[strongSwan] EAP extraction issue and universal config for different clients

Oleksandr Yermolenko aae at sumix.com
Tue Nov 29 10:54:51 CET 2016


Hi,


Environment: strongswan+freeradius/ldap(389-DS).

Currently there are two clients' categories: strongswan clients and 
Windows7-10
For strongswan clients EAP messages (profile rw-eap or link98) extracted 
by strongswan,

But Windows EAP (profile win7) extracted by freeradius.

Two questions
the first one:
is it possible to unify/update configuration to always extract EAP by 
strongswan?
For what? In this case I will have more control for win7 (ttls+EAP/pap).
I mean I could use separate rightid and leftsubnet for them.
This is because unresolved request https://wiki.strongswan.org/issues/1082

and the second question:
how to update my config to accept connection from PSK+xauth (mikrotik hEX)?
Trying to follow 
https://strongswan.org/testing/testresults4/ikev1/xauth-psk/index.html 
without success
conn pskxauth
     rekeymargin=3m
     keyingtries=1
     keyexchange=ikev1
     authby=xauthpsk
     xauth=server
     leftsubnet=10.31.0.0/16
     leftfirewall=yes

permanently have
Nov 29 10:39:49 vpn10.hetz.crp charon: 06[CFG] looking for XAuthInitPSK 
peer configs matching 10.31.1.157...193.X.X.X[10.20.9.189]
Nov 29 10:39:49 vpn10.hetz.crp charon: 06[CFG]   candidate "pskxauth", 
match: 1/1/1052 (me/other/ike)
Nov 29 10:39:49 vpn10.hetz.crp charon: 06[IKE] found 1 matching config, 
but none allows XAuthInitPSK authentication using Main Mode
Nov 29 10:39:49 vpn10.hetz.crp charon: 06[ENC] generating 
INFORMATIONAL_V1 request 1342320020 [ HASH N(AUTH_FAILED) ]

PSK the same ... :-(
may someone have idea ...



my strongswan server configs:
--- ipsec.conf -------------------------------
config setup
     uniqueids=never
     charondebug="cfg 2, tls 1"

conn %default
     ikelifetime=3h
     lifetime=1h
     keyexchange=ikev2
     dpddelay=30s
     dpdaction=clear
     left=193.X.X.X
     leftauth=pubkey
     leftid=@nvp10-4.link.vpn
     leftcert=nvp10-4.link.vpn.pem
     right=%any
     rightauth=eap-radius
     auto=add

conn rw-eap
leftsubnet=10.20.1.11[udp/domain],10.20.1.20[tcp/http],10.20.1.20[tcp/https],10.20.1.167[tcp/webcache],10.20.1.157
     leftfirewall=no
     rightsourceip=%radius
     rightid=*@link.vpn
     rightsendcert=never

conn link98
     leftsubnet=10.20.0.0/16,10.21.0.0/16
     leftfirewall=yes
     rightsourceip=10.20.252.240/28
     rightid=*@link98.vpn
     rightsendcert=never

conn win7
     leftsubnet=10.31.1.39/32
     leftfirewall=yes
     rightsourceip=10.20.252.192/28
     rightsendcert=never   # see note
     eap_identity=%any
-------------------------------------------
---- strongswan.conf --------
charon {
   load = aes des sha1 sha2 md5 pem pkcs1 pkcs8 gmp random nonce x509 
curl revocation hmac stroke kernel-netlink socket-default eap-radius 
xauth updown
   multiple_authentication=no
   plugins {
     eap-radius {
       secret = rtbldknflb
       server = 127.0.0.1
       auth_port = 1812
       acct_port = 1813
       accounting=yes
       nas_identifier = VPN-gateway
     }
     attr {
       dns = 10.31.1.11
     }
   }
}
-----------------------------------------
---- ipsec.secrets ----------------------
: RSA nvp10-4.link.vpn.pem

nvp10-4.link.vpn %any : PSK "erkgvndflrjvdbkfljnvb"

3rgfvldfknvl : XAUTH "erlkgvbdnfl"
------------------------------------------



More information about the Users mailing list