[strongSwan] IKEv2 VPN server
Alexey Vlasov
renton at renton.name
Thu Jul 25 16:35:54 CEST 2019
I've rechecked again,
https://www.dropbox.com/s/c67ua5uzs05dkgo/vpn_cert_ca.png?dl=0
On Thu, Jul 25, 2019 at 04:20:18PM +0200, Noel Kuntze wrote:
> Hello Alexey,
>
> Looks like your Windows clients don't trust your CA.
>
> Kind regards
>
> Noel
>
> Am 25.07.19 um 16:00 schrieb Alexey Vlasov:
> > Hi,
> >
> > After several days of digging and trying tens working configs I given up
> > to find out why in my case ikev2 does not work with any vpn clients.
> >
> > So, I have fresh Gentoo box with strongswan 5.7.2,
> >
> > ipsec.conf :
> > ==================
> > config setup
> > charondebug="ike 2, knl 2, cfg 2, net 2, esp 2, dmn 2, mgr 2"
> >
> > conn VPN-IKEV2
> > auto=add
> > dpdaction=clear
> > keyexchange=ikev2
> > ike=aes256-sha1-modp1024,3des-sha1-modp1024!
> > esp=aes256-sha1,3des-sha1!
> > fragmentation=yes
> >
> > leftsubnet=0.0.0.0/0
> > leftcert=/etc/ipsec.d/certs/vpn-server-cert.pem
> > leftsendcert=always
> > leftid=5.231.208.198
> >
> > rightauth=eap-mschapv2
> > ==================
> >
> > # ipsec listcerts
> >
> > List of X.509 End Entity Certificates
> >
> > subject: "C=DE, O=LLC Lucky-Host, CN=5.231.208.198"
> > issuer: "C=DE, O=LLC Lucky-Host, CN=Lucky-Host VPN Service Root CA"
> > validity: not before Jul 24 19:40:35 2019, ok
> > not after Jul 21 19:40:35 2029, ok (expires in 3649 days)
> > serial: 57:d9:c8:a8:f3:c5:cf:5a
> > altNames: 5.231.208.198
> > flags: serverAuth ikeIntermediate
> > authkeyId: d3:77:ff:85:bc:51:12:6b:cc:cf:3f:97:da:f6:81:59:00:dd:81:f8
> > subjkeyId: d5:bb:9c:d5:67:24:71:6c:40:ac:55:a7:d3:33:d3:ac:a6:1c:ac:d3
> > pubkey: RSA 4096 bits, has private key
> > keyid: 04:9a:94:1e:de:5c:ee:33:20:4b:c3:c3:2a:62:8d:6a:11:58:74:03
> > subjkey: d5:bb:9c:d5:67:24:71:6c:40:ac:55:a7:d3:33:d3:ac:a6:1c:ac:d3
> >
> > ipsec.secrets :
> > ==================
> > vpn : EAP "testvpn"
> > 5.231.208.198 : RSA /etc/ipsec.d/private/vpn-server-key.pem
> > ==================
> >
> > The built-in Windows 10 VPN client says "IKE authentication credentials are unacceptable" after an attempt to connect.
> >
> > IPSec logs end on this row:
> > Jul 25 15:55:40 vpn1 charon: 13[NET] sending packet: from 5.231.208.198[4500] to 128.70.239.23[4500] (848 bytes)
> > Jul 25 15:55:40 vpn1 charon: 04[NET] sending packet: from 5.231.208.198[4500] to 128.70.239.23[4500]
> > Jul 25 15:55:40 vpn1 charon: 13[MGR] checkin IKE_SA VPN-IKEV2[5]
> > Jul 25 15:55:40 vpn1 charon: 13[MGR] checkin of IKE_SA successful
> >
> > and after 30 seconds adding
> > Jul 25 15:56:10 vpn1 charon: 15[MGR] checkout IKEv2 SA with SPIs 6eed288a380403e2_i 1e6835aaf130f6fe_r
> > Jul 25 15:56:10 vpn1 charon: 15[MGR] IKE_SA VPN-IKEV2[5] successfully checked out
> > Jul 25 15:56:10 vpn1 charon: 15[JOB] deleting half open IKE_SA with 128.70.239.23 after timeout
> > Jul 25 15:56:10 vpn1 charon: 15[MGR] checkin and destroy IKE_SA VPN-IKEV2[5]
> > Jul 25 15:56:10 vpn1 charon: 15[IKE] IKE_SA VPN-IKEV2[5] state change: CONNECTING => DESTROYING
> > Jul 25 15:56:10 vpn1 charon: 15[MGR] checkin and destroy of IKE_SA successful
> >
> > The CA cert have been installed on windows side.
> >
> > Full log is in attach.
> >
> > Are there any ideas what is wrong?
> >
> > Thanks in advance.
>
> --
> Noel Kuntze
> IT security consultant
>
> GPG Key ID: 0x0739AD6C
> Fingerprint: 3524 93BE B5F7 8E63 1372 AF2D F54E E40B 0739 AD6C
>
>
More information about the Users
mailing list