[strongSwan] Strong swan IKE issue.

Andrii Petrenko aplsms at gmail.com
Tue Mar 20 00:06:12 CET 2018


Actually  all of them are identified:

12.10.219.4     Main Mode Handshake returned HDR=(CKY-R=8d51ab7841c04271) SA=(Enc=AES KeyLength=128 Hash=SHA1 Group=5:modp1536 Auth=PSK LifeType=Seconds LifeDuration=28800)
12.10.219.4     Main Mode Handshake returned HDR=(CKY-R=8d51ab78aa98b745) SA=(Enc=AES KeyLength=256 Hash=SHA1 Group=5:modp1536 Auth=PSK LifeType=Seconds LifeDuration=28800)
12.10.219.4     Main Mode Handshake returned HDR=(CKY-R=8d51ab78faedcf4f) SA=(Enc=3DES Hash=MD5 Group=1:modp768 Auth=PSK LifeType=Seconds LifeDuration=28800)

But strong swan set for all:

12[ENC] parsed INFORMATIONAL_V1 request 76122219 [ HASH N(NO_PROP) ]
12[IKE] received NO_PROPOSAL_CHOSEN error notify


Thank you,
AP



> On Mar 19, 2018, at 15:22, Andrii Petrenko <aplsms at gmail.com> wrote:
> 
> Tobias,
> 
> I’ve tried ike-scan and what I see: 
> 
> ~/ike-scan$ sudo ike-scan --verbose  --trans=7/256,2,1,5  xx.xx.xx.xx
> sudo: unable to resolve host stratus01
> DEBUG: pkt len=88 bytes, bandwidth=56000 bps, int=16571 us
> Starting ike-scan 1.9.4 with 1 hosts (http://www.nta-monitor.com/tools/ike-scan/ <http://www.nta-monitor.com/tools/ike-scan/>)
> xx.xx.xx.xx     Main Mode Handshake returned HDR=(CKY-R=8d51ab78888680ad) SA=(Enc=AES KeyLength=256 Hash=SHA1 Group=5:modp1536 Auth=PSK LifeType=Seconds LifeDuration=28800)
> 
> 
> 
> 
>> On Mar 19, 2018, at 11:01, Andrii Petrenko <aplsms at gmail.com <mailto:aplsms at gmail.com>> wrote:
>> 
>> Tobias, thank you for reply.
>> 
>> Remote side is not supporting pfs.
>> 
>> IKE Phase One Parameters:	
>> Encryption Algorithm:	AES 256
>> Hash Algorithm:	SHA
>> Authentication Method:	Pre-shared key
>> Key Exchange:	Diffie Hellman Group 5
>> IKE SA Lifetime:	86400 (Cisco default)
>> IKE Phase Two Parameters (IPSEC):	
>> Authentication:	ESP with SHA-HMAC
>> Encryption Algorithm:	ESP-AES 256
>> SA Establishment:	ipsec-isakmp (IKE negotiated)
>> IPSEC Mode	Tunnel (Cisco default)
>> IPSEC SA Lifetime (time)	3600 seconds
>> IPSEC SA Lifetime (volume)	4608000 kilobytes
>> PFS (Perfect Forward Secrecy)	No
>> Optional encryption if requirements differ from above:	
>> esp-3des esp-md5-hmac	
>> esp-aes 256 esp-sha-hmac	
>> esp-aes 128 esp-sha-hmac	
>> 
>> This information I have from remote side. 
>> 
>> Is it possible to se what offer remote side?
>> 
>> Thank you,
>> AP
>> 
>> 
>>> On Mar 19, 2018, at 10:52, Tobias Brunner <tobias at strongswan.org <mailto:tobias at strongswan.org>> wrote:
>>> 
>>> Hi Andrii,
>>> 
>>>> I see the problem on IKE side, but don’t know how to debug and fix it.
>>> 
>>> The log tells you _exactly_ what the problem is:
>>> 
>>>> 12[ENC] parsed INFORMATIONAL_V1 request 2090615229 [ HASH N(NO_PROP) ]
>>>> 12[IKE] received NO_PROPOSAL_CHOSEN error notify
>>> 
>>> The peer doesn't like the crypto proposal sent by the client.  So fix
>>> the `esp` setting in the config (maybe you have to enabled PFS by adding
>>> a DH group, ask the other server admin for the correct algorithms).
>>> 
>>> Regards,
>>> Tobias
>> 
> 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20180319/344e04fd/attachment.html>


More information about the Users mailing list