[Openswan Users] MacOS

Alexandre Ghisoli alexandre.ghisoli at ycom.ch
Sat Aug 4 10:28:34 EDT 2007


Hello there,

I've a OpenSWAN server, working with RoadWarriors clients running on 
Windows and MacOS using X.509 certificates.

It's running OpenSWAN 2.4.9 on a Linux 2.6.19, without any patches.

We have many clients for some years now, but we are getting troubles 
with _new_ MacOS Clients.
Let explain, for Clients who had setup VPN for a while, it's working 
nice with the Apple provided VPN Client.
Now, for new machines, we getting troubles to make it working, getting 
certificates errors.

So it's probably related to a Apple patch arround OpenSSL since arround 
MacOS 1.4.6.

When the Mac tries to mount the IPSec tunnel, I got messages in the VPN 
server :

pluto[15126]: "win-rw"[8] 62.167.44.237 #41: responding to Main Mode 
from unknown peer 62.167.44.237
pluto[15126]: "win-rw"[8] 62.167.44.237 #41: transition from state 
STATE_MAIN_R0 to state STATE_MAIN_R1
pluto[15126]: "win-rw"[8] 62.167.44.237 #41: STATE_MAIN_R1: sent MR1, 
expecting MI2
pluto[15126]: "win-rw"[8] 62.167.44.237 #41: ignoring Vendor ID payload 
[KAME/racoon]
pluto[15126]: "win-rw"[8] 62.167.44.237 #41: NAT-Traversal: Result using 
RFC 3947 (NAT-Traversal): peer is NATed
pluto[15126]: "win-rw"[8] 62.167.44.237 #41: transition from state 
STATE_MAIN_R1 to state STATE_MAIN_R2
pluto[15126]: "win-rw"[8] 62.167.44.237 #41: STATE_MAIN_R2: sent MR2, 
expecting MI3
pluto[15126]: "win-rw"[8] 62.167.44.237 #41: Main mode peer ID is 
ID_DER_ASN1_DN: 'C=CH, ST=Vaud, O=YCOM SA, OU=NOC, CN=xxxycom.ch, 
E=support at ycom.ch'
pluto[15126]: "win-rw"[8] 62.167.44.237 #41: crl update for "C=CH, 
ST=Vaud, L=Yverdon-les-Bains, O=YCOM SA, OU=NOC, CN=ca.ycom.ch, 
E=support at ycom.ch" is overdue since Mar 25 17:46:56 UTC 2007
pluto[15126]: "win-rw"[8] 62.167.44.237 #41: I am sending my cert
pluto[15126]: "win-rw"[8] 62.167.44.237 #41: transition from state 
STATE_MAIN_R2 to state STATE_MAIN_R3
pluto[15126]: "win-rw"[8] 62.167.44.237 #41: STATE_MAIN_R3: sent MR3, 
ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=oakley_3des_cbc_192 
prf=oakley_sha group=modp1024}
pluto[15126]: "win-rw"[8] 62.167.44.237 #41: ignoring informational 
payload, type INVALID_CERT_AUTHORITY

As I can understand, the Mac say that my CA is not valid, but I've the 
cert in keychain, X509Anchors and defined to be valid for all usages.

You can see my raw notes here :
http://www.ghisoli.ch/run/node/40

Any help welcomes.

--Alexandre



More information about the Users mailing list