[strongSwan] EAP-MD5 failed with "inacceptable: constraint checking failed"
yuko ktr
k10lie.gm at gmail.com
Tue Oct 13 17:10:45 CEST 2015
Hi, Andreas
Thanks! I see.
Excuse me, could you confirm my understanding please?
I changed "psk" to "pubkey" based on the configuration introduced on
the following strongswan site:
https://www.strongswan.org/testing/testresults/ikev2/rw-eap-md5-radius/index.html
> strongSwan KVM Tests / ikev2 / rw-eap-md5-radius
I think strongswan can't handshake with the challenge from Freeradius.
> Oct 13 23:51:46 test charon: 04[ENC] generating INFORMATIONAL request 2 [ N(AUTH_FAILED) ]
In freeradius, md5 for eap is set as default on HOME$raddb/mods-available/eap
eap {
# Invoke the default supported EAP type when
# EAP-Identity response is received.
(snip)
# If the EAP-Type attribute is set by another module,
# then that EAP type takes precedence over the
# default type configured here.
#
default_eap_type = md5
And I changed as follows (filter_username) not to follow NAI.
HOME$raddb/sites-available/default
authorize {
#
# Take a User-Name, and perform some checks on it, for spaces and other
# invalid characters. If the User-Name appears invalid, reject the
# request.
#
# See policy.d/filter for the definition of the filter_username policy.
#
#filter_username
Could you check ipsec.conf attached in the end of this mail please?
root at test:/usr/local/etc# ipsec statusall
Status of IKE charon daemon (strongSwan 5.3.3, Linux 3.19.0-25-generic, x86_64):
uptime: 4 minutes, since Oct 13 23:51:44 2015
malloc: sbrk 1486848, mmap 0, used 350768, free 1136080
worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0,
scheduled: 0
loaded plugins: charon pkcs11 aes des rc2 sha1 sha2 md5 rdrand
random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8
pkcs12 pgp dnskey sshkey pem fips-prf gmp xcbc cmac hmac sqlite attr
kernel-netlink resolve socket-default stroke updown eap-identity
eap-sim eap-sim-pcsc eap-aka eap-aka-3gpp2 eap-simaka-pseudonym
eap-simaka-reauth eap-md5 eap-gtc eap-dynamic eap-radius eap-tls
eap-ttls eap-peap eap-tnc xauth-generic xauth-eap xauth-pam
xauth-noauth tnc-tnccs
root at test:/usr/local/etc# dpkg -l | grep md5
ii strongswan-plugin-eap-md5 5.1.2-0ubuntu2.3
amd64 strongSwan plugin for EAP-MD5 protocol handler
(13) Received Access-Request Id 73 from 192.168.1.2:64384 to
192.168.1.10:1812 length 131
(13) User-Name = "test at xxx"
(13) User-Password = "tester"
(13) Acct-Session-Id = "11.33.116.1-9.17.196.10:500-1444747899"
(13) EAP-Message = 0x0200001201796b61746f72693140616c756a
(13) Message-Authenticator = 0xe65b01b08a963b82c76ad40653c90e74
(13) # Executing section authorize from file
/usr/local/etc/raddb/sites-enabled/default
(13) authorize {
(13) [preprocess] = ok
(snip)
(13) Sent Access-Challenge Id 73 from 192.168.1.10:1812 to
192.168.1.2:64384 length 0
(13) EAP-Message = 0x0101001604108fd3419ff7ab9e57c4b681a6c38e898d
(13) Message-Authenticator = 0x00000000000000000000000000000000
(13) State = 0x7654e5577655e11a3fb34d4297110fbd
(13) Finished request
Waking up in 4.9 seconds.
(13) Cleaning up request packet ID 73 with timestamp +81342
Ready to process requests
Oct 13 23:51:46 test charon: 04[IKE] authentication of '11.33.116.1'
with pre-shared key successful
Oct 13 23:51:46 test charon: 04[CFG] constraint requires public key
authentication, but pre-shared key was used
Oct 13 23:51:46 test charon: 04[CFG] selected peer config
'eap-md5-rsa' inacceptable: constraint checking failed
Oct 13 23:51:46 test charon: 04[CFG] no alternative config found
Oct 13 23:51:46 test charon: 04[ENC] generating INFORMATIONAL request
2 [ N(AUTH_FAILED) ]
Oct 13 23:51:46 test charon: 04[NET] sending packet: from
9.17.196.10[500] to 11.33.116.1[500] (76 bytes)
Oct 13 23:51:46 test charon: 04[IKE] IKE_SA eap-md5-rsa[1] state
change: CONNECTING => DESTROYING
conn %default
ikelifetime=180m
keylife=90m
keyexchange=ikev2
ike = aes128-sha1-modp1024
esp = aes128-sha1
mobike = no
reauth = no
conn eap-md5-rsa
left=9.17.196.10
leftsourceip=%config
leftid=test at xxx
leftauth=eap
right=11.33.116.1
rightsubnet=3.1.1.1/32
rightid=CA6 <<< this is
rightauth=pubkey
auto=add
Any comment would be really appreciated.
Regards,
Yuko
More information about the Users
mailing list