[strongSwan] Windos 10 cant obtain ip-address
peter samoilov
p.samoilov at kmtspb.ru
Mon Jul 22 20:04:32 CEST 2019
Hello!
I trying to connect from windos 10 to Centos7 with IKEv2 and RSA-keys.
But I get "INTERNAL_ADDRESS_FAILURE" error.
I tried to set IP-address on windos's VPN-connection manually with no
success.
Any suggestions?
Strongswan version is 5.7.2
swanctl.conf
=================================swanctl.conf==============================
authorities {
main {
cacert = /etc/strongswan/swanctl/x509ca/cacert.pem
}
}
default-ike2 {
version = 2
proposals = aes256-sha1-ecp256, aes128-sha1-ecp256,
aes128-sha1-prfsha256-modp3072, aes256-sha1-modp2048,
aes256-sha256-modp2048, aes256-sha384-modp2048, aes256-sha1-modp1024,
aes256-sha256-modp1024, aes256-sha384-modp1024
# remote_addrs = 1.1.1.3,1.1.2.2,1.1.3.2,1.1.4.2
dpd_delay = 30
dpd_timeout = 10
rekey_time = 120
local0 {
# relative to x509 dir
auth = pubkey
certs = ns1cert.pem
# ?? need? pubkeys = key.pub,key2.pub
}
}
default-eap {
}
default-windos {
rekey_time = 0
pools = windos-pool
}
connections {
nix-conn : default-ike2,default-eap {
children {
g6 {
local_ts = 192.168.4.3
remote_ts = 192.168.8.1
dpd_action = clear
}
}
}
win10 : default-ike2,default-eap,default-windos {
version = 2
proposals = aes256-sha1-modp2048,
aes256-sha256-modp2048, aes256-sha384-modp2048, aes256-sha1-modp1024,
aes256-sha256-modp1024, aes256-sha384-modp1024
children {
winx {
local_ts = 192.168.4.0/22, 192.168.8.0/22
rekey_time = 0
}
}
}
}
pools {
windos-pool {
addrs = 172.16.2.11-172.16.2.19
dns = 8.8.8.8
}
}
=================================END
swanctl.conf==============================
=================================/var/log/messages==============================
Jul 22 20:26:06 ns1 charon: 09[CFG] loaded RSA private key
Jul 22 20:26:06 ns1 charon: 11[CFG] loaded RSA private key
Jul 22 20:26:06 ns1 charon: 13[CFG] added vici pool windos-pool:
172.16.2.11, 9 entries
Jul 22 20:26:06 ns1 charon: 12[CFG] id not specified, defaulting to
cert subject 'C=RU, O=YOGURT, CN=ns1.nuts.ru'
Jul 22 20:26:06 ns1 charon: 12[CFG] added vici connection: nix-conn
Jul 22 20:26:06 ns1 charon: 10[CFG] id not specified, defaulting to
cert subject 'C=RU, O=YOGURT, CN=ns1.nuts.ru'
Jul 22 20:26:06 ns1 charon: 10[CFG] added vici connection: win10
Jul 22 20:26:15 ns1 charon: 11[NET] received packet: from
10.145.2.7[500] to 1.1.2.2[500] (624 bytes)
Jul 22 20:26:15 ns1 charon: 11[ENC] parsed IKE_SA_INIT request 0 [ SA KE
No N(FRAG_SUP) N(NATD_S_IP) N(NATD_D_IP) V V V V ]
Jul 22 20:26:15 ns1 charon: 11[IKE] received MS NT5 ISAKMPOAKLEY v9
vendor ID
Jul 22 20:26:15 ns1 charon: 11[IKE] received MS-Negotiation Discovery
Capable vendor ID
Jul 22 20:26:15 ns1 charon: 11[IKE] received Vid-Initial-Contact vendor ID
Jul 22 20:26:15 ns1 charon: 11[ENC] received unknown vendor ID:
01:52:8b:bb:c0:06:96:12:18:49:ab:9a:1c:5b:2a:51:00:00:00:02
Jul 22 20:26:15 ns1 charon: 11[IKE] 10.145.2.7 is initiating an IKE_SA
Jul 22 20:26:15 ns1 charon: 11[CFG] selected proposal:
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Jul 22 20:26:15 ns1 charon: 11[IKE] faking NAT situation to enforce UDP
encapsulation
Jul 22 20:26:15 ns1 charon: 11[IKE] sending cert request for "C=RU,
O=YOGURT, CN=CA Authority"
Jul 22 20:26:15 ns1 charon: 11[ENC] generating IKE_SA_INIT response 0 [
SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(MULT_AUTH) V ]
Jul 22 20:26:15 ns1 charon: 11[NET] sending packet: from 1.1.2.2[500] to
10.145.2.7[500] (365 bytes)
Jul 22 20:26:15 ns1 charon: 13[NET] received packet: from
10.145.2.7[4500] to 1.1.2.2[4500] (576 bytes)
Jul 22 20:26:15 ns1 charon: 13[ENC] parsed IKE_AUTH request 1 [ EF(1/5) ]
Jul 22 20:26:15 ns1 charon: 13[ENC] received fragment #1 of 5, waiting
for complete IKE message
Jul 22 20:26:15 ns1 charon: 13[NET] received packet: from
10.145.2.7[4500] to 1.1.2.2[4500] (576 bytes)
Jul 22 20:26:15 ns1 charon: 13[ENC] parsed IKE_AUTH request 1 [ EF(2/5) ]
Jul 22 20:26:15 ns1 charon: 13[ENC] received fragment #2 of 5, waiting
for complete IKE message
Jul 22 20:26:15 ns1 charon: 13[NET] received packet: from
10.145.2.7[4500] to 1.1.2.2[4500] (576 bytes)
Jul 22 20:26:15 ns1 charon: 13[ENC] parsed IKE_AUTH request 1 [ EF(3/5) ]
Jul 22 20:26:15 ns1 charon: 13[ENC] received fragment #3 of 5, waiting
for complete IKE message
Jul 22 20:26:15 ns1 charon: 13[NET] received packet: from
10.145.2.7[4500] to 1.1.2.2[4500] (576 bytes)
Jul 22 20:26:15 ns1 charon: 13[ENC] parsed IKE_AUTH request 1 [ EF(4/5) ]
Jul 22 20:26:15 ns1 charon: 13[ENC] received fragment #4 of 5, waiting
for complete IKE message
Jul 22 20:26:15 ns1 charon: 13[NET] received packet: from
10.145.2.7[4500] to 1.1.2.2[4500] (144 bytes)
Jul 22 20:26:15 ns1 charon: 13[ENC] parsed IKE_AUTH request 1 [ EF(5/5) ]
Jul 22 20:26:15 ns1 charon: 13[ENC] received fragment #5 of 5,
reassembled fragmented IKE message (2124 bytes)
Jul 22 20:26:15 ns1 charon: 13[ENC] parsed IKE_AUTH request 1 [ IDi CERT
CERTREQ AUTH N(MOBIKE_SUP) CPRQ(ADDR DNS NBNS SRV) SA TSi TSr ]
Jul 22 20:26:15 ns1 charon: 13[IKE] received cert request for "C=RU,
O=YOGURT, CN=CA Authority"
Jul 22 20:26:15 ns1 charon: 13[IKE] received cert request for "C=RU,
O=YOGURT, CN=w10.1"
Jul 22 20:26:15 ns1 charon: 13[IKE] received 32 cert requests for an
unknown ca
Jul 22 20:26:15 ns1 charon: 13[IKE] received end entity cert "C=RU,
O=YOGURT, CN=w10.1"
Jul 22 20:26:15 ns1 charon: 13[CFG] looking for peer configs matching
1.1.2.2[%any]...10.145.2.7[C=RU, O=YOGURT, CN=w10.1]
Jul 22 20:26:15 ns1 charon: 13[CFG] selected peer config 'nix-conn'
Jul 22 20:26:15 ns1 charon: 13[CFG] using trusted ca certificate
"C=RU, O=YOGURT, CN=CA Authority"
Jul 22 20:26:15 ns1 charon: 13[CFG] checking certificate status of
"C=RU, O=YOGURT, CN=w10.1"
Jul 22 20:26:15 ns1 charon: 13[CFG] certificate status is not available
Jul 22 20:26:15 ns1 charon: 13[CFG] reached self-signed root ca with a
path length of 0
Jul 22 20:26:15 ns1 charon: 13[CFG] using trusted certificate "C=RU,
O=YOGURT, CN=w10.1"
Jul 22 20:26:15 ns1 charon: 13[IKE] authentication of 'C=RU, O=YOGURT,
CN=w10.1' with RSA signature successful
Jul 22 20:26:15 ns1 charon: 13[IKE] peer supports MOBIKE
Jul 22 20:26:15 ns1 charon: 13[IKE] authentication of 'C=RU, O=YOGURT,
CN=ns1.nuts.ru' (myself) with RSA signature successful
Jul 22 20:26:15 ns1 charon: 13[IKE] IKE_SA nix-conn[1] established
between 1.1.2.2[C=RU, O=YOGURT, CN=ns1.nuts.ru]...10.145.2.7[C=RU,
O=YOGURT, CN=w10.1]
Jul 22 20:26:15 ns1 charon: 13[IKE] scheduling rekeying in 118s
Jul 22 20:26:15 ns1 charon: 13[IKE] maximum IKE_SA lifetime 130s
Jul 22 20:26:15 ns1 charon: 13[IKE] sending end entity cert "C=RU,
O=YOGURT, CN=ns1.nuts.ru"
Jul 22 20:26:15 ns1 charon: 13[IKE] peer requested virtual IP 172.16.2.11
Jul 22 20:26:15 ns1 charon: 13[IKE] no virtual IP found for 172.16.2.11
requested by 'C=RU, O=YOGURT, CN=w10.1'
Jul 22 20:26:15 ns1 charon: 13[IKE] no virtual IP found, sending
INTERNAL_ADDRESS_FAILURE
Jul 22 20:26:15 ns1 charon: 13[IKE] configuration payload negotiation
failed, no CHILD_SA built
Jul 22 20:26:15 ns1 charon: 13[IKE] failed to establish CHILD_SA,
keeping IKE_SA
Jul 22 20:26:15 ns1 charon: 13[ENC] generating IKE_AUTH response 1 [ IDr
CERT AUTH N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR)
N(INT_ADDR_FAIL) ]
Jul 22 20:26:15 ns1 charon: 13[ENC] splitting IKE message (1276 bytes)
into 2 fragments
Jul 22 20:26:15 ns1 charon: 13[ENC] generating IKE_AUTH response 1 [
EF(1/2) ]
Jul 22 20:26:15 ns1 charon: 13[ENC] generating IKE_AUTH response 1 [
EF(2/2) ]
Jul 22 20:26:15 ns1 charon: 13[NET] sending packet: from 1.1.2.2[4500]
to 10.145.2.7[4500] (1248 bytes)
Jul 22 20:26:15 ns1 charon: 13[NET] sending packet: from 1.1.2.2[4500]
to 10.145.2.7[4500] (96 bytes)
Jul 22 20:26:45 ns1 charon: 14[IKE] sending DPD request
Jul 22 20:26:45 ns1 charon: 14[ENC] generating INFORMATIONAL request 0 [ ]
Jul 22 20:26:45 ns1 charon: 14[NET] sending packet: from 1.1.2.2[4500]
to 10.145.2.7[4500] (76 bytes)
==============================END/var/log/messages==============================
More information about the Users
mailing list