[strongSwan] Machine certificates from BB10 devices fail to connect (PSK works); ideas?

Andreas Steffen andreas.steffen at strongswan.org
Wed Mar 25 13:49:18 CET 2015


Hi Karl,

in order to find a match, the IKEv2 ID 'karl at denninger.net' must be
contained as a subjectAltName in the X.509 client certificate.
strongSwan does not do any matching to the CN= or E= fields of
the certificate's subjectDistinguishedName.

Best regards

Andreas

On 03/25/2015 05:36 AM, Karl Denninger wrote:
> I'm having a problem getting PKI-authenticated connections from BB10
> smartphones to work.
> 
> PSK-authentication works; I have the following stanza in ipsec.conf:
> 
> conn BB10
>         left=%any
>         leftsubnet=0.0.0.0/0
>         right=%any
>         rightsourceip=192.168.2.0/24
>         rightauth=psk
>         leftcert=genesis.denninger.net.crt
>         leftauth=pubkey
>         auto=add
> 
> This works fine; the proper secret is in the ipsec.secrets file.
> 
> If I change "rightauth" to "pubkey", however, and specify a client
> certificate to be sent on the client side I get this:
> 
> Mar 24 23:30:19 NewFS charon: 16[NET] sending packet: from
> 70.169.168.7[500] to 192.168.1.21[500] (333 bytes)
> Mar 24 23:30:19 NewFS charon: 16[NET] received packet: from
> 192.168.1.21[500] to 70.169.168.7[500] (2444 bytes)
> Mar 24 23:30:19 NewFS charon: 16[ENC] parsed IKE_AUTH request 1 [ IDi
> CERT CERTREQ AUTH CPRQ(ADDR MASK DNS DNS NBNS NBNS VER) N(INIT_CONTACT)
> N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
> Mar 24 23:30:19 NewFS charon: 16[IKE] received end entity cert "C=US,
> ST=Florida, O=Cuda Systems LLC, CN=Karl Denninger, E=karl at denninger.net"
> Mar 24 23:30:19 NewFS charon: 16[CFG] looking for peer configs matching
> 70.169.168.7[%any]...192.168.1.21[karl at denninger.net]
> Mar 24 23:30:19 NewFS charon: 16[CFG] selected peer config 'BB10'
> Mar 24 23:30:19 NewFS charon: 16[IKE] no trusted RSA public key found
> for 'karl at denninger.net'
> 
> The public key, however, IS in the ipsec.d/certs directory and IS
> readable.  In addition "ipsec listcacerts" does show the CA that issued
> the machine certificate.
> 
> However, "ipsec listcerts" does not display it; all it shows is the
> machine cert for the server:
> 
> [root at NewFS /usr/local/etc/ipsec.d]# ipsec listcerts
> 
> List of X.509 End Entity Certificates:
> 
>   subject:  "C=US, ST=Florida, O=Cuda Systems LLC,
> CN=genesis.denninger.net, E=postmaster at genesis.denninger.net"
>   issuer:   "C=US, ST=Florida, L=Niceville, O=Cuda Systems LLC, CN=Cuda
> Systems LLC CA, E=Cuda Systems LLC CA"
>   serial:    17
>   validity:  not before Mar 24 22:48:26 2015, ok
>              not after  Mar 21 22:48:26 2025, ok
>   pubkey:    RSA 4096 bits, has private key
>   keyid:     58:e0:39:09:a8:60:69:4e:80:4e:03:c5:03:d4:62:4d:0e:f3:80:7d
>   subjkey:   e7:7b:7c:61:2e:5e:af:06:d0:9d:ff:29:3d:12:ae:a2:61:bf:60:56
>   authkey:   24:71:9b:9d:85:7d:fc:dd:dd:bd:b0:ca:92:94:03:a1:fa:d3:6d:35
> [root at NewFS /usr/local/etc/ipsec.d]#
> 
> What am I missing?
> 
> -- 
> Karl Denninger
> karl at denninger.net <mailto:karl at denninger.net>
> /The Market Ticker/

======================================================================
Andreas Steffen                         andreas.steffen at strongswan.org
strongSwan - the Open Source VPN Solution!          www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[ITA-HSR]==

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4255 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.strongswan.org/pipermail/users/attachments/20150325/6d2e5d03/attachment.bin>


More information about the Users mailing list