[strongSwan] win8 to strongswan ikev2

Christian Huldt christian at solvare.se
Thu May 21 17:53:05 CEST 2015


For the record and my fellow googlers/duckduckgoers/ixquickers the error
code (13801) is a local (win) issue, I had left out some flags
( --flag serverAuth --flag ikeIntermediate ) in the server cert
which caused windows to panic...

Den 2015-05-20 19:02, Christian Huldt skrev:
> I have a strange problem, the windows computer errors out fast saying
> "Authentication details for IKE is not being accepted" (translated from
> Swedish...), but strongswan says (ipsec status) that the connection is
> established...
> 
> I just don't understand...
> 
> 
> ipsec.conf
> 
> conn ikev2
>      left=%defaultroute
>      leftcert=ca.pem
>      leftsubnet=192.168.103.0/24
>      right=%any
>      leftsourceip=192.168.103.201
>      rightsourceip=%dhcp
>      keyexchange=ikev2
>      leftfirewall=yes
>      rightid="C=SE, O=Solvare, OU=net, CN=*"
>      dpdaction=clear
>      dpddelay=300s
>      rekey=no
>      auto=add
> 
> 
> 
> 
> 
> charon_log:
> 
> 2015-05-20 18:18 06[CFG] <2>   candidate "ikev2", match: 1/19/28
> (me/other/ike)
> 2015-05-20 18:18 06[CFG] <ikev2|2> selected peer config 'ikev2'
> 2015-05-20 18:18 06[CFG] <ikev2|2>   using certificate "C=SE, O=Solvare,
> OU=net, CN=c-dator"
> 2015-05-20 18:18 06[CFG] <ikev2|2>   certificate "C=SE, O=Solvare,
> OU=net, CN=c-dator" key: 2048 bit RSA
> 2015-05-20 18:18 06[CFG] <ikev2|2>   using trusted ca certificate "C=SE,
> O=Support, CN=Solvare CA"
> 2015-05-20 18:18 06[CFG] <ikev2|2> checking certificate status of "C=SE,
> O=Solvare, OU=net, CN=c-dator"
> 2015-05-20 18:18 06[CFG] <ikev2|2> ocsp check skipped, no ocsp found
> 2015-05-20 18:18 06[CFG] <ikev2|2> certificate status is not available
> 2015-05-20 18:18 06[CFG] <ikev2|2>   certificate "C=SE, O=Support,
> CN=Solvare CA" key: 2048 bit RSA
> 2015-05-20 18:18 06[CFG] <ikev2|2>   reached self-signed root ca with a
> path length of 0
> 2015-05-20 18:18 06[IKE] <ikev2|2> authentication of 'C=SE, O=Solvare,
> OU=net, CN=c-dator' with RSA signature successful
> 2015-05-20 18:18 06[IKE] <ikev2|2> processing INTERNAL_IP4_ADDRESS attribute
> 2015-05-20 18:18 06[IKE] <ikev2|2> processing INTERNAL_IP4_DNS attribute
> 2015-05-20 18:18 06[IKE] <ikev2|2> processing INTERNAL_IP4_NBNS attribute
> 2015-05-20 18:18 06[IKE] <ikev2|2> processing INTERNAL_IP4_SERVER attribute
> 2015-05-20 18:18 06[IKE] <ikev2|2> processing INTERNAL_IP6_ADDRESS attribute
> 2015-05-20 18:18 06[IKE] <ikev2|2> processing INTERNAL_IP6_DNS attribute
> 2015-05-20 18:18 06[IKE] <ikev2|2> processing INTERNAL_IP6_SERVER attribute
> 2015-05-20 18:18 06[IKE] <ikev2|2> peer supports MOBIKE
> 2015-05-20 18:18 06[ENC] <ikev2|2> added payload of type ID_RESPONDER to
> message
> 2015-05-20 18:18 06[ENC] <ikev2|2> added payload of type AUTH to message
> 2015-05-20 18:18 06[IKE] <ikev2|2> authentication of 'C=SE, ST=Solvare,
> O=Solvare, CN=VPN' (myself) with RSA signature successful
> 2015-05-20 18:18 06[IKE] <ikev2|2> IKE_SA ikev2[2] established between
> 37.46.166.66[C=SE, ST=Solvare, O=Solvare, CN=VPN]...46.59.24.181[C=SE,
> O=Solvare, OU=net, CN=c-dator]
> 2015-05-20 18:18 06[IKE] <ikev2|2> IKE_SA ikev2[2] state change:
> CONNECTING => ESTABLISHED
> 2015-05-20 18:18 01[JOB] next event in 29s 881ms, waiting
> 2015-05-20 18:18 06[IKE] <ikev2|2> sending end entity cert "C=SE,
> ST=Solvare, O=Solvare, CN=VPN"
> 2015-05-20 18:18 06[ENC] <ikev2|2> added payload of type CERTIFICATE to
> message
> 2015-05-20 18:18 06[IKE] <ikev2|2> peer requested virtual IP %any
> 2015-05-20 18:18 06[KNL] <ikev2|2> using 192.168.103.201 as address to
> reach 192.168.103.200/32
> 2015-05-20 18:18 06[CFG] <ikev2|2> sending DHCP DISCOVER to 192.168.103.200
> 2015-05-20 18:18 16[JOB] watched FD 21 ready to read
> 2015-05-20 18:18 16[JOB] watcher going to poll() 7 fds
> 2015-05-20 18:18 05[CFG] received DHCP ACK for 192.168.103.160
> 2015-05-20 18:18 16[JOB] watcher got notification, rebuilding
> 2015-05-20 18:18 16[JOB] watcher going to poll() 8 fds
> 2015-05-20 18:18 06[IKE] <ikev2|2> assigning virtual IP 192.168.103.160
> to peer 'C=SE, O=Solvare, OU=net, CN=c-dator'
> 2015-05-20 18:18 06[IKE] <ikev2|2> peer requested virtual IP %any6
> 2015-05-20 18:18 06[IKE] <ikev2|2> no virtual IP found for %any6
> requested by 'C=SE, O=Solvare, OU=net, CN=c-dator'
> 2015-05-20 18:18 06[IKE] <ikev2|2> building INTERNAL_IP4_DNS attribute
> 2015-05-20 18:18 16[JOB] watcher going to poll() 7 fds
> 2015-05-20 18:18 05[CFG] received DHCP ACK for 192.168.103.160
> 2015-05-20 18:18 16[JOB] watcher got notification, rebuilding
> 2015-05-20 18:18 16[JOB] watcher going to poll() 8 fds
> 2015-05-20 18:18 06[IKE] <ikev2|2> assigning virtual IP 192.168.103.160
> to peer 'C=SE, O=Solvare, OU=net, CN=c-dator'
> 2015-05-20 18:18 06[IKE] <ikev2|2> peer requested virtual IP %any6
> 2015-05-20 18:18 06[IKE] <ikev2|2> no virtual IP found for %any6
> requested by 'C=SE, O=Solvare, OU=net, CN=c-dator'
> 2015-05-20 18:18 06[IKE] <ikev2|2> building INTERNAL_IP4_DNS attribute
> 2015-05-20 18:18 06[ENC] <ikev2|2> added payload of type CONFIGURATION
> to message
> 2015-05-20 18:18 06[CFG] <ikev2|2> looking for a child config for ::/0
> 0.0.0.0/0 === ::/0 0.0.0.0/0
> 2015-05-20 18:18 06[CFG] <ikev2|2> proposing traffic selectors for us:
> 2015-05-20 18:18 06[CFG] <ikev2|2>  192.168.103.0/24
> 2015-05-20 18:18 06[CFG] <ikev2|2> proposing traffic selectors for other:
> 2015-05-20 18:18 06[CFG] <ikev2|2>  192.168.103.160/32
> 2015-05-20 18:18 06[CFG] <ikev2|2>   candidate "ikev2" with prio 1+1
> 2015-05-20 18:18 06[CFG] <ikev2|2> found matching child config "ikev2"
> with prio 2
> 2015-05-20 18:18 06[CFG] <ikev2|2> selecting proposal:
> 2015-05-20 18:18 06[CFG] <ikev2|2>   no acceptable ENCRYPTION_ALGORITHM
> found
> 2015-05-20 18:18 06[CFG] <ikev2|2> selecting proposal:
> 2015-05-20 18:18 06[CFG] <ikev2|2>   no acceptable ENCRYPTION_ALGORITHM
> found
> 2015-05-20 18:18 06[CFG] <ikev2|2> selecting proposal:
> 2015-05-20 18:18 06[CFG] <ikev2|2>   no acceptable ENCRYPTION_ALGORITHM
> found
> 2015-05-20 18:18 06[CFG] <ikev2|2> selecting proposal:
> 2015-05-20 18:18 06[CFG] <ikev2|2>   proposal matches
> 2015-05-20 18:18 06[CFG] <ikev2|2> received proposals:
> ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ,
> ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ
> 2015-05-20 18:18 06[CFG] <ikev2|2> configured proposals:
> ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ,
> ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ,
> ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
> 2015-05-20 18:18 06[CFG] <ikev2|2> selected proposal:
> ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ
> 2015-05-20 18:18 06[KNL] <ikev2|2> getting SPI for reqid {2}
> 2015-05-20 18:18 06[KNL] <ikev2|2> got SPI cf9d9615 for reqid {2}
> 2015-05-20 18:18 06[CFG] <ikev2|2> selecting traffic selectors for us:
> 2015-05-20 18:18 06[CFG] <ikev2|2>  config: 192.168.103.0/24, received:
> ::/0 => no match
> 2015-05-20 18:18 06[CFG] <ikev2|2>  config: 192.168.103.0/24, received:
> 0.0.0.0/0 => match: 192.168.103.0/24
> 2015-05-20 18:18 06[CFG] <ikev2|2> selecting traffic selectors for other:
> 2015-05-20 18:18 06[CFG] <ikev2|2>  config: 192.168.103.160/32,
> received: ::/0 => no match
> 2015-05-20 18:18 06[CFG] <ikev2|2>  config: 192.168.103.160/32,
> received: 0.0.0.0/0 => match: 192.168.103.160/32
> 2015-05-20 18:18 06[CHD] <ikev2|2>   using 3DES_CBC for encryption
> 2015-05-20 18:18 06[CHD] <ikev2|2>   using HMAC_SHA1_96 for integrity
> 2015-05-20 18:18 06[CHD] <ikev2|2> adding inbound ESP SA
> 2015-05-20 18:18 06[CHD] <ikev2|2>   SPI 0xcf9d9615, src 46.59.24.181
> dst 37.46.166.66
> 2015-05-20 18:18 06[KNL] <ikev2|2> adding SAD entry with SPI cf9d9615
> and reqid {2}  (mark 0/0x00000000)
> 2015-05-20 18:18 06[KNL] <ikev2|2>   using encryption algorithm 3DES_CBC
> with key size 192
> 2015-05-20 18:18 06[KNL] <ikev2|2>   using integrity algorithm
> HMAC_SHA1_96 with key size 160
> 2015-05-20 18:18 06[KNL] <ikev2|2>   using replay window of 32 packets
> 2015-05-20 18:18 06[CHD] <ikev2|2> adding outbound ESP SA
> 2015-05-20 18:18 06[CHD] <ikev2|2>   SPI 0x4b13e8c9, src 37.46.166.66
> dst 46.59.24.181
> 2015-05-20 18:18 06[KNL] <ikev2|2> adding SAD entry with SPI 4b13e8c9
> and reqid {2}  (mark 0/0x00000000)
> 2015-05-20 18:18 06[KNL] <ikev2|2>   using encryption algorithm 3DES_CBC
> with key size 192
> 2015-05-20 18:18 06[KNL] <ikev2|2>   using integrity algorithm
> HMAC_SHA1_96 with key size 160
> 2015-05-20 18:18 06[KNL] <ikev2|2>   using replay window of 32 packets
> 2015-05-20 18:18 06[KNL] <ikev2|2> adding policy 192.168.103.0/24 ===
> 192.168.103.160/32 out  (mark 0/0x00000000)
> 2015-05-20 18:18 06[KNL] <ikev2|2> adding policy 192.168.103.160/32 ===
> 192.168.103.0/24 in  (mark 0/0x00000000)
> 2015-05-20 18:18 06[KNL] <ikev2|2> adding policy 192.168.103.160/32 ===
> 192.168.103.0/24 fwd  (mark 0/0x00000000)
> 2015-05-20 18:18 06[KNL] <ikev2|2> getting a local address in traffic
> selector 192.168.103.0/24
> 2015-05-20 18:18 06[KNL] <ikev2|2> using host 192.168.103.201
> 2015-05-20 18:18 06[KNL] <ikev2|2> using 37.46.166.65 as nexthop to
> reach 46.59.24.181/32
> 2015-05-20 18:18 06[KNL] <ikev2|2> 37.46.166.66 is on interface enp4s1
> 2015-05-20 18:18 06[KNL] <ikev2|2> installing route: 192.168.103.160/32
> via 37.46.166.65 src 192.168.103.201 dev enp4s1
> 2015-05-20 18:18 06[KNL] <ikev2|2> getting iface index for enp4s1
> 
> 
> 
> _______________________________________________
> Users mailing list
> Users at lists.strongswan.org
> https://lists.strongswan.org/mailman/listinfo/users
> 

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 455 bytes
Desc: OpenPGP digital signature
URL: <http://lists.strongswan.org/pipermail/users/attachments/20150521/60c12642/attachment-0001.pgp>


More information about the Users mailing list