[strongSwan] Windos 10 cant obtain ip-address

peter samoilov p.samoilov at kmtspb.ru
Mon Jul 22 20:04:32 CEST 2019


Hello!

I trying to connect from windos 10 to Centos7 with IKEv2 and RSA-keys. 
But I get "INTERNAL_ADDRESS_FAILURE" error.

I tried to set IP-address on windos's VPN-connection manually with no 
success.

Any suggestions?


Strongswan version is 5.7.2

swanctl.conf

=================================swanctl.conf==============================

authorities {
         main {
                 cacert = /etc/strongswan/swanctl/x509ca/cacert.pem
         }
}
default-ike2 {
         version = 2
         proposals = aes256-sha1-ecp256, aes128-sha1-ecp256, 
aes128-sha1-prfsha256-modp3072, aes256-sha1-modp2048, 
aes256-sha256-modp2048, aes256-sha384-modp2048, aes256-sha1-modp1024, 
aes256-sha256-modp1024, aes256-sha384-modp1024
#       remote_addrs = 1.1.1.3,1.1.2.2,1.1.3.2,1.1.4.2
         dpd_delay = 30
         dpd_timeout = 10
         rekey_time = 120
         local0 {
# relative to x509 dir
                 auth = pubkey
                 certs = ns1cert.pem
                 # ?? need? pubkeys = key.pub,key2.pub
         }
}
default-eap {
}
default-windos {
         rekey_time = 0
         pools = windos-pool
}
connections {
         nix-conn : default-ike2,default-eap {
                 children {
                         g6 {
                                 local_ts = 192.168.4.3

                                 remote_ts = 192.168.8.1
                                 dpd_action = clear
                         }
                 }
         }
         win10 : default-ike2,default-eap,default-windos {
                 version = 2
                 proposals = aes256-sha1-modp2048, 
aes256-sha256-modp2048, aes256-sha384-modp2048, aes256-sha1-modp1024, 
aes256-sha256-modp1024, aes256-sha384-modp1024
                 children {
                         winx {
                                 local_ts = 192.168.4.0/22, 192.168.8.0/22
                                 rekey_time = 0
                         }
                 }
         }
}

pools {
         windos-pool {
                 addrs = 172.16.2.11-172.16.2.19
                 dns = 8.8.8.8
         }
}
=================================END 
swanctl.conf==============================

=================================/var/log/messages==============================

Jul 22 20:26:06 ns1 charon: 09[CFG] loaded RSA private key
Jul 22 20:26:06 ns1 charon: 11[CFG] loaded RSA private key
Jul 22 20:26:06 ns1 charon: 13[CFG] added vici pool windos-pool: 
172.16.2.11, 9 entries
Jul 22 20:26:06 ns1 charon: 12[CFG]   id not specified, defaulting to 
cert subject 'C=RU, O=YOGURT, CN=ns1.nuts.ru'
Jul 22 20:26:06 ns1 charon: 12[CFG] added vici connection: nix-conn
Jul 22 20:26:06 ns1 charon: 10[CFG]   id not specified, defaulting to 
cert subject 'C=RU, O=YOGURT, CN=ns1.nuts.ru'
Jul 22 20:26:06 ns1 charon: 10[CFG] added vici connection: win10
Jul 22 20:26:15 ns1 charon: 11[NET] received packet: from 
10.145.2.7[500] to 1.1.2.2[500] (624 bytes)
Jul 22 20:26:15 ns1 charon: 11[ENC] parsed IKE_SA_INIT request 0 [ SA KE 
No N(FRAG_SUP) N(NATD_S_IP) N(NATD_D_IP) V V V V ]
Jul 22 20:26:15 ns1 charon: 11[IKE] received MS NT5 ISAKMPOAKLEY v9 
vendor ID
Jul 22 20:26:15 ns1 charon: 11[IKE] received MS-Negotiation Discovery 
Capable vendor ID
Jul 22 20:26:15 ns1 charon: 11[IKE] received Vid-Initial-Contact vendor ID
Jul 22 20:26:15 ns1 charon: 11[ENC] received unknown vendor ID: 
01:52:8b:bb:c0:06:96:12:18:49:ab:9a:1c:5b:2a:51:00:00:00:02
Jul 22 20:26:15 ns1 charon: 11[IKE] 10.145.2.7 is initiating an IKE_SA
Jul 22 20:26:15 ns1 charon: 11[CFG] selected proposal: 
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Jul 22 20:26:15 ns1 charon: 11[IKE] faking NAT situation to enforce UDP 
encapsulation
Jul 22 20:26:15 ns1 charon: 11[IKE] sending cert request for "C=RU, 
O=YOGURT, CN=CA Authority"
Jul 22 20:26:15 ns1 charon: 11[ENC] generating IKE_SA_INIT response 0 [ 
SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(MULT_AUTH) V ]
Jul 22 20:26:15 ns1 charon: 11[NET] sending packet: from 1.1.2.2[500] to 
10.145.2.7[500] (365 bytes)
Jul 22 20:26:15 ns1 charon: 13[NET] received packet: from 
10.145.2.7[4500] to 1.1.2.2[4500] (576 bytes)
Jul 22 20:26:15 ns1 charon: 13[ENC] parsed IKE_AUTH request 1 [ EF(1/5) ]
Jul 22 20:26:15 ns1 charon: 13[ENC] received fragment #1 of 5, waiting 
for complete IKE message
Jul 22 20:26:15 ns1 charon: 13[NET] received packet: from 
10.145.2.7[4500] to 1.1.2.2[4500] (576 bytes)
Jul 22 20:26:15 ns1 charon: 13[ENC] parsed IKE_AUTH request 1 [ EF(2/5) ]
Jul 22 20:26:15 ns1 charon: 13[ENC] received fragment #2 of 5, waiting 
for complete IKE message
Jul 22 20:26:15 ns1 charon: 13[NET] received packet: from 
10.145.2.7[4500] to 1.1.2.2[4500] (576 bytes)
Jul 22 20:26:15 ns1 charon: 13[ENC] parsed IKE_AUTH request 1 [ EF(3/5) ]
Jul 22 20:26:15 ns1 charon: 13[ENC] received fragment #3 of 5, waiting 
for complete IKE message
Jul 22 20:26:15 ns1 charon: 13[NET] received packet: from 
10.145.2.7[4500] to 1.1.2.2[4500] (576 bytes)
Jul 22 20:26:15 ns1 charon: 13[ENC] parsed IKE_AUTH request 1 [ EF(4/5) ]
Jul 22 20:26:15 ns1 charon: 13[ENC] received fragment #4 of 5, waiting 
for complete IKE message
Jul 22 20:26:15 ns1 charon: 13[NET] received packet: from 
10.145.2.7[4500] to 1.1.2.2[4500] (144 bytes)
Jul 22 20:26:15 ns1 charon: 13[ENC] parsed IKE_AUTH request 1 [ EF(5/5) ]
Jul 22 20:26:15 ns1 charon: 13[ENC] received fragment #5 of 5, 
reassembled fragmented IKE message (2124 bytes)
Jul 22 20:26:15 ns1 charon: 13[ENC] parsed IKE_AUTH request 1 [ IDi CERT 
CERTREQ AUTH N(MOBIKE_SUP) CPRQ(ADDR DNS NBNS SRV) SA TSi TSr ]
Jul 22 20:26:15 ns1 charon: 13[IKE] received cert request for "C=RU, 
O=YOGURT, CN=CA Authority"
Jul 22 20:26:15 ns1 charon: 13[IKE] received cert request for "C=RU, 
O=YOGURT, CN=w10.1"
Jul 22 20:26:15 ns1 charon: 13[IKE] received 32 cert requests for an 
unknown ca
Jul 22 20:26:15 ns1 charon: 13[IKE] received end entity cert "C=RU, 
O=YOGURT, CN=w10.1"
Jul 22 20:26:15 ns1 charon: 13[CFG] looking for peer configs matching 
1.1.2.2[%any]...10.145.2.7[C=RU, O=YOGURT, CN=w10.1]
Jul 22 20:26:15 ns1 charon: 13[CFG] selected peer config 'nix-conn'
Jul 22 20:26:15 ns1 charon: 13[CFG]   using trusted ca certificate 
"C=RU, O=YOGURT, CN=CA Authority"
Jul 22 20:26:15 ns1 charon: 13[CFG] checking certificate status of 
"C=RU, O=YOGURT, CN=w10.1"
Jul 22 20:26:15 ns1 charon: 13[CFG] certificate status is not available
Jul 22 20:26:15 ns1 charon: 13[CFG]   reached self-signed root ca with a 
path length of 0
Jul 22 20:26:15 ns1 charon: 13[CFG]   using trusted certificate "C=RU, 
O=YOGURT, CN=w10.1"
Jul 22 20:26:15 ns1 charon: 13[IKE] authentication of 'C=RU, O=YOGURT, 
CN=w10.1' with RSA signature successful
Jul 22 20:26:15 ns1 charon: 13[IKE] peer supports MOBIKE
Jul 22 20:26:15 ns1 charon: 13[IKE] authentication of 'C=RU, O=YOGURT, 
CN=ns1.nuts.ru' (myself) with RSA signature successful
Jul 22 20:26:15 ns1 charon: 13[IKE] IKE_SA nix-conn[1] established 
between 1.1.2.2[C=RU, O=YOGURT, CN=ns1.nuts.ru]...10.145.2.7[C=RU, 
O=YOGURT, CN=w10.1]
Jul 22 20:26:15 ns1 charon: 13[IKE] scheduling rekeying in 118s
Jul 22 20:26:15 ns1 charon: 13[IKE] maximum IKE_SA lifetime 130s
Jul 22 20:26:15 ns1 charon: 13[IKE] sending end entity cert "C=RU, 
O=YOGURT, CN=ns1.nuts.ru"
Jul 22 20:26:15 ns1 charon: 13[IKE] peer requested virtual IP 172.16.2.11
Jul 22 20:26:15 ns1 charon: 13[IKE] no virtual IP found for 172.16.2.11 
requested by 'C=RU, O=YOGURT, CN=w10.1'
Jul 22 20:26:15 ns1 charon: 13[IKE] no virtual IP found, sending 
INTERNAL_ADDRESS_FAILURE
Jul 22 20:26:15 ns1 charon: 13[IKE] configuration payload negotiation 
failed, no CHILD_SA built
Jul 22 20:26:15 ns1 charon: 13[IKE] failed to establish CHILD_SA, 
keeping IKE_SA
Jul 22 20:26:15 ns1 charon: 13[ENC] generating IKE_AUTH response 1 [ IDr 
CERT AUTH N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) 
N(INT_ADDR_FAIL) ]
Jul 22 20:26:15 ns1 charon: 13[ENC] splitting IKE message (1276 bytes) 
into 2 fragments
Jul 22 20:26:15 ns1 charon: 13[ENC] generating IKE_AUTH response 1 [ 
EF(1/2) ]
Jul 22 20:26:15 ns1 charon: 13[ENC] generating IKE_AUTH response 1 [ 
EF(2/2) ]
Jul 22 20:26:15 ns1 charon: 13[NET] sending packet: from 1.1.2.2[4500] 
to 10.145.2.7[4500] (1248 bytes)
Jul 22 20:26:15 ns1 charon: 13[NET] sending packet: from 1.1.2.2[4500] 
to 10.145.2.7[4500] (96 bytes)
Jul 22 20:26:45 ns1 charon: 14[IKE] sending DPD request
Jul 22 20:26:45 ns1 charon: 14[ENC] generating INFORMATIONAL request 0 [ ]
Jul 22 20:26:45 ns1 charon: 14[NET] sending packet: from 1.1.2.2[4500] 
to 10.145.2.7[4500] (76 bytes)
==============================END/var/log/messages==============================





More information about the Users mailing list