[strongSwan] no IDr configured, fall back on IP address - revisit

lejeczek peljasz at yahoo.co.uk
Wed Oct 30 16:06:07 CET 2019


On 30/10/2019 13:22, Noel Kuntze wrote:
> Hello L.,
>
> Make sure you have the private key for your certificate registered in ipsec.secrets.
> Your config has a couple of problems:
> 1) rightid="C=Shire, O=NRR, CN=*": Wildcards are not supported. Put the actual SAN or DN in the rightid field.
> 2) No configured leftid on the responder: Set leftid to the value that the remote peer expects. E.g. what you configured in rightid.
>    It has to be authenticated by the certificate.
>
> Kind regards
>
> Noel
>
> Am 29.10.19 um 19:18 schrieb lejeczek:
>> hi everyone,
>>
>> I've asked a long time ago, was not urgent and I did put it off.
>>
>> I have a relatively simple config, on the server:
>>
>> conn to_NRR
>>  
>> ike=aes128-sha256-ecp256,aes256-sha384-ecp384,aes128-sha256-modp2048,aes128-sha1-modp2048,aes256-sha384-modp4096,aes256-sha256-modp4096,aes256-sha1-modp4096,aes128-sha256-modp1536,aes128-sha1-modp1536,aes256-sha384-modp2048,aes256-sha256-modp2048,aes256-sha1-modp2048,aes128-sha256-modp1024,aes128-sha1-modp1024,aes256-sha384-modp1536,aes256-sha256-modp1536,aes256-sha1-modp1536,aes256-sha384-modp1024,aes256-sha256-modp1024,aes256-sha1-modp1024!
>>
>>  
>> esp=aes128gcm16-ecp256,aes256gcm16-ecp384,aes128-sha256-ecp256,aes256-sha384-ecp384,aes128-sha256-modp2048,aes128-sha1-modp2048,aes256-sha384-modp4096,aes256-sha256-modp4096,aes256-sha1-modp4096,aes128-sha256-modp1536,aes128-sha1-modp1536,aes256-sha384-modp2048,aes256-sha256-modp2048,aes256-sha1-modp2048,aes128-sha256-modp1024,aes128-sha1-modp1024,aes256-sha384-modp1536,aes256-sha256-modp1536,aes256-sha1-modp1536,aes256-sha384-modp1024,aes256-sha256-modp1024,aes256-sha1-modp1024,aes128gcm16,aes256gcm16,aes128-sha256,aes128-sha1,aes256-sha384,aes256-sha256,aes256-sha1!
>>
>>  
>>   dpdaction=clear
>>   dpddelay=300s
>>   rekey=no
>>  
>>   left=%any
>>   #leftsubnet=0.0.0.0/0
>>   leftsubnet=10.5.8.0/24
>>   leftcert="NRR-vpn-clusterserver.cert.der"
>>  
>>   right=%any
>>   rightdns=10.5.8.204
>>   rightsourceip=10.5.8.220,10.5.8.221
>>  
>> conn IPSec-IKEv2
>>     keyexchange=ikev2
>>     auto=add
>>  
>> conn IPSec-IKEv2-EAP
>>     also="IPSec-IKEv2"
>>     #rightauth=eap-mschapv2
>>     #rightauthby2=pubkey
>>     rightauth=pubkey
>>     #rightauthby2=eap-mschapv2
>>     rightsendcert=never
>>     eap_identity=%any
>>  
>> conn CiscoIPSec
>>     keyexchange=ikev1
>>     forceencaps=yes
>>     authby=xauthrsasig
>>     xauth=server
>>     auto=add
>>
>> and when roadwarrior connects then server logs shows:
>>
>> ...
>>
>> 2[IKE] received cert request for "C=Shire, O=NRR,
>> CN=private.private.tam.cos"
>> 12[IKE] received 1 cert requests for an unknown ca
>> 12[IKE] received end entity cert "C=Shire, O=NRR,
>> CN=sucker at private.private.tam.cos"
>> 12[CFG] looking for peer configs matching
>> 192.168.2.202[%any]...10.4.4.21[C=Shire, O=NRR,
>> CN=sucker at private.private.tam.cos]
>> 12[CFG]   candidate "IPSec-IKEv2", match: 1/1/28 (me/other/ike)
>> 12[CFG]   candidate "IPSec-IKEv2-EAP", match: 1/1/28 (me/other/ike)
>> 12[CFG] selected peer config 'IPSec-IKEv2'
>> 12[CFG]   using certificate "C=Shire, O=NRR,
>> CN=sucker at private.private.tam.cos"
>> 12[CFG]   certificate "C=Shire, O=NRR,
>> CN=sucker at private.private.tam.cos" key: 2048 bit RSA
>> 12[CFG]   using trusted ca certificate "C=Shire, O=NRR,
>> CN=private.private.tam.cos"
>> 12[CFG] checking certificate status of "C=Shire, O=NRR,
>> CN=sucker at private.private.tam.cos"
>> 12[CFG] ocsp check skipped, no ocsp found
>> 12[CFG] certificate status is not available
>> 12[CFG]   certificate "C=Shire, O=NRR, CN=private.private.tam.cos" key:
>> 2048 bit RSA
>> 12[CFG]   reached self-signed root ca with a path length of 0
>> 12[IKE] authentication of 'C=Shire, O=NRR,
>> CN=sucker at private.private.tam.cos' with RSA_EMSA_PKCS1_SHA2_256 successful
>> 12[IKE] processing INTERNAL_IP4_ADDRESS attribute
>> 12[IKE] processing INTERNAL_IP4_DNS attribute
>> 12[IKE] peer supports MOBIKE
>> 12[IKE] got additional MOBIKE peer address: 10.0.16.6
>> 12[IKE] got additional MOBIKE peer address: 10.5.10.49
>> 12[CFG] no IDr configured, fall back on IP address
>> 12[IKE] no private key found for '192.168.2.202'
>> 12[ENC] generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
>> 12[NET] sending packet: from 192.168.2.202[4500] to 10.4.4.21[4500] (80
>> bytes)
>> 12[MGR] checkin and destroy IKE_SA IPSec-IKEv2[2]
>> 12[IKE] IKE_SA IPSec-IKEv2[2] state change: CONNECTING => DESTROYING
>> 03[NET] sending packet: from 192.168.2.202[4500] to 10.4.4.21[4500]
>> 12[MGR] checkin and destroy of IKE_SA successful
>> 07[MGR] checkout IKEv2 SA with SPIs a1791cef0af46d08_i f11cc222ffacd5bf_r
>> 07[MGR] IKE_SA checkout not successful
>>
>> and the roadwarrior's config is:
>>
>> conn to_NRR
>>   leftsourceip=%config                # This will take an IP from the ip
>> pool on server
>>   leftcert="sucker at openstack.der"        # The user cert we copied in
>>   leftfirewall=yes
>>  
>>   right=192.168.2.202                # The location of the host, FQDN or
>> IP 
>>   rightid="C=Shire, O=NRR, CN=*"              # the Altname used by the
>> ipsec host
>>   rightsubnet=10.5.8.0/24          # the subnet on the servers side you
>> want to access. 
>>  
>>   auto=add
>>   #type=route
>>   type=passthrough
>>
>> and roadwarrior says:
>>
>> initiating IKE_SA to_nrr[1] to 192.168.2.202
>> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP)
>> N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
>> sending packet: from 10.0.0.5[500] to 192.168.2.202[500] (1064 bytes)
>> received packet: from 192.168.2.202[500] to 10.0.0.5[500] (297 bytes)
>> parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP)
>> CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
>> selected proposal:
>> IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_AES128_XCBC/ECP_256
>> local host is behind NAT, sending keep alives
>> received cert request for "C=Shire, O=nrr, CN=private.private.tam.cos"
>> sending cert request for "C=shire, O=strongswan, CN=vpn"
>> sending cert request for "C=Shire, O=nrr, CN=private.private.tam.cos"
>> authentication of 'C=Shire, O=nrr, CN=sucker at private.private.tam.cos'
>> (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
>> sending end entity cert "C=Shire, O=nrr, CN=sucker at private.private.tam.cos"
>> establishing CHILD_SA to_nrr{1}
>> generating IKE_AUTH request 1 [ IDi CERT CERTREQ AUTH CPRQ(ADDR DNS) SA
>> TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(MULT_AUTH)
>> N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
>> splitting IKE message (1664 bytes) into 2 fragments
>> generating IKE_AUTH request 1 [ EF(1/2) ]
>> generating IKE_AUTH request 1 [ EF(2/2) ]
>> sending packet: from 10.0.0.5[4500] to 192.168.2.202[4500] (1236 bytes)
>> sending packet: from 10.0.0.5[4500] to 192.168.2.202[4500] (500 bytes)
>> received packet: from 192.168.2.202[4500] to 10.0.0.5[4500] (80 bytes)
>> parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
>> received AUTHENTICATION_FAILED notify error
>> establishing connection 'to_nrr' failed 
>>
>>
>> That - 12[IKE] no private key found for '192.168.2.202' - it's the IP of
>> the server thus I presume something there?
>>
>> Certificates seem to load on both ends okey. Both ends are Centos 7 with
>> U5.7.2/K3.10.0-514.26.2.el7.x86_64
>>
>> Could this be some kind of a bug or I've gone blind(from tiredness) ?
>>
>> many thanks, L.
>>
>>
but should identity not be derived/deduced from certificates if those
are all loaded?

I see the keys on the server are:

..

00[CFG]   loaded RSA private key from
'/etc/strongswan/ipsec.d/private/nrr-vpn-clusterserver.key.der'
00[CFG]   loaded RSA private key from
'/etc/strongswan/ipsec.d/private/sucker at openstack.key.der'
00[CFG] opening triplet file /etc/strongswan/ipsec.d/triplets.dat
failed: No such file or directory

now I have rightid on roadwarrior which corresponds to leftid on the
responder/server, which ids are:

a) tried subject of the cert of server/responder

b) tried altNames of that cert

And while "no IDr configured" is gone from logs is still get:

...

15[CFG]   candidate "IPSec-IKEv2", match: 1/1/28 (me/other/ike)
15[CFG]   candidate "IPSec-IKEv2-EAP", match: 1/1/28 (me/other/ike)
15[CFG] selected peer config 'IPSec-IKEv2'
15[CFG]   using certificate "C=Shire, O=nrr, CN=sucker at private.tam.cos"
15[CFG]   certificate "C=Shire, O=nrr, CN=sucker at private.tam.cos" key:
2048 bit RSA
15[CFG]   using trusted ca certificate "C=Shire, O=nrr, CN=private.tam.cos"
15[CFG] checking certificate status of "C=Shire, O=nrr,
CN=sucker at private.tam.cos"
15[CFG] ocsp check skipped, no ocsp found
15[CFG] certificate status is not available
15[CFG]   certificate "C=Shire, O=nrr, CN=private.tam.cos" key: 2048 bit
RSA
15[CFG]   reached self-signed root ca with a path length of 0
15[IKE] authentication of 'C=Shire, O=nrr, CN=sucker at private.tam.cos'
with RSA_EMSA_PKCS1_SHA2_256 successful
15[IKE] processing INTERNAL_IP4_ADDRESS attribute
15[IKE] processing INTERNAL_IP4_DNS attribute
15[IKE] peer supports MOBIKE
15[IKE] got additional MOBIKE peer address: 10.0.16.6
15[IKE] got additional MOBIKE peer address: 10.5.10.49
15[IKE] no private key found for 'private.tam.cos, 10.5.154.204'
15[ENC] generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
15[NET] sending packet: from 10.5.154.202[4500] to 10.5.46.21[4500] (80
bytes)
15[MGR] checkin and destroy IKE_SA IPSec-IKEv2[1]
15[IKE] IKE_SA IPSec-IKEv2[1] state change: CONNECTING => DESTROYING


many thanks, L

-------------- next part --------------
A non-text attachment was scrubbed...
Name: pEpkey.asc
Type: application/pgp-keys
Size: 1757 bytes
Desc: not available
URL: <http://lists.strongswan.org/pipermail/users/attachments/20191030/61c589fc/attachment.key>


More information about the Users mailing list