[strongSwan] calculated HASH does not match HASH payload HASH N(AUTH_FAILED)
Andreas Steffen
andreas.steffen at strongswan.org
Sat Sep 26 15:49:43 CEST 2015
Hi Daniel,
a wrong hash value usually indicates that the Pre-Shared Secrets used
by the peers do not match. In your case it is the group password used
for Aggressive Mode.
Regards
Andreas
On 09/25/2015 03:14 PM, Daniel Kibe wrote:
> Hi,
>
>
>
> I have Strongswan 5.3.2 client access Cisco ASA gateway that is failing
> to establish connection with error HASH N(AUTH_FAILED). The conf is as
> below,
>
>
>
> # ipsec.conf - strongSwan IPsec configuration file
>
> version 2
>
> # basic configuration
>
>
>
> config setup
>
> # strictcrlpolicy=yes
>
> # uniqueids = no
>
> strictcrlpolicy=no
>
> #charondebug="ike 4, knl 4, cfg 4, enc 4, esp 4, chd 4"
> #useful debugs
>
>
>
> # Add connections here.
>
> conn %default
>
> ikelifetime=1440m
>
> keylife=60m
>
> rekeymargin=3m
>
> dpdaction=restart
>
> closeaction=restart
>
> keyingtries=1
>
> keyexchange=ikev1
>
> authby=xauthpsk
>
>
>
>
>
> conn " vpn"
>
> keyexchange=ikev1
>
> ikelifetime=1440m
>
> keylife=60m
>
> rekey=no
>
> aggressive=yes
>
> ike=3des-md5-modp1024!
>
> esp=3des-md5!
>
> xauth=client
>
> left=X.X.X.X
>
> leftid=hostname
>
> leftsourceip=%config
>
> leftfirewall=yes
>
> leftauth=psk
>
> rightauth=psk
>
> leftauth2=xauth
>
> right=Y.Y.Y.Y
>
> rightsubnet=172.1.1.0/24
>
> xauth_identity=abc
>
> authby=xauthpsk
>
> auto=start
>
>
>
> The log output when starting is as below,
>
>
>
> initiating Aggressive Mode IKE_SA vpn[5] to Y.Y.Y.Y
>
> generating AGGRESSIVE request 0 [ SA KE No ID V V V V ]
>
> sending packet: from X.X.X.X[500] to Y.Y.Y.Y[500] (335 bytes)
>
> received packet: from Y.Y.Y.Y [500] to X.X.X.X [500] (416 bytes)
>
> parsed AGGRESSIVE response 0 [ SA KE No ID HASH V V V V NAT-D NAT-D V V ]
>
> received Cisco Unity vendor ID
>
> received XAuth vendor ID
>
> received DPD vendor ID
>
> received NAT-T (RFC 3947) vendor ID
>
> received FRAGMENTATION vendor ID
>
> received unknown vendor ID: 1f:07:f7:0e:aa:65:14:d3:b0:fa:96:54:2a:50:01:00
>
> calculated HASH does not match HASH payload
>
> generating INFORMATIONAL_V1 request 2360507816 [ HASH N(AUTH_FAILED) ]
>
> sending packet: from X.X.X.X [500] to Y.Y.Y.Y[500] (84 bytes)
>
> establishing connection 'vpn' failed
>
>
>
>
>
> Kindly help is identifying the reason behind this failure.
>
>
>
> Regards,
>
> *Daniel Kibe*
>
>
>
>
>
>
>
> _______________________________________________
> Users mailing list
> Users at lists.strongswan.org
> https://lists.strongswan.org/mailman/listinfo/users
>
--
======================================================================
Andreas Steffen andreas.steffen at strongswan.org
strongSwan - the Open Source VPN Solution! www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[ITA-HSR]==
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4275 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.strongswan.org/pipermail/users/attachments/20150926/812d4677/attachment.bin>
More information about the Users
mailing list