[Openswan Users] query

neeraj goyal 007.neeraj at gmail.com
Tue Feb 16 00:49:01 EST 2010


Hi...

Thanks for replying Paul. I am using CA that i have placed in
/etc/ipsec.d/cacerts/cacert.pem at both end and I am using the below
ipsec.conf file at 238 machine



version    2.0    # conforms to second version of ipsec.conf specification

config setup
    plutodebug="control parsing"
    nat_traversal=yes
    protostack=netkey

conn sample1

        left=192.168.103.238
        leftcert=/etc/ipsec.d/certs/eastCert.pem
        leftsendcert=always
        leftrsasigkey=%cert
        right=192.168.103.139
        rightsendcert=always
        rightrsasigkey=%cert
        auto=add


I have placed the eastCertpem in /etc/ipsec.d/certs in 192.168.103.238
machine. and I am using the below configuration at other 139 machine

version    2.0    # conforms to second version of ipsec.conf specification

config setup
    plutodebug="control parsing"
    nat_traversal=yes
    protostack=netkey

conn sample1

        left=192.168.103.238
        leftsendcert=always
        leftrsasigkey=%cert
        right=192.168.103.139
        rightcert=/etc/ipsec.d/certs/westCert.pem
        rightsendcert=always
        rightrsasigkey=%cert
        auto=add

Similarily, I have placed the westCert.pem in /etc/ipsec.d/certs in
192.168.103.139 machine. Now I am not able to connect the ipsec between two.
It shows (while trying to up the connection using ipsec auto --up sample1)

104 "sample1" #2: STATE_MAIN_I1: initiate
003 "sample1" #2: received Vendor ID payload [Openswan (this version) 2.6.23
]
003 "sample1" #2: received Vendor ID payload [Dead Peer Detection]
003 "sample1" #2: received Vendor ID payload [RFC 3947] method set to=109
106 "sample1" #2: STATE_MAIN_I2: sent MI2, expecting MR2
003 "sample1" #2: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): no
NAT detected
108 "sample1" #2: STATE_MAIN_I3: sent MI3, expecting MR3
003 "sample1" #2: ignoring informational payload, type
INVALID_KEY_INFORMATION msgid=00000000
003 "sample1" #2: received and ignored informational message

 if I placed both certificate at both machine and specify their
corresponding parameter (specifying rightcert at 238 machine and leftcert at
139 machine) in ipsec.conf file than I am able to build up the connection.

I have seen man ipsec.conf and leftsendcert can have values yes|always ,
no|never and ifasked. leftsendcert can't have value send, showing invalid
value. I am using Linux Openswan U2.6.23/K2.6.18-92.el5 (netkey).


On Mon, Feb 15, 2010 at 8:33 PM, Paul Wouters <paul at xelerance.com> wrote:

> On Mon, 15 Feb 2010, neeraj goyal wrote:
>
>  Does each ipsec peer should have other ipsec peer certificate before
>> starting ipsec. or other peer will send during
>> connection time????
>>
>
> That depends on your configuration. See 'man ipsec.conf' and specifically
> the sections on "leftsendcert" and "leftca".
>
> If you are not using a CA, you should really just put the cert on both
> ends.
> If you are using a CA, you should let leftsendcert= send it for you.
>
> Paul
>



-- 
Regards

Neeraj Goyal
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20100216/25b74ded/attachment.html 


More information about the Users mailing list