[Openswan Users] PSK works, certificates not
D h @ v @ l
dhaval4linux at yahoo.com
Tue Jul 17 03:55:22 EDT 2007
>Arno Lehmann <al at its-lehmann.de> wrote:
>Hello,
>this is my first post to the list, so please be patient if I ask a FAQ
(I did look through the archives, and used google, but couldn't find
answers to my problem that solved them...)
>Ok, my setup:
>Quite basic at the moment:
>I have an internal network, 192.168.0.0/24, where I run a server that
will become a VPN gateway. This is "balrog" at 192.168.0.22.
>A test client "phoenix" is at .88. This machine runs MS Windows Vista
business.
>I set up the server with Linux Openswan U2.4.6/K2.6.18.8-0.3-default
(netkey) (as distributed by SuSE's OpenSuse 10.2). My first tests used
PSK authentication and worked fine, mostly following jacco's manual.
>Then I went on to try certificates, which will be a requirement later.
(And, most probably, I'll have to fight with NAT and having the server
listening to different networks, and all this sort of fun - later)
>I created a connection in ipsec.conf like this:
>config setup
>interfaces="ipsec0=eth2 ipsec1=eth1 ipsec2=eth0"
>klipsdebug=
>plutodebug=
>manualstart=
>syslog=
>plutowait=yes
>nhelpers=0
>#
Just disable klipsdebug, plutodebug, mannualstart, syslog or gives options yes or no but not leave blanck.
>virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%v
>4:!192.168.0.0/24,%v4:!192.168.37.0/24
># nat_traversal=yes
>conn intern-cert
>authby=rsasig
>rightrsasigkey=%cert
>leftcert=ITS-VPN.pem
>left=192.168.0.22
>leftprotoport=17/1701
>right=%any
>rightprotoport=17/1701
>rightsubnet=vhost:%no,%priv
>rightca=%same
>auto=add
Here you have to specify
leftrsasigkey=%cert
leftsubnet=192.168.0.0/24
>(the defaults are unchanged from the PSK setup, and the connection
>itself is also similar to the working PSK one.
>I created a (sub) CA (I'm using tinyCA for other certificate handling
already) and created two certificates, one for the VPN server, and one
for the windows client.
>I packaged the windows one as a pkcs12 file and installed it on that
machine.
>I copied the server-related files to the vpn gateway
(/etc/ipsec.d/certs, .../cacerts, .../private - certificate, CA
certificate, private key for certificate, respectivels) and restarted
the ipsec subsystem.
>When I keep the gateway certificate protected by a password, and have
a line like ": RSA "password" in ipsec.secrets, I get these
messages:
you have to specify this thing in ipsec.secrets file
: RSA ITS-VPN.key "password"
This ITS-VPN.key is key file which is copied to private folder. This solve that key not found problem.
>> Jul 17 01:18:05 balrog pluto[13311]: loading secrets from "/etc/ipsec.secrets"
>> Jul 17 01:18:05 balrog pluto[13311]: could not open private key file '/etc/ipsec.d/private/ITS-VPN.pem'
>> Jul 17 01:18:05 balrog pluto[13311]: "/etc/ipsec.secrets" line 14: error loading RSA private key file
>> Jul 17 01:18:05 balrog ipsec__plutorun: 003 "/etc/ipsec.secrets" line 14: error loading RSA private key file
>If I unlock the key file (and comment out the line in ipsec.secrets), I get no messages in the log.
>When I start the connection from the windows client, I quickly get a
message that the connection could not be established, with a result
code of 810, which would indicate a certificate problem, I think.
>On the server side, in the log, I find lines like
>> Jul 17 01:23:03 balrog pluto[14159]: "intern-cert"[1] 192.168.0.88 #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
>> Jul 17 01:23:03 balrog pluto[14159]: "intern-cert"[1] 192.168.0.88 #1: STATE_MAIN_R1: sent MR1, expecting MI2
>> Jul 17 01:23:03 balrog pluto[14159]: "intern-cert"[1] 192.168.0.88 #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
>> Jul 17 01:23:03 balrog pluto[14159]: "intern-cert"[1] 192.168.0.88 #1: STATE_MAIN_R2: sent MR2, expecting MI3
>> Jul 17 01:23:03 balrog pluto[14159]: "intern-cert"[1] 192.168.0.88 #1: next payload type of ISAKMP Hash Payload has an unknown value: 51
>> Jul 17 01:23:03 balrog pluto[14159]: "intern-cert"[1] 192.168.0.88 #1: malformed payload in packet
>> Jul 17 01:23:03 balrog pluto[14159]: "intern-cert"[1] 192.168.0.88 #1: sending notification PAYLOAD_MALFORMED to 192.168.0.88:500
>The malformed payload message is, as far as I understand after much
reading, more or less only an artifact of an unencrypted message sent
because encryption could not be established.
>After much trial and error, and not getting anywhere, I tried the
CA.sh script to set up the CA and create certificates, but without any
success - the problem persists. I even deleted the whole CA for the
VPN and recreated it to make sure I did not accidentially use the
wrong files or anything... (I admit this is close to the usual
windows-related advice to reinstall, but I *am* getting desperate ;-)
Just to make certificate refer http://www.natecarlson.com/linux/ipsec-x509.php guide. Also make crl.pem file. then follow http://www.jacco2.dds.nl/networking/vista-openswan.html to go ahead.
>By now, I think that windows, for some reason, does not like my
certificates.
>Unfortunately, I don't know what I'm doing wrong :-(
>Any hints from some of you, perhaps?
>--
>Arno Lehmann
>IT-Service Lehmann
>www.its-lehmann.de
Regards,
Dhaval
---------------------------------
Pinpoint customers who are looking for what you sell.
---------------------------------
Luggage? GPS? Comic books?
Check out fitting gifts for grads at Yahoo! Search.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20070717/292213bf/attachment.html
More information about the Users
mailing list