[strongSwan] Mac OS 10.10 Client to Linux Strongswan server HASH N(AUTH_FAILED) error

Jude Oliver judeo at blansys.com
Tue Apr 26 17:10:31 CEST 2016


Still no love here, no private key for my left server? Did I mess up my
cert creation?


Apr 26 10:05:14 RH7Standard charon: 11[IKE] faking NAT situation to
enforce UDP encapsulation
Apr 26 10:05:14 RH7Standard charon: 11[IKE] sending cert request for
"C=US, O=BSI, CN=RH7Standard.blansys.com"
Apr 26 10:05:14 RH7Standard charon: 11[ENC] generating ID_PROT response 0
[ KE No CERTREQ NAT-D NAT-D ]
Apr 26 10:05:14 RH7Standard charon: 11[NET] sending packet: from
10.0.11.200[500] to 10.0.11.160[500] (376 bytes)
Apr 26 10:05:14 RH7Standard strongswan: 10[NET] sending packet: from
10.0.11.200[500] to 10.0.11.160[500] (136 bytes)
Apr 26 10:05:14 RH7Standard charon: 12[NET] received packet: from
10.0.11.160[4500] to 10.0.11.200[4500] (1500 bytes)
Apr 26 10:05:14 RH7Standard charon: 12[ENC] parsed ID_PROT request 0 [ ID
CERT SIG CERTREQ N(INITIAL_CONTACT) ]
Apr 26 10:05:14 RH7Standard charon: 12[IKE] ignoring certificate request
without data
Apr 26 10:05:14 RH7Standard charon: 12[IKE] received end entity cert
"C=US, O=BSI, CN=judeo at blansys.com"
Apr 26 10:05:14 RH7Standard charon: 12[CFG] looking for XAuthInitRSA peer
configs matching 10.0.11.200...10.0.11.160[C=US, O=BSI,
CN=judeo at blansys.com]
Apr 26 10:05:14 RH7Standard charon: 12[CFG] selected peer config "%Mac"
Apr 26 10:05:14 RH7Standard charon: 12[CFG]   using certificate "C=US,
O=BSI, CN=judeo at blansys.com"
Apr 26 10:05:14 RH7Standard charon: 12[CFG]   using trusted ca certificate
"C=US, O=BSI, CN=RH7Standard.blansys.com"
Apr 26 10:05:14 RH7Standard charon: 12[CFG] checking certificate status of
"C=US, O=BSI, CN=judeo at blansys.com"
Apr 26 10:05:14 RH7Standard charon: 12[CFG] certificate status is not
available
Apr 26 10:05:14 RH7Standard charon: 12[CFG]   reached self-signed root ca
with a path length of 0
Apr 26 10:05:14 RH7Standard charon: 12[IKE] authentication of 'C=US,
O=BSI, CN=judeo at blansys.com' with RSA successful
Apr 26 10:05:14 RH7Standard charon: 12[IKE] no RSA private key found for
'10.0.11.200'
Apr 26 10:05:14 RH7Standard charon: 12[ENC] generating INFORMATIONAL_V1
request 860305567 [ HASH N(AUTH_FAILED) ]
Apr 26 10:05:14 RH7Standard charon: 12[NET] sending packet: from
10.0.11.200[4500] to 10.0.11.160[4500] (92 bytes)



Please verify I have not made any mistakes in my ipsec.conf file:

config setup


conn %default
	ikelifetime=60m
	keylife=20m
	rekeymargin=3m
	keyingtries=1
	keyexchange=ikev1


conn %Mac
	auto=add
rightid="C=US, O=BSI, CN=judeo at blansys.com"
leftauth=pubkey
   	rightauth=pubkey
   	rightauth2=xauth


And my list of certs.

strongswan listcerts


List of X.509 End Entity Certificates:


  altNames:  jude at blansys.com, judeo at blansys.com
  subject:  "C=US, O=BSI, CN=judeo at blansys.com"
  issuer:   "C=US, O=BSI, CN=RH7Standard.blansys.com"
  serial:    25:74:fe:8b:a9:5f:aa:02
  validity:  not before Apr 08 13:25:55 2016, ok
             not after  Apr 08 13:25:55 2018, ok
  pubkey:    RSA 2048 bits
  keyid:     a0:7a:df:22:55:da:02:f6:9d:3e:ac:ae:7d:e1:31:ee:ea:6e:1e:33
  subjkey:   72:88:65:dc:71:f5:20:5d:80:d4:1a:6b:a7:88:c3:f8:b4:1f:cb:6f
  authkey:   9a:f2:13:b8:bb:85:97:4a:fc:48:ad:a2:4a:80:82:5a:ee:75:49:39






________________________________________


Jude Oliver
Support
1100 Poydras St. Suite 1230
New Orleans, LA 70163
Main Office: 504-529-8869
Joliver at blansys.com
www.blanchardsystems.com <http://www.blanchardsystems.com/>

-----------------------------------------------------

Join Blanchard Systems

2016 Tips and Tricks Training Webinars

Check out the Blanchard Systems 2015 FREE monthly Tips & Tricks training
webinars. 
Click Here <http://www.blanchardsystems.com/events/> to view the schedule
and register for one of our upcoming events.









On 4/26/16, 8:16 AM, "Tobias Brunner" <tobias at strongswan.org> wrote:

>Hi Jude,
>
>> Apr 25 11:20:44 RH7Standard charon: 09[IKE] found 1 matching config, but
>> none allows XAuthInitRSA authentication using Main Mode
>
>Seems your left|rightauth settings are still wrong.  As I wrote before
>you need
>
>   leftauth=pubkey
>   rightauth=pubkey
>   rightauth2=xauth
>
>> I have tried a few variations with out success, like
>> authby=xauthrsasig
>> 	authby=xauthpsk
>
>authby has no effect if you configure left|rightauth.
>
>> I presume this is the configuration example I should be looking at to
>>get
>> this to behave:
>> 
>>https://www.strongswan.org/testing/testresults/ikev1/xauth-id-rsa-hybrid/
>
>No, as the name indicates and the description explains this uses XAuth
>in Hybrid Mode (where the client is only authenticated with XAuth not
>PSK or RSA).  While the Apple clients support this mode it's not their
>default setting.
>
>Regards,
>Tobias
>



More information about the Users mailing list