[Openswan Users] x509 setup problems
James
james at nttmcl.com
Tue May 29 13:09:12 EDT 2007
James wrote:
> Hi guys i'm having problems with an x509 configuration.
> I keep getting the following message when running
> shell> ipsec auto --verbose -up roadwarrior
> 003 "roadwarrior" #1: received and ignored informational message
> 003 "roadwarrior" #1: discarding duplicate packet; already STATE_MAIN_I3
> 010 "roadwarrior" #1: STATE_MAIN_I3: retransmission; will wait 20s for
> response
> 003 "roadwarrior" #1: ignoring informational payload, type
> INVALID_KEY_INFORMATION
>
> I did the following to create certificates:
> shell> /usr/lib/ssl/misc/CA.sh -newreq
> files generated were newreq.pem newkey.pem
> shell> cat newkey.pem newreq.pem > newsomething.pem
> shell> mv newsomething.pem newreq.pem
> shell> /usr/lib/ssl/misc/CA.sh -sign
> resulted in newcert.pem
> shell> mv newreq.pem host.key
> shell> mv newcert.pem host.pem
>
> I renamed the certs as needed and placed them in the /etc/ipsec.d
> folders as needed
> all key files were moved to /etc/ipsec.d/private
> all cert files were moved to /etc/ipsec.d/certs
> cacert was copied to /etc/ipsec.d/cacerts
> crl.pem was copies to /etc/ipsec.d/crls
>
> this was done for both client and host
> and yes the ipsec.secrets file is correctly formatted and no errors show
> in syslog
>
> TIA
>
> *HOST CONFIGURATION*
> version 2.0
>
> config setup
> interfaces=%defaultroute
> nat_traversal=yes
> virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16
> plutodebug=all
>
> conn %default
> keyingtries=1
> compress=yes
> disablearrivalcheck=no
> authby=rsasig
> leftrsasigkey=%cert
> rightrsasigkey=%cert
>
> conn roadwarrior
> left=%defaultroute
> leftcert=/etc/ipsec.d/certs/host.pem
> right=%any
> rightsubnet=vhost:%no,%priv
> pfs=yes
> leftsubnet=0.0.0.0/0
> auto=add
>
> conn block
> auto=ignore
>
> conn private
> auto=ignore
>
> conn private-or-clear
> auto=ignore
>
> conn clear-or-private
> auto=ignore
>
> conn clear
> auto=ignore
>
> conn packetdefault
> auto=ignore
>
> #Disable Opportunistic Encryption
> include /etc/ipsec.d/examples/no_oe.conf
>
>
> *CLIENT CONFIGURATION
> *version 2
>
> config setup
> interfaces=%defaultroute
> nat_traversal=yes
> plutodebug=all
>
> conn %default
> keyingtries=1
> compress=yes
> authby=rsasig
> leftrsasigkey=%cert
> rightrsasigkey=%cert
>
> conn roadwarrior
> right=%defaultroute
> rightcert=/etc/ipsec.d/certs/client.pem
> left=192.168.1.1
> leftcert=/etc/ipsec.d/certs/host.pem
> leftsubnet=0.0.0.0/0
> pfs=yes
> auto=add
>
> conn block
> auto=ignore
>
> conn private
> auto=ignore
>
> conn private-or-clear
> auto=ignore
>
> conn clear-or-private
> auto=ignore
>
> conn clear
> auto=ignore
>
> conn packetdefault
> auto=ignore*
>
> *
> _______________________________________________
> Users at openswan.org
> http://lists.openswan.org/mailman/listinfo/users
> Building and Integrating Virtual Private Networks with Openswan:
> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
>
Oh small adjustment
the client should look like this:
conn roadwarrior
left=%defaultroute
leftcert=/etc/ipsec.d/certs/client.pem
right=192.168.1.1
rightcert=/etc/ipsec.d/certs/host.pem
rightsubnet=0.0.0.0/0
pfs=yes
auto=add
still the same problem tho
More information about the Users
mailing list