[strongSwan] strongswan gateway does not send hash-link of its own certificate
Mike.Ettrich at bertelsmann.de
Mike.Ettrich at bertelsmann.de
Wed Feb 28 16:19:39 CET 2018
Hi!
We have confirued a strongswan roadwarrior client and a strongswan gateway to use Hash_and_Url.
We found that the gateway is always sending its certificate instead of sending the hash-link to its certificate, but the roadwarrior does.
Unfortunally I can't find such an behavior in the user-mailing-list nor in the documentation, so I have to ask what could be the reason for that?
How can I force the gateway to send a cert-hash instaed a certificate in the ike-handshake.
Kind regards,
Mike.
Configurations:
gateway ipsec.conf:
ca %default
certuribase=http://hashandurl.my-server.de/
auto=add
conn RU1-TI
keyexchange=ikev2
left=vpn1. my-server.de
leftcert=vpn1. my-server Cert.pem
leftid="C=DE, O=Arvato Systems GmbH TEST-ONLY - NOT-VALID, CN=vpn1. my-server.de"
leftfirewall=yes
right=%any
rightsourceip=10.23.0.0/20
auto=add
gateway strongswan.conf:
charon {
hash_and_url = yes
load_modular = yes
plugins {
include strongswan.d/charon/*.conf
}
}
include strongswan.d/*.conf
gateway statusall:
Status of IKE charon daemon (strongSwan 5.5.3, Linux 4.4.103-6.38-default, x86_64):
uptime: 5 hours, since Feb 28 10:34:02 2018
malloc: sbrk 2822144, mmap 0, used 534240, free 2287904
worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 0
loaded plugins: charon aes des rc2 sha2 sha1 md5 random nonce x509 pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem fips-prf gmp curve25519 xcbc cmac hmac attr kernel-netlink socket-default stroke vici updown xauth-generic
roadwarrior ipsec.conf:
ca KOMP_CA3
certuribase=http://146.185.113.20/
auto=add
# Sample VPN connections
conn %default
keyexchange=ikev2
ike=aes128-sha256-modp1536,aes128-sha1-modp1536,aes256-sha384-modp2048,aes256-sha256-modp2048,aes256-sha1-modp2048,aes128-sha256-modp1024,aes128-sha1-modp1024,aes256-sha384-modp1536,aes256-sha256-modp1536,aes256-sha1-modp1536,aes256-sha384-modp1024,aes256-sha256-modp1024,aes256-sha1-modp1024
esp=aes128gcm16-ecp256,aes256gcm16-ecp384,aes128-sha256-ecp256,aes256-sha384-ecp384,aes128-sha256-modp2048,aes128-sha1-modp2048,aes256-sha384-modp4096,aes256-sha256-modp4096,aes256-sha1-modp4096,aes128-sha256-modp1536,aes128-sha1-modp1536,aes256-sha384-modp2048,aes256-sha256-modp2048,aes256-sha1-modp2048,aes128-sha256-modp1024,aes128-sha1-modp1024,aes256-sha384-modp1536,aes256-sha256-modp1536,aes256-sha1-modp1536,aes256-sha384-modp1024,aes256-sha256-modp1024,aes256-sha1-modp1024,aes128gcm16,aes256gcm16,aes128-sha256,aes128-sha1,aes256-sha384,aes256-sha256,aes256-sha1
leftcert=my.C_NK_VPN.pem
leftsourceip=%config
rightid=%any
dpdaction=none
dpdaction=clear
dpddelay=300s
compress = yes
leftfirewall=yes
auto=add
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20180228/7809e521/attachment.html>
More information about the Users
mailing list