192.168.2.103
> > > Jan  6 11:18:11 my-vpn-client charon: 00[KNL]     fe80::250:56ff:feaa:6249
> > > Jan  6 11:18:11 my-vpn-client charon: 00[KNL]   eth1
> > > Jan  6 11:18:11 my-vpn-client charon: 00[KNL]     fe80::250:56ff:feaa:b96
> > > Jan  6 11:18:11 my-vpn-client charon: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
> > > Jan  6 11:18:11 my-vpn-client charon: 00[CFG]   loaded ca certificate "C=US, ST=Colorado, L=Denver, O=Company, OU=NET, CN=Company" from '/etc/ipsec.d/cacerts/ca.crt'
> > > Jan  6 11:18:11 my-vpn-client charon: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
> > > Jan  6 11:18:11 my-vpn-client charon: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
> > > Jan  6 11:18:11 my-vpn-client charon: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
> > > Jan  6 11:18:11 my-vpn-client charon: 00[CFG] loading crls from '/etc/ipsec.d/crls'
> > > Jan  6 11:18:11 my-vpn-client charon: 00[CFG] loading secrets from '/etc/ipsec.secrets'
> > > Jan  6 11:18:11 my-vpn-client charon: 00[CFG]   loaded RSA private key from '/etc/ipsec.d/private/server.key'
> > > Jan  6 11:18:11 my-vpn-client charon: 00[LIB] loaded plugins: charon curl aes des rc2 sha1 sha2 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem fips-prf gmp xcbc cmac hmac attr kernel-netlink resolve socket-default stroke vici updown eap-identity eap-aka eap-md5 eap-tls xauth-generic xauth-noauth lookip
> > > Jan  6 11:18:11 my-vpn-client charon: 00[LIB] unable to load 6 plugin features (6 due to unmet dependencies)
> > > Jan  6 11:18:11 my-vpn-client charon: 00[JOB] spawning 16 worker threads
> > > Jan  6 11:18:11 my-vpn-client charon: 02[NET] waiting for data on sockets
> > > Jan  6 11:18:11 my-vpn-client charon: 04[CFG] received stroke: add connection 'client-ha'
> > > Jan  6 11:18:11 my-vpn-client charon: 04[KNL] 192.168.2.213 is not a local address or the interface is down
> > > Jan  6 11:18:11 my-vpn-client charon: 04[CFG]   loaded certificate "CN=my-vpn-client.company.com <http://my-vpn-client.company.com> <http://my-vpn-client.company.com> <http://my-vpn-client.company.com>, O=Company" from 'server.crt'
> > > Jan  6 11:18:11 my-vpn-client charon: 04[CFG]   id 'my-vpn-client.company.com <http://my-vpn-client.company.com> <http://my-vpn-client.company.com> <http://my-vpn-client.company.com>' not confirmed by certificate, defaulting to 'CN=my-vpn-client.company.com <http://my-vpn-client.company.com> <http://my-vpn-client.company.com> <http://my-vpn-client.company.com>, O=Company'
> > > Jan  6 11:18:11 my-vpn-client charon: 04[CFG] added configuration 'client-ha'
> > > Jan  6 11:18:31 my-vpn-client charon: 06[CFG] received stroke: initiate 'client-ha'
> > > Jan  6 11:18:31 my-vpn-client charon: 08[MGR] checkout IKE_SA by config
> > > Jan  6 11:18:31 my-vpn-client charon: 08[MGR] created IKE_SA (unnamed)[1]
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE] queueing IKE_VENDOR task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE] queueing IKE_INIT task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE] queueing IKE_NATD task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE] queueing IKE_CERT_PRE task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE] queueing IKE_AUTH task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE] queueing IKE_CERT_POST task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE] queueing IKE_CONFIG task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE] queueing IKE_AUTH_LIFETIME task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE] queueing IKE_MOBIKE task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE] queueing CHILD_CREATE task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE] activating new tasks
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE]   activating IKE_VENDOR task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE]   activating IKE_INIT task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE]   activating IKE_NATD task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE]   activating IKE_CERT_PRE task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE]   activating IKE_AUTH task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE]   activating IKE_CERT_POST task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE]   activating IKE_CONFIG task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE]   activating CHILD_CREATE task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE]   activating IKE_AUTH_LIFETIME task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE]   activating IKE_MOBIKE task
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE] initiating IKE_SA client-ha[1] to 192.168.2.213
> > > Jan  6 11:18:31 my-vpn-client charon: 08[IKE] IKE_SA client-ha[1] state change: CREATED => CONNECTING
> > > Jan  6 11:18:31 my-vpn-client charon: 08[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
> > > Jan  6 11:18:31 my-vpn-client charon: 08[NET] sending packet: from 192.168.2.227[500] to 192.168.2.213[500] (708 bytes)
> > > Jan  6 11:18:31 my-vpn-client charon: 08[MGR] checkin IKE_SA client-ha[1]
> > > Jan  6 11:18:31 my-vpn-client charon: 03[NET] sending packet: from 192.168.2.227[500] to 192.168.2.213[500]
> > > Jan  6 11:18:31 my-vpn-client charon: 02[NET] received packet: from 192.168.2.213[500] to 192.168.2.227[500]
> > > Jan  6 11:18:31 my-vpn-client charon: 02[NET] waiting for data on sockets
> > > Jan  6 11:18:31 my-vpn-client charon: 09[MGR] checkout IKE_SA by message
> > > Jan  6 11:18:31 my-vpn-client charon: 09[MGR] IKE_SA client-ha[1] successfully checked out
> > > Jan  6 11:18:31 my-vpn-client charon: 09[NET] received packet: from 192.168.2.213[500] to 192.168.2.227[500] (38 bytes)
> > > Jan  6 11:18:31 my-vpn-client charon: 09[ENC] parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
> > > Jan  6 11:18:31 my-vpn-client charon: 09[IKE] peer didn't accept DH group MODP_2048, it requested MODP_1024
> > > Jan  6 11:18:31 my-vpn-client charon: 09[IKE] IKE_SA client-ha[1] state change: CONNECTING => CREATED
> > > Jan  6 11:18:31 my-vpn-client charon: 09[IKE] activating new tasks
> > > Jan  6 11:18:31 my-vpn-client charon: 09[IKE]   activating IKE_INIT task
> > > Jan  6 11:18:31 my-vpn-client charon: 09[IKE]   activating IKE_NATD task
> > > Jan  6 11:18:31 my-vpn-client charon: 09[IKE]   activating IKE_CERT_PRE task
> > > Jan  6 11:18:31 my-vpn-client charon: 09[IKE]   activating IKE_AUTH task
> > > Jan  6 11:18:31 my-vpn-client charon: 09[IKE]   activating IKE_CERT_POST task
> > > Jan  6 11:18:31 my-vpn-client charon: 09[IKE]   activating IKE_CONFIG task
> > > Jan  6 11:18:31 my-vpn-client charon: 09[IKE]   activating CHILD_CREATE task
> > > Jan  6 11:18:31 my-vpn-client charon: 09[IKE]   activating IKE_AUTH_LIFETIME task
> > > Jan  6 11:18:31 my-vpn-client charon: 09[IKE]   activating IKE_MOBIKE task
> > > Jan  6 11:18:31 my-vpn-client charon: 09[IKE] initiating IKE_SA client-ha[1] to 192.168.2.213
> > > Jan  6 11:18:31 my-vpn-client charon: 09[IKE] IKE_SA client-ha[1] state change: CREATED => CONNECTING
> > > Jan  6 11:18:31 my-vpn-client charon: 09[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
> > > Jan  6 11:18:31 my-vpn-client charon: 09[NET] sending packet: from 192.168.2.227[500] to 192.168.2.213[500] (580 bytes)
> > > Jan  6 11:18:31 my-vpn-client charon: 09[MGR] checkin IKE_SA client-ha[1]
> > > Jan  6 11:18:31 my-vpn-client charon: 09[MGR] check-in of IKE_SA successful.
> > > Jan  6 11:18:31 my-vpn-client charon: 03[NET] sending packet: from 192.168.2.227[500] to 192.168.2.213[500]
> > > Jan  6 11:18:31 my-vpn-client charon: 02[NET] received packet: from 192.168.2.213[500] to 192.168.2.227[500]
> > > Jan  6 11:18:31 my-vpn-client charon: 02[NET] waiting for data on sockets
> > > Jan  6 11:18:31 my-vpn-client charon: 10[MGR] checkout IKE_SA by message
> > > Jan  6 11:18:31 my-vpn-client charon: 10[MGR] IKE_SA client-ha[1] successfully checked out
> > > Jan  6 11:18:31 my-vpn-client charon: 10[NET] received packet: from 192.168.2.213[500] to 192.168.2.227[500] (381 bytes)
> > > Jan  6 11:18:31 my-vpn-client charon: 10[ENC] parsed IKE_SA_INIT response 0 [ SA KE No V V N(NATD_S_IP) N(NATD_D_IP) CERTREQ ]
> > > Jan  6 11:18:31 my-vpn-client charon: 10[IKE] received cert request for unknown ca with keyid 4e:e1:18:20:b8:6b:65:0e:f3:40:51:73:88:dd:fe:d2:91:52:11:c0
> > > Jan  6 11:18:31 my-vpn-client charon: 10[IKE] received cert request for "C=US, ST=Colorado, L=Denver, O=Company, OU=NET, CN=Company"
> > > Jan  6 11:18:31 my-vpn-client charon: 10[IKE] received 1 cert requests for an unknown ca
> > > Jan  6 11:18:31 my-vpn-client charon: 10[IKE] reinitiating already active tasks
> > > Jan  6 11:18:31 my-vpn-client charon: 10[IKE]   IKE_CERT_PRE task
> > > Jan  6 11:18:31 my-vpn-client charon: 10[IKE]   IKE_AUTH task
> > > Jan  6 11:18:31 my-vpn-client charon: 10[IKE] sending cert request for "C=US, ST=Colorado, L=Denver, O=Company, OU=NET, CN=Company"
> > > Jan  6 11:18:31 my-vpn-client charon: 10[IKE] building INTERNAL_IP4_DNS attribute
> > > Jan  6 11:18:31 my-vpn-client charon: 10[IKE] establishing CHILD_SA client-ha
> > > Jan  6 11:18:31 my-vpn-client charon: 10[KNL] getting SPI for reqid {1}
> > > Jan  6 11:18:31 my-vpn-client charon: 10[KNL] got SPI ccd30cb7 for reqid {1}
> > > Jan  6 11:18:31 my-vpn-client charon: 10[ENC] generating IKE_AUTH request 1 [ IDi CERTREQ CPRQ(ADDR DNS) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(EAP_ONLY) ]
> > > Jan  6 11:18:31 my-vpn-client charon: 10[NET] sending packet: from 192.168.2.227[4500] to 192.168.2.213[4500] (428 bytes)
> > > Jan  6 11:18:31 my-vpn-client charon: 10[MGR] checkin IKE_SA client-ha[1]
> > > Jan  6 11:18:31 my-vpn-client charon: 10[MGR] check-in of IKE_SA successful.
> > > Jan  6 11:18:31 my-vpn-client charon: 03[NET] sending packet: from 192.168.2.227[4500] to 192.168.2.213[4500]
> > > Jan  6 11:18:31 my-vpn-client charon: 02[NET] received packet: from 192.168.2.213[4500] to 192.168.2.227[4500]
> > > Jan  6 11:18:31 my-vpn-client charon: 02[NET] waiting for data on sockets
> > > Jan  6 11:18:31 my-vpn-client charon: 11[MGR] checkout IKE_SA by message
> > > Jan  6 11:18:31 my-vpn-client charon: 11[MGR] IKE_SA client-ha[1] successfully checked out
> > > Jan  6 11:18:31 my-vpn-client charon: 11[NET] received packet: from 192.168.2.213[4500] to 192.168.2.227[4500] (956 bytes)
> > > Jan  6 11:18:31 my-vpn-client charon: 11[ENC] parsed IKE_AUTH response 1 [ V IDr CERT AUTH EAP/REQ/ID ]
> > > Jan  6 11:18:31 my-vpn-client charon: 11[IKE] received end entity cert "CN=my-vpn-server.company.com <http://my-vpn-server.company.com> <http://my-vpn-server.company.com> <http://my-vpn-server.company.com>, O=Company"
> > > Jan  6 11:18:31 my-vpn-client charon: 11[IKE] no trusted RSA public key found for 'my-vpn-server.company.com <http://my-vpn-server.company.com> <http://my-vpn-server.company.com> <http://my-vpn-server.company.com>'
> > > Jan  6 11:18:31 my-vpn-client charon: 11[ENC] generating INFORMATIONAL request 2 [ N(AUTH_FAILED) ]
> > > Jan  6 11:18:31 my-vpn-client charon: 11[NET] sending packet: from 192.168.2.227[4500] to 192.168.2.213[4500] (76 bytes)
> > > Jan  6 11:18:31 my-vpn-client charon: 11[KNL] deleting SAD entry with SPI ccd30cb7  (mark 0/0x00000000)
> > > Jan  6 11:18:31 my-vpn-client charon: 03[NET] sending packet: from 192.168.2.227[4500] to 192.168.2.213[4500]
> > > Jan  6 11:18:31 my-vpn-client charon: 11[KNL] deleted SAD entry with SPI ccd30cb7 (mark 0/0x00000000)
> > > Jan  6 11:18:31 my-vpn-client charon: 11[MGR] checkin and destroy IKE_SA client-ha[1]
> > > Jan  6 11:18:31 my-vpn-client charon: 11[IKE] IKE_SA client-ha[1] state change: CONNECTING => DESTROYING
> > > Jan  6 11:18:31 my-vpn-client charon: 11[MGR] check-in and destroy of IKE_SA successful
> > > Jan  6 11:18:35 my-vpn-client charon: 12[MGR] checkout IKE_SA
> > > Jan  6 11:18:35 my-vpn-client charon: 13[MGR] checkout IKE_SA
> > > Jan  6 11:18:35 my-vpn-client charon: 14[MGR] checkout IKE_SA
>
> > > The important failure message here is "no trusted RSA public key found for 'my-vpn-server.company.com <http://my-vpn-server.company.com> <http://my-vpn-server.company.com> <http://my-vpn-server.company.com>'". I have also tried setting the eap identity in the vpn endpoint to the full DN in the server certificate but that didn't work either. I don't understand why this would be failing if the certificate is properly signed by the CA. Can someone tell me if I am missing something?
>
> > > Thanks for the help.
> > > -Justin
>
>
> > > _______________________________________________
> > > Users mailing list
> > > Users at lists.strongswan.org <mailto:Users at lists.strongswan.org> <mailto:Users at lists.strongswan.org <mailto:Users at lists.strongswan.org>>
> > > https://lists.strongswan.org/mailman/listinfo/users
>
>
> >     _______________________________________________
> >     Users mailing list
> >     Users at lists.strongswan.org <mailto:Users at lists.strongswan.org> <mailto:Users at lists.strongswan.org <mailto:Users at lists.strongswan.org>>
> >     https://lists.strongswan.org/mailman/listinfo/users
>
>
>
>
>     _______________________________________________
>     Users mailing list
>     Users at lists.strongswan.org <mailto:Users at lists.strongswan.org>
>     https://lists.strongswan.org/mailman/listinfo/users
>
>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=jg0y
-----END PGP SIGNATURE-----




More information about the Users mailing list