[Openswan Users] X.509 certificate rejected
goog long
cecolong at yahoo.com
Mon Mar 15 17:02:50 EDT 2010
I need your help with this error from host log:
Mar 15 15:19:19 pluto[12210]: packet from 192.168.50.2:500: received Vendor ID payload [Openswan (this version) 2.6.21 ]
Mar 15 15:19:19 host-lx pluto[12210]: packet from 192.168.50.2:500: received Vendor ID payload [Dead Peer Detection]
Mar 15 15:19:19 host-lx pluto[12210]: "roadwarrior-net"[4] 192.168.50.2
#4: responding to Main Mode from unknown peer 192.168.50.2
Mar 15 15:19:19 host-lx pluto[12210]: "roadwarrior-net"[4] 192.168.50.2
#4: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Mar 15 15:19:19 host-lx pluto[12210]: "roadwarrior-net"[4] 192.168.50.2 #4: STATE_MAIN_R1: sent MR1, expecting MI2
Mar 15 15:19:19 host-lx pluto[12210]: "roadwarrior-net"[4] 192.168.50.2
#4: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Mar 15 15:19:19 host-lx pluto[12210]: "roadwarrior-net"[4] 192.168.50.2 #4: STATE_MAIN_R2: sent MR2, expecting MI3
Mar 15 15:19:19 host-lx pluto[12210]: "roadwarrior-net"[4] 192.168.50.2 #4: Main mode peer ID is ID_IPV4_ADDR: '192.168.50.2'
Mar 15 15:19:19 host-lx pluto[12210]: "roadwarrior-net"[4] 192.168.50.2 #4: issuer cacert not found
Mar 15 15:19:19 host-lx pluto[12210]: "roadwarrior-net"[4] 192.168.50.2 #4: X.509 certificate rejected
My host ipsec.conf:
version 2.0
config setup
interfaces=%defaultroute
nat_traversal=no
conn %default
keyingtries=1
compress=yes
disablearrivalcheck=no
authby=rsasig
leftrsasigkey=%cert
rightrsasigkey=%cert
conn roadwarrior-net
leftsubnet=192.168.50.0/255.255.255.0
also=roadwarrior
conn roadwarrior
# left=%defaultroute
left=192.168.50.1
leftcert=host.example.com.pem
right=%any
rightsubnet=vhost:%no,%priv
auto=add
pfs=yes
Files on client machine:
/etc/ipsec.d/private/host.example.com.key
/etc/ipsec.d/crls/crl.pem
/etc/ipsec.d/certs/host.example.com.pem
/etc/ipsec.d/cacerts/cacert.pem
My client ipsec.conf:
version 2.0
config setup
interfaces=%defaultroute
nat_traversal=no
conn %default
keyingtries=1
compress=yes
authby=rsasig
leftrsasigkey=%cert
rightrsasigkey=%cert
conn roadwarrior-net
leftsubnet=192.168.50.0/255.255.255.0
also=roadwarrior
conn roadwarrior
# left=%defaultroute
left=192.168.50.2
leftcert=clienthost.example.com.pem
right=192.168.50.1
rightsubnet=host.example.com.pem
auto=add
pfs=yes
Files on host machine:
/etc/ipsec.d/private/clienthost.example.com.key
/etc/ipsec.d/crls/crl.pem
/etc/ipsec.d/certs/host.example.com.pem
/etc/ipsec.d/certs/clienthost.example.com.pem
/etc/ipsec.d/cacerts/cacert.pem
where host.example.com.pem is copied from host. All key files and pem files are generated separately using openssl CA.sh on client machine and host machine.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20100315/a4e30c72/attachment.html
More information about the Users
mailing list