Hi all,
I've got some issues with openvpn/strongswan.
I have created a CA/server/mobileconfig using Arokhs script.
When I try to connect the VPN from my iphone I get the following log entries but its not connecting.
Wed Jul 19 13:27:09 2017 daemon.info : 03[NET] received packet: from 192.168.1.68[500] to 192.168.1.93[500]
Wed Jul 19 13:27:09 2017 daemon.info : 03[NET] waiting for data on sockets
Wed Jul 19 13:27:09 2017 daemon.info : 10[NET] received packet: from 192.168.1.68[500] to 192.168.1.93[500] (432 bytes)
Wed Jul 19 13:27:09 2017 daemon.info : 10[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
Wed Jul 19 13:27:09 2017 daemon.info : 10[CFG] looking for an ike config for 192.168.1.93...192.168.1.68
Wed Jul 19 13:27:09 2017 daemon.info : 10[CFG] candidate: %any...%any, prio 28
Wed Jul 19 13:27:09 2017 daemon.info : 10[CFG] found matching ike config: %any...%any with prio 28
Wed Jul 19 13:27:09 2017 daemon.info : 10[IKE] 192.168.1.68 is initiating an IKE_SA
Wed Jul 19 13:27:09 2017 authpriv.info : 10[IKE] 192.168.1.68 is initiating an IKE_SA
Wed Jul 19 13:27:09 2017 daemon.info : 10[IKE] IKE_SA (unnamed)[1] state change: CREATED => CONNECTING
Wed Jul 19 13:27:09 2017 daemon.info : 10[CFG] selecting proposal:
Wed Jul 19 13:27:09 2017 daemon.info : 10[CFG] no acceptable PSEUDO_RANDOM_FUNCTION found
Wed Jul 19 13:27:09 2017 daemon.info : 10[CFG] selecting proposal:
Wed Jul 19 13:27:09 2017 daemon.info : 10[CFG] proposal matches
Wed Jul 19 13:27:09 2017 daemon.info : 10[CFG] received proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
Wed Jul 19 13:27:09 2017 daemon.info : 10[CFG] configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_MD5_96/HMAC_SHA1_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_1024, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_Wed Jul 19 13:27:09 2017 daemon.info : 10[CFG] selected proposal: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
Wed Jul 19 13:27:10 2017 daemon.info : 10[IKE] sending cert request for "C=CA, O=192.168.1.93, CN=192.168.1.93 Root CA"
Wed Jul 19 13:27:10 2017 daemon.info : 10[IKE] sending cert request for "CN=OpenWrt CA"
Wed Jul 19 13:27:10 2017 daemon.info : 10[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(MULT_AUTH) ]
Wed Jul 19 13:27:10 2017 daemon.info : 10[NET] sending packet: from 192.168.1.93[500] to 192.168.1.68[500] (493 bytes)
Wed Jul 19 13:27:10 2017 daemon.info : 04[NET] sending packet: from 192.168.1.93[500] to 192.168.1.68[500]
Wed Jul 19 13:27:10 2017 daemon.info : 03[NET] received packet: from 192.168.1.68[4500] to 192.168.1.93[4500]
Wed Jul 19 13:27:10 2017 daemon.info : 03[NET] waiting for data on sockets
Wed Jul 19 13:27:10 2017 daemon.info : 03[NET] received packet: from 192.168.1.68[4500] to 192.168.1.93[4500]
Wed Jul 19 13:27:10 2017 daemon.info : 03[NET] waiting for data on sockets
Wed Jul 19 13:27:10 2017 daemon.info : 11[NET] received packet: from 192.168.1.68[4500] to 192.168.1.93[4500] (544 bytes)
Wed Jul 19 13:27:10 2017 daemon.info : 11[ENC] parsed IKE_AUTH request 1 [ EF(1/2) ]
Wed Jul 19 13:27:10 2017 daemon.info : 11[ENC] received fragment #1 of 2, waiting for complete IKE message
Wed Jul 19 13:27:10 2017 daemon.info : 11[NET] received packet: from 192.168.1.68[4500] to 192.168.1.93[4500] (512 bytes)
Wed Jul 19 13:27:10 2017 daemon.info : 11[ENC] parsed IKE_AUTH request 1 [ EF(2/2) ]
Wed Jul 19 13:27:10 2017 daemon.info : 11[ENC] received fragment #2 of 2, reassembling fragmented IKE message
Wed Jul 19 13:27:10 2017 daemon.info : 11[ENC] unknown attribute type (25)
Wed Jul 19 13:27:10 2017 daemon.info : 11[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
Wed Jul 19 13:27:10 2017 daemon.info : 11[IKE] received end entity cert "CN=johan1"
Wed Jul 19 13:27:10 2017 daemon.info : 11[CFG] looking for peer configs matching 192.168.1.93[192.168.1.93]...192.168.1.68[johan1]
Wed Jul 19 13:27:10 2017 daemon.info : 11[CFG] candidate "johan1", match: 20/1/28 (me/other/ike)
Wed Jul 19 13:27:10 2017 daemon.info : 11[CFG] selected peer config 'johan1'
Wed Jul 19 13:27:10 2017 daemon.info : 11[CFG] using certificate "CN=johan1"
Wed Jul 19 13:27:10 2017 daemon.info : 11[CFG] certificate "CN=johan1" key: 1024 bit RSA
Wed Jul 19 13:27:10 2017 daemon.info : 11[CFG] using trusted ca certificate "CN=OpenWrt CA"
Wed Jul 19 13:27:10 2017 daemon.info : 11[CFG] certificate "CN=OpenWrt CA" key: 1024 bit RSA
Wed Jul 19 13:27:10 2017 daemon.info : 11[CFG] reached self-signed root ca with a path length of 0
Wed Jul 19 13:27:10 2017 daemon.info : 11[IKE] authentication of 'johan1' with RSA signature successful
Wed Jul 19 13:27:10 2017 daemon.info : 11[CFG] constraint requires EAP_TLS, but EAP_NAK was used
Wed Jul 19 13:27:10 2017 daemon.info : 11[CFG] selected peer config 'johan1' inacceptable: non-matching authentication done
Wed Jul 19 13:27:10 2017 daemon.info : 11[CFG] no alternative config found
Wed Jul 19 13:27:10 2017 daemon.info : 11[IKE] processing INTERNAL_IP4_ADDRESS attribute
Wed Jul 19 13:27:10 2017 daemon.info : 11[IKE] processing INTERNAL_IP4_DHCP attribute
Wed Jul 19 13:27:10 2017 daemon.info : 11[IKE] processing INTERNAL_IP4_DNS attribute
Wed Jul 19 13:27:10 2017 daemon.info : 11[IKE] processing INTERNAL_IP4_NETMASK attribute
Wed Jul 19 13:27:10 2017 daemon.info : 11[IKE] processing INTERNAL_IP6_ADDRESS attribute
Wed Jul 19 13:27:10 2017 daemon.info : 11[IKE] processing INTERNAL_IP6_DHCP attribute
Wed Jul 19 13:27:10 2017 daemon.info : 11[IKE] processing INTERNAL_IP6_DNS attribute
Wed Jul 19 13:27:10 2017 daemon.info : 11[IKE] processing (25) attribute
Wed Jul 19 13:27:10 2017 daemon.info : 11[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
Wed Jul 19 13:27:10 2017 daemon.info : 11[IKE] peer supports MOBIKE
Wed Jul 19 13:27:10 2017 daemon.info : 11[ENC] generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
Wed Jul 19 13:27:10 2017 daemon.info : 11[NET] sending packet: from 192.168.1.93[4500] to 192.168.1.68[4500] (76 bytes)
Wed Jul 19 13:27:10 2017 daemon.info : 04[NET] sending packet: from 192.168.1.93[4500] to 192.168.1.68[4500]
Wed Jul 19 13:27:10 2017 daemon.info : 11[IKE] IKE_SA johan1[1] state change: CONNECTING => DESTROYING
IPSEC.CONF
config setup
# strictcrlpolicy=yes
# uniqueids = no
charondebug="cfg 2, dmn 2, ike 2, net 2"
# Add connections here.
conn johan1
keyexchange=ikev2
esp=aes128gcm16-ecp256,aes256gcm16-ecp384,aes128-sha256-ecp256,aes256-sha384-ecp384,aes128-sha256-modp2048,aes128-sha1-modp2048,aes256-sha384-modp4096,aes256-sha256-modp4096,aes256-sha1-modp4096,ae$
dpdaction=clear
dpddelay=300s
ExtendedAuthEnabled=0
rekey=no
leftsendcert=always
leftauth=pubkey
leftfirewall=yes
leftid=192.168.1.93
leftsubnet=0.0.0.0/0
leftcert=/etc/CA/serverCert.pem
right=%any
rightdns=8.8.8.8,8.8.4.4
rightsourceip=10.66.0.1/24
rightauth=eap-tls
rightsendcert=yes
auto=add
This is all setup on the lan.
Internet (where my iPhone has an IP) [192.168.1.*]-> router with OpenVPN(172.16.1.*) [wan ip: 192.168.1.93].
Any idea why this is not connecting?
(Last edited by johanrd on 19 Jul 2017, 12:47)