[Openswan Users] x509 auth unable to find suitable connection
Mariusz Kruk
Kruk at epsilon.eu.org
Thu Feb 17 06:56:46 EST 2011
On Wed, Feb 16, 2011 at 07:32:04PM +0100, Mariusz Kruk wrote:
> >> Feb 16 11:48:38 epsilon pluto[31415]: "l2tp-cert"[1] 77.253.107.194
> >> #1: no crl from issuer "O=avl, OU=Organizational CA" found (strict=no)
> >> Feb 16 11:48:38 epsilon pluto[31415]: | subject: 'O=avl,
> >> OU=Organizational CA'
> >> Feb 16 11:48:38 epsilon pluto[31415]: | issuer: 'O=avl,
> >> OU=Organizational CA'
> > There is no CN= in your CA certs?
>
> Hmm... indeed there isn't. You think this could be the problem?
> The CA I use is the "Organizational CA" from our local Novell's
> eDirectory. It was created with the default settings so I suppose this
> situation isn't that unusual in case of eDirectory's CA.
OK. I thought that maybe it had indeed been a problem with the
certificates, so I set up a new CA with openssl this time. I created new
self-signed rootCA cert, I signed keys for both the server, and the
client (which is BTW still providing only the old cert and ignoring the
new one even if I set rightca=%same in ipsec.conf) and still get same
errors.
pluto[5263]: "l2tp-cert"[3] 11.22.33.44 #3: Main mode peer ID is ID_DER_ASN1_DN: 'C=PL, ST=state, CN=jitensha-test'
pluto[5263]: | subject: 'C=PL, ST=state, CN=jitensha-test'
pluto[5263]: | issuer: 'C=PL, CN=poznojuzCA' Feb 17 12:34:07
pluto[5263]: | authkey: 35:5a:11:9e:97:ef:8a:be:a5:66:10:00:9e:da:7f:eb:59:41:94:e3
pluto[5263]: | not before : Feb 17 11:05:00 UTC 2011
pluto[5263]: | current time: Feb 17 11:34:07 UTC 2011
pluto[5263]: | not after : Feb 17 11:05:00 UTC 2012
pluto[5263]: | valid certificate for "C=PL, ST=state, CN=jitensha-test"
pluto[5263]: | issuer cacert "C=PL, CN=poznojuzCA" found
pluto[5263]: | signature algorithm: 'md5WithRSAEncryption'
pluto[5263]: | valid certificate signature (C=PL, CN=poznojuzCA -> C=PL, ST=state, CN=jitensha-test)
pluto[5263]: "l2tp-cert"[3] 11.22.33.44 #3: no crl from issuer "C=PL, CN=poznojuzCA" found (strict=no)
pluto[5263]: | subject: 'C=PL, CN=poznojuzCA'
pluto[5263]: | issuer: 'C=PL, CN=poznojuzCA'
pluto[5263]: | authkey: 35:5a:11:9e:97:ef:8a:be:a5:66:10:00:9e:da:7f:eb:59:41:94:e3
pluto[5263]: | not before : Feb 17 11:02:41 UTC 2011
pluto[5263]: | current time: Feb 17 11:34:07 UTC 2011
pluto[5263]: | not after : Feb 14 11:02:41 UTC 2021
pluto[5263]: | valid certificate for "C=PL, CN=poznojuzCA"
pluto[5263]: | issuer cacert "C=PL, CN=poznojuzCA" found
pluto[5263]: | signature algorithm: 'sha-1WithRSAEncryption'
pluto[5263]: | valid certificate signature (C=PL, CN=poznojuzCA -> C=PL, CN=poznojuzCA)
pluto[5263]: | reached self-signed root ca
pluto[5263]: | Public key validated
pluto[5263]: | requested CA: 'O=avl, OU=Organizational CA'
pluto[5263]: | requested CA: 'C=PL, CN=poznojuzCA'
pluto[5263]: | trusted_ca called with a=C=PL, CN=poznojuzCA b=alidated
pluto[5263]: | trusted_ca returning with failed
pluto[5263]: | trusted_ca called with a=\370\001 b=C=PL, CN=poznojuzCA
pluto[5263]: | trusted_ca returning with failed
pluto[5263]: | trusted_ca called with a=\370\001 b=O=avl, OU=Organizational CA
pluto[5263]: | trusted_ca returning with failed
pluto[5263]: | trusted_ca called with a=C=PL, CN=poznojuzCA b=alidated
pluto[5263]: | trusted_ca returning with failed
pluto[5263]: | trusted_ca called with a=\370\001 b=C=PL, CN=poznojuzCA
pluto[5263]: | trusted_ca returning with failed
pluto[5263]: | trusted_ca called with a=\370\001 b=O=avl, OU=Organizational CA
pluto[5263]: | trusted_ca returning with failed
pluto[5263]: "l2tp-cert"[3] 11.22.33.44 #3: no suitable connection for peer 'C=PL, ST=state, CN=jitensha-test'
pluto[5263]: | complete state transition with (null)
# ipsec auto --listall
000
000 List of Public Keys:
000
000 Feb 17 12:36:11 2011, 2048 RSA Key AwEAAZ/G3 (no private key), until Feb 17 12:05:00 2012 ok
000 ID_DER_ASN1_DN 'C=PL, ST=state, CN=jitensha-test'
000 Issuer 'C=PL, CN=poznojuzCA'
000 Feb 17 12:29:23 2011, 2048 RSA Key AwEAAbQYX (has private key), until Feb 17 12:04:43 2012 ok
000 ID_DER_ASN1_DN 'C=PL, ST=state, CN=epsilon-temp'
000 Issuer 'C=PL, CN=poznojuzCA'
000 List of Pre-shared secrets (from /etc/ipsec.secrets)
000 2: RSA (none) (none)
000 11: PSK %any 77.252.106.53
000
000 List of X.509 End Certificates:
000
000 Feb 17 12:29:23 2011, count: 1
000 subject: 'C=PL, ST=state, CN=epsilon-temp'
000 issuer: 'C=PL, CN=poznojuzCA'
000 serial: 04
000 pubkey: 2048 RSA Key AwEAAbQYX, has private key
000 validity: not before Feb 17 12:04:43 2011 ok
000 not after Feb 17 12:04:43 2012 ok
000 subjkey: 78:8c:95:c6:5f:bc:8a:9b:7e:da:ef:85:7b:b0:32:c8:3f:d0:86:e4
000 authkey: 35:5a:11:9e:97:ef:8a:be:a5:66:10:00:9e:da:7f:eb:59:41:94:e3
000 aserial: 00:e8:60:4b:e9:c8:c6:5c:90
000
000 List of X.509 CA Certificates:
000
000 Feb 17 12:29:23 2011, count: 1
000 subject: 'C=PL, CN=poznojuzCA'
000 issuer: 'C=PL, CN=poznojuzCA'
000 serial: 00:e8:60:4b:e9:c8:c6:5c:90
000 pubkey: 2048 RSA Key AwEAAbd4U
000 validity: not before Feb 17 12:02:41 2011 ok
000 not after Feb 14 12:02:41 2021 ok
000 subjkey: 35:5a:11:9e:97:ef:8a:be:a5:66:10:00:9e:da:7f:eb:59:41:94:e3
000 authkey: 35:5a:11:9e:97:ef:8a:be:a5:66:10:00:9e:da:7f:eb:59:41:94:e3
000 aserial: 00:e8:60:4b:e9:c8:c6:5c:90
Just to be on the safe side, I tried to connect with another Openswan
linux machine. And it got me the same effect, so it seems it's not
a Windows client problem.
--
Kruk@ -\ |
}-> epsilon.eu.org |
http:// -/ |
|
More information about the Users
mailing list