[Openswan Users] cert problem with new 2.6.21 version

weirauch at checkmobile.de weirauch at checkmobile.de
Wed Apr 8 02:34:12 EDT 2009


thank you paul! and thank you jorge (who got me on the right track)
finally everything works (the private key must go into ipsec.secrets etc, 
etc)
(you know that much much better than i do :-)

so if you ever are in hamburg (germany) you are heartly invited to a very 
big beer (or two, or more :-) (they serve wine here as well...)
what a relief to get something going after so many unsuccessfull 
attempts!!
thanks a lot for the great work!
regards,
philipp




From:
Paul Wouters <paul at xelerance.com>
To:
weirauch at checkmobile.de
Cc:
Users at openswan.org
Date:
07.04.2009 20:05
Subject:
Re: [Openswan Users] cert problem with new 2.6.21 version



On Tue, 7 Apr 2009, weirauch at checkmobile.de wrote:

> Apr  7 15:52:08 vpn pluto[32746]: "l2tp-X.509"[1] 85.182.252.146 #1:
> unable to locate my private key for RSA Signature

Is your private key in /etc/ipsec.d/private/  ?
Do you have an entry for it in /etc/ipsec.secrets ?
If the key file is password protected, did you specify the password in 
ipsec.secrets?
Are you sure the public cert plus the private key belong together
  and are not from different key/cert installs?

> conn l2tp-X.509

>        authby=rsasig
>        left=87.XXX.XXX.140
>        leftcert=/etc/ipsec.d/certs/vpncm_mcert.pem

>        rightcert=/etc/ipsec.d/certs/macpwneu.pem

> content of /etc/ipsec.d/certs
>
> -rw-r--r--  1 root root 1094 Apr  7 15:21 macpwneu.pem
> -rw-r--r--  1 root root 1139 Mar  5 09:50 vpncm_mcert.pem
>
> and in /etc/ipsec.d/cacerts
> is the ca key with which those two keys were signed.

Note that loading the REMOTE certificate by specifying a file
as you did for rightcert= will bypass all CA checks. The key
is considerd "trusted" because you got it from disk.

You can use ipsec auto --listall to debug this further.

Paul





More information about the Users mailing list