[strongSwan] [strongSw an] AES_CCM_16 not supported error

Noel Kuntze noel at familie-kuntze.de
Tue May 26 12:57:45 CEST 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hello,

Check what charon tells you about loading the plugins. That is somewhere at the top of the log, when charon starts.

Mit freundlichen Grüßen/Kind Regards,
Noel Kuntze

GPG Key ID: 0x63EC6658
Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658

Am 26.05.2015 um 12:48 schrieb prasobh.s25 at wipro.com:
> Hi Noel,
> Thanks for the pointer! How to find out whether crypto plug in enabled (using ipsec listalgs? )  ?
>
>                 I have enabled both ccm and gcm plugins while compiling strongswan but both of them are not loaded while running strongswan. Its missing in the “loaded plugins:” section seen we enter the command “ipsec statusall”.
> I put “charondebug=lib 4” to increase the log level and found that both the ccm and gcm plugins are not loaded . Iam using strongswan 5.0.0 . Also, when I enter “ipsec listalgs” command after running ipsec the “aead:” section is empty. What am I doing wrong ?? Is there some extra configuration to be done in strongswan.conf ?? Attaching the strongswan.conf file.
>
> Best Regards,
> Prasobh
>
> -----Original Message-----
> From: Noel Kuntze [mailto:noel at familie-kuntze.de]
> Sent: 16 May 2015 11:50
> To: Prasobh S (WT01 - Global Media & Telecom); users at lists.strongswan.org
> Subject: Re: [strongSwan] AES_CCM_16 not supported error
>
>
> Hello Prasobh,
>
> Make sure you have a crypto plugin loaded that provides that algorithm.
> Check the available algorithms for IKE with "ipsec listalgs".
>
> Mit freundlichen Grüßen/Kind Regards,
> Noel Kuntze
>
> GPG Key ID: 0x63EC6658
> Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658
>
> Am 15.05.2015 um 13:26 schrieb prasobh.s25 at wipro.com:
>
> > Dear All,
>
>
>
> > I am getting following error while trying aes128ccm128 encryption algorithm on strongswan version 5.0.0
>
>
>
> > /Received proposals: IKE: AES_CCM_16_128/PRF_HMAC_SHA1/MODP_768/
>
> > /Configured proposals: IKE:AES_CCM_16_128/3DES_CBC/HMAC_SHA1_96/HMAC_SHA2_512_256/ PRF_HMAC_SHA1/MODP_768/
>
> > /Selected proposals: IKE:AES_CCM_16_128/ PRF_HMAC_SHA1/MODP_768/
>
> > /Shared Diffie Hellman secret => 96 bytes @ 0xae401448/
>
> > /SKEYSEED => 20 bytes @ 0xae400cf0/
>
> > /Sk_d Secret => 20 bytes @ 0xae400cf0/
>
> > /ENCRYPTION_ALGORITHM AES_CCM_16 (key size 16) not supported!/
>
> > /Key derivation failed/
>
>
>
>
>
> > Can anyone help to find out what could be the issue ?
>
>
>
> > Thanks and Regards,
>
> > Prasobh
>
> > The information contained in this electronic message and any attachments to this message are intended for the exclusive use of the addressee(s) and may contain proprietary, confidential or privileged information. If you are not the intended recipient, you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately and destroy all copies of this message and any attachments. WARNING: Computer viruses can be transmitted via email. The recipient should check this email and any attachments for the presence of viruses. The company accepts no liability for any damage caused by any virus transmitted by this email. www.wipro.com
>
>
> > _______________________________________________
> > Users mailing list
> > Users at lists.strongswan.org
> > https://lists.strongswan.org/mailman/listinfo/users
>
>
> The information contained in this electronic message and any attachments to this message are intended for the exclusive use of the addressee(s) and may contain proprietary, confidential or privileged information. If you are not the intended recipient, you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately and destroy all copies of this message and any attachments. WARNING: Computer viruses can be transmitted via email. The recipient should check this email and any attachments for the presence of viruses. The company accepts no liability for any damage caused by any virus transmitted by this email. www.wipro.com

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQIcBAEBCAAGBQJVZFGkAAoJEDg5KY9j7GZYvaYP/ilQDhRqoIVnvVDEutTcvlZs
iIOEnSc/YGRZ5LwfgV0qSEUl1qV+vMyg3wzickQedlfal2ZE07y/o+Lgyb2Y7WsM
7hXq3ocJ+NdoMRWVkaJxzNYRoqxb1lzdJzmUw1dtE5hmolqplsJwSjBOHNCFJR32
6ooqA2jiUhdPo8Jb+D/hlo9wqGB6571Iyq1j6w5vqMSRb1XokYnrRwjWrP6sHujo
1jbv5KO3PkqZwSJ/Luj7IbUfVG7MDOtW16N1ZmTHKNzB3BExjoEg0qrBTZQV7eDF
qfqRXo3pmu7jE+biHsRXnl6eV+XVoqGeR0xCtUaoBoy+cUen+rPm4O/9U7R9yDP1
5Uh8jPDQRHZmfLNkRELxLTuOrgZ05zs4VoMjZHKYlY8Rv8/Nk2LVMNK2lI0W2MbX
//gR3A0xlxuh1B2eOtnOrxTILxQS/oXRWBXb8Lc7MGyhUlA2JVIpHPW/YTfTULFY
UOEiRYJVtM1apEhQqJsauKZsSUprd7g6PaKvjJjZWBe4pivVe1MDyp0FEztk6wdl
nQPicYtLxvHxjGaf431nvAW8XcrO1uKDS8Gt6IS3Is02Wloqrw+X9LEIqJ+SjQ67
IQKEuh9WQFH7iwCkdLcNFBGCrvrI2pBWLlcCn6RCwQufn6gnNxCLNZQcgwkjkgwN
bh5sVLvZ+vrZe+EEvmXd
=2Gkh
-----END PGP SIGNATURE-----



More information about the Users mailing list