[strongSwan] Certificate authentication issue
Joe O
notjoe at gmail.com
Fri Oct 28 10:28:32 CEST 2016
I am having some issues with certificate authentication. I’ve generated a .p12 certificate and imported it into my mac. Everything looks good and according to the strongswan logs I am successfully authenticating. However, I am also getting “Deleting half open IKE_SA after timeout message”
Here is the full log:
Oct 28 08:27:06 08[NET] received packet: from 80.24.56.224[500] to 45.63.76.236[500] (604 bytes)
Oct 28 08:27:06 08[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
Oct 28 08:27:06 08[IKE] 80.24.56.224 is initiating an IKE_SA
Oct 28 08:27:06 08[IKE] remote host is behind NAT
Oct 28 08:27:06 08[IKE] sending cert request for "C=CN, O=Alipay, CN=testing.connectedover.com"
Oct 28 08:27:06 08[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(MULT_AUTH) ]
Oct 28 08:27:06 08[NET] sending packet: from 45.63.76.236[500] to 80.24.56.224[500] (465 bytes)
Oct 28 08:27:06 15[NET] received packet: from 80.24.56.224[4500] to 45.63.76.236[4500] (512 bytes)
Oct 28 08:27:06 15[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
Oct 28 08:27:06 15[CFG] looking for peer configs matching 45.63.76.236[testing.connectedover.com]...80.24.56.224[test]
Oct 28 08:27:06 15[CFG] selected peer config 'radius'
Oct 28 08:27:06 15[IKE] initiating EAP_IDENTITY method (id 0x00)
Oct 28 08:27:06 15[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
Oct 28 08:27:06 15[IKE] peer supports MOBIKE
Oct 28 08:27:06 15[IKE] authentication of 'testing.connectedover.com' (myself) with RSA signature successful
Oct 28 08:27:06 15[ENC] generating IKE_AUTH response 1 [ IDr AUTH EAP/REQ/ID ]
Oct 28 08:27:06 15[NET] sending packet: from 45.63.76.236[4500] to 80.24.56.224[4500] (384 bytes)
Here is my ipsec config:
config setup
uniqueids=no
charondebug="cfg 2, dmn 2, ike 2, net 0"
conn %default
leftid=testing.connectedover.com
leftcert=server.cert.pem
conn iOS_cert
keyexchange=ikev1
# strongswan version >= 5.0.2, compatible with iOS 6.0,6.0.1
fragmentation=yes
left=%defaultroute
leftauth=pubkey
leftsubnet=0.0.0.0/0
leftcert=server.cert.pem
right=%any
rightauth=eap-radius
rightauth2=xauth
rightsourceip=10.0.0.0/24
rightcert=client.cert.pem
auto=add
dpdaction=clear
# also supports iOS PSK and Shrew on Windows
conn android_xauth_psk
keyexchange=ikev1
left=%defaultroute
leftauth=psk
leftsubnet=0.0.0.0/0
right=%any
rightauth=psk
rightauth2=xauth-radius
rightsourceip=10.0.0.0/24
dpdaction=clear
ikelifetime=500h
lifetime=200s
auto=add
# compatible with "strongSwan VPN Client" for Android 4.0+
# and Windows 7 cert mode.
conn networkmanager-strongswan
keyexchange=ikev2
left=%defaultroute
leftauth=pubkey
leftsubnet=0.0.0.0/0
leftcert=server.cert.pem
right=%any
rightauth=pubkey
rightauth=pubkey
rightsourceip=10.0.0.0/24
rightcert=client.cert.pem
auto=add
conn radius
keyexchange=ikev2
left=%any
leftsubnet=0.0.0.0/0
leftauth=pubkey
leftcert=server.cert.pem
right=%any
rightsourceip=10.0.0.0/24
rightauth=eap-radius
rightsendcert=never
eap_identity=%any
auto=add
dpdaction=clear
Thanks for the help!
More information about the Users
mailing list