[strongSwan] IPSEC-SECRETS FILE file parsing issue results in "calculated HASH does not match HASH payload" and HASH N(AUTH_FAILED)
Rajiv Kulkarni
rajivkulkarni69 at gmail.com
Sun Nov 15 18:07:21 CET 2015
Hi
Just to set it right..There is a typo in the peer2 config...it should be
2.2.2.5 (and not 2.2.2.25...my mistake while copy-paste editing on the mail
page)
thanks & regards
rajiv
On Sun, Nov 15, 2015 at 10:27 PM, Rajiv Kulkarni <rajivkulkarni69 at gmail.com>
wrote:
> Hi Strongswan Team
>
> I know this kind of issue (hash mismatch) has been occuring for a long
> time with users who use PSK, and i know that generally its due to the
> pre-shared-keys mismatch between the peers. I double-checked all the
> reported issues and your advice on each of them.
>
> But i am facing some different issue i guess..i dont know...
>
> please kindly help and advice...As per my layman's observation...its more
> to do with how the parsing of the "ipsec.secrets" file contenets or maybe
> the way the IDs-selectors are used or represented by strongswan.
>
> iam unable to establish a simple S2S tunnel between 2 peers, when one of
> the peers (peer1-DUT) has a specific type of configs as shown below.
>
> Here i have to use PSK (either for the road-warrior connection-entry or
> for the l2tp-ipsec connection entries)
>
> The tunnel is up and works if i remove both the road-warrior and the
> optional l2tp-ipsec connection entries on the peer1, bcos of which the main
> S2S tunnel is not coming up and failing with the message as in subject field
>
> You see, i have the below very simple setup with the configs in each of
> the peers as shown below:
>
>
> [pc1]----[DUT](2.2.2.21)-------------(2.2.2.25)[PEER2]----[pc2]
> 192.168.33.0/24 <site-to-site-tunnel> 192.168.34.0/24
>
> Note: peer1/DUT will always initiate the S2S tunnel. It also acts as a
> road-warrior server and a l2tp-server (and more such as pptp-server too)
>
>
> ------------------------------
> Config on Peer1-GW (the DUT)
> ------------------------------
>
> root at OpenWrt:/etc#
> root at OpenWrt:/etc# cat ipsec.conf
> # /etc/ipsec.conf - strongSwan IPsec configuration file
>
> config setup
> strictcrlpolicy=no
> charondebug="ike 4, dmn 4, chd 4, knl 3, cfg 3, net 3, esp 1, enc 4,
> lib 4, mgr 4"
>
> conn %default
> ikelifetime=3h
> keylife=1h
> mobike=no
>
> conn topeergw1
> aggressive=yes
> left=2.2.2.21
> leftid=dut1.ciscosbr.com
> leftsubnet=192.168.34.0/24
> right=2.2.2.5
> rightid=dut2.ciscosbr.com
> rightsubnet=192.168.33.0/24
> leftauth=psk
> rightauth=psk
> type=tunnel
> keyexchange=ikev1
> ike=aes256-sha1-modp1536
> esp=aes256-sha1-modp1536
> auto=route
>
> conn c2s_GroupName1
> aggressive=yes
> left=2.2.2.21
> leftid=2.2.2.21
> leftsubnet=192.168.34.0/24
> right=%any
> rightid=keyid:GroupName1
> rightsourceip=10.11.11.0/24
> leftauth=psk
> rightauth=psk
> rightauth2=xauth
> xauth=server
> modeconfig=pull
> type=tunnel
> keyexchange=ikev1
> auto=add
> #
> #conn l2tp-conns
> # aggressive=yes
> # left=%any
> # leftprotoport=17/1701
> # right=%any
> # rightprotoport=17/1701
> # leftauth=psk
> # rightauth=psk
> # type=transport
> # keyexchange=ikev1
> # auto=add
> root at OpenWrt:/etc#
> root at OpenWrt:/etc#
>
> root at OpenWrt:/etc# cat ipsec.secrets
> # auto-generated config file from /tmp/etc/config/strongswan
> dut1.ciscosbr.com dut2.ciscosbr.com : PSK "123456789abc"
> 2.2.2.21 GroupName1 : PSK "config123abc"
> user2 : XAUTH "config123"
> #: PSK "hgdgfd$AKHKH$hfgdhsf$#$j6523"
>
> root at OpenWrt:/etc#
> ================================================
>
>
> -------------------------------------
> Config on Peer2-GW (a Ubuntu-Linux PC)
> -----------------------------------
>
> # /etc/ipsec.conf - strongSwan IPsec configuration file
>
> config setup
> strictcrlpolicy=no
> charondebug="ike 4, dmn 4, chd 4, knl 3, cfg 3, net 3, esp 1, enc 4,
> lib 4, mgr 4"
>
> conn %default
> ikelifetime=3h
> keylife=1h
> mobike=no
>
> conn topeergw1
> aggressive=yes
> left=2.2.2.25
> leftid=dut2.ciscosbr.com
> leftsubnet=192.168.33.0/24
> right=%any
> rightid=dut1.ciscosbr.com
> rightsubnet=192.168.34.0/24
> leftauth=psk
> rightauth=psk
> type=tunnel
> keyexchange=ikev1
> ike=aes256-sha1-modp1536
> esp=aes256-sha1-modp1536
> auto=add
>
> root[/etc]# cat ipsec.secrets
> dut2.ciscosbr.com dut1.ciscosbr.com : PSK "123456789abc"
> ==========================================
>
> Please find attached the logs of the IKE/IPSec transaction captured on
> both the peers. Please Please take a look at the issue iam facing....i
> maybe doing a very simple mistake somewhere...but iam unable to get
> it....please advice
>
> Also any pointers of info on how the parsing of "ipsec.secrets" file is
> done...like is it a top-down approach (in which case why does it use the
> other PSK values in the file rather than the first one that should match?).
> Thanks in advance.
>
> thank you
> with regards
> rajiv
>
>
> thanks
>
>
>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20151115/589652a7/attachment.html>
More information about the Users
mailing list