[Openswan Users] cert problem with new 2.6.21 version
weirauch at checkmobile.de
weirauch at checkmobile.de
Tue Apr 7 10:05:15 EDT 2009
hi all,
i am not getting a CERT connection from my mac to my openswan linux box
(trying since 3 months, various connection variants every once in a while
- even read the great book from paul wouters and ken bantoft - but still
not getting it to work :-(((
so every hint / help is warmly and greatly welcomed...
Openswan IPsec U2.6.21/K2.6.25.20-0.1
from the same mac book i have no problem to connect to my netgear router -
so what is wrong on my openswan side??
/var/log/messages:
===============
Apr 7 15:52:08 vpn pluto[32746]: "l2tp-X.509"[1] 85.182.252.146 #1:
responding to Main Mode from unknown peer 85.XXX.XXX.146
Apr 7 15:52:08 vpn pluto[32746]: "l2tp-X.509"[1] 85.182.252.146 #1:
transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Apr 7 15:52:08 vpn pluto[32746]: "l2tp-X.509"[1] 85.182.252.146 #1:
STATE_MAIN_R1: sent MR1, expecting MI2
Apr 7 15:52:08 vpn pluto[32746]: "l2tp-X.509"[1] 85.182.252.146 #1:
transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Apr 7 15:52:08 vpn pluto[32746]: "l2tp-X.509"[1] 85.182.252.146 #1:
STATE_MAIN_R2: sent MR2, expecting MI3
Apr 7 15:52:08 vpn pluto[32746]: "l2tp-X.509"[1] 85.182.252.146 #1: Main
mode peer ID is ID_DER_ASN1_DN: 'C=XX, ST=XXX, O=XXXX, OU=Head, CN=abc'
Apr 7 15:52:08 vpn pluto[32746]: "l2tp-X.509"[1] 85.182.252.146 #1: I am
sending my cert
Apr 7 15:52:08 vpn pluto[32746]: "l2tp-X.509"[1] 85.182.252.146 #1:
unable to locate my private key for RSA Signature
Apr 7 15:52:08 vpn pluto[32746]: "l2tp-X.509"[1] 85.182.252.146 #1:
sending encrypted notification AUTHENTICATION_FAILED to 85.XXX.XXX.146:500
ipsec.conf:
========
version 2.0 # conforms to second version of ipsec.conf specification
# basic configuration
config setup
plutodebug="none"
nat_traversal=yes
forwardcontrol=yes
virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16,%v4:!192.168.229.0/24
# dpdaction=hold
conn l2tp-X.509
#
# Configuration for one user with any type of IPsec/L2TP client
# including the updated Windows 2000/XP (MS KB Q818043), but
# excluding the non-updated Windows 2000/XP.
#
#
# Use a certificate. Disable Perfect Forward Secrecy.
#
authby=rsasig
pfs=no
auto=add
rekey=no
ikelifetime=8h
keylife=1h
type=transport
# ourselve
left=87.XXX.XXX.140
leftsubnet=192.168.229.0/24
#leftrsasigkey=%cert
leftcert=/etc/ipsec.d/certs/vpncm_mcert.pem
leftprotoport=17/1701
# right gateway
right=%any
rightprotoport=17/%any
rightsubnet=vhost:%no,%priv
rightcert=/etc/ipsec.d/certs/macpwneu.pem
forceencaps=yes
content of /etc/ipsec.d/certs
-rw-r--r-- 1 root root 1094 Apr 7 15:21 macpwneu.pem
-rw-r--r-- 1 root root 1139 Mar 5 09:50 vpncm_mcert.pem
and in /etc/ipsec.d/cacerts
is the ca key with which those two keys were signed.
all help is wellcome.
thanks a lot
Philipp
More information about the Users
mailing list