[Openswan Users] Don't know how to configure ID for "we require peer to have ID 'w.x.y.z', but peer declares '0x'"
Moritz Bunkus
m.bunkus at linet-services.de
Wed Jul 11 04:59:58 EDT 2012
Hey,
I'm trying to establish a connection to a customer who is pretty strict
which VPN technologies he accepts. He's offering a pre-configured NCP
client program (http://www.ncp-e.com/en/downloads/software.html) in a
pre-configured virtual machine -- which is pretty hard to manage.
Therefore I'm trying to establish the connection from our central VPN
gateway using OpenSWAN 2.6.37 on a 3.2.0 kernel. I can extract a lot of
information from the NCP client configuration including the XAUTH
credentials and all the required certificates. Here's what my
configuration looks like:
conn testconf
# local
left=%defaultroute
leftxauthclient=yes
leftmodecfgclient=yes
leftxauthusername=ThisIWillKeepSecret
leftrsasigkey=%cert
leftcert=user1.pem
# remote
right=213.our.customers.ipaddrees
rightxauthserver=yes
rightmodecfgserver=yes
#
auto=add
# you probably can not rekey, it requires xauth password, and
openswan does not
# cache it for you. Other clients might cache it and rekey to an
openswan server
rekey=no
modecfgpull=yes
The ipsec.secrets contains both the password for the client certificate
and the XAUTH password.
Unfortunately the peer sends an ID that I simply don't know how to
configure myself:
$ ipsec auto --up testconf
104 "testconf" #4: STATE_MAIN_I1: initiate
003 "testconf" #4: received Vendor ID payload [XAUTH]
003 "testconf" #4: received Vendor ID payload [RFC 3947] method set
to=109
003 "testconf" #4: received Vendor ID payload [Dead Peer Detection]
003 "testconf" #4: received Vendor ID payload [Cisco-Unity]
003 "testconf" #4: ignoring unknown Vendor ID payload
[c6f57ac398f493208145b7581e878983]
106 "testconf" #4: STATE_MAIN_I2: sent MI2, expecting MR2
003 "testconf" #4: NAT-Traversal: Result using RFC 3947
(NAT-Traversal): no NAT detected
108 "testconf" #4: STATE_MAIN_I3: sent MI3, expecting MR3
003 "testconf" #4: ignoring informational payload, type
IPSEC_INITIAL_CONTACT msgid=00000000
003 "testconf" #4: we require peer to have ID '213.x.y.z', but peer
declares '0x'
218 "testconf" #4: STATE_MAIN_I3: INVALID_ID_INFORMATION
Reading ipsec.conf(5) lets me believe that I can only configure IP
addresses or arbitrary strings prefixed with '@' as a side's ID. And
true to the word neither "rightid=0x" nor "rightid=@0x" works. In the
former case OpenSWAN complains that "0x" doesn't look like an IP
address
when adding the connection, and in the latter case the error message
simply changes to the following:
003 "testconf" #4: we require peer to have ID '@0x', but peer declares
'0x'
Our customer is using some of NCP's server programs. Does anyone have
an
idea whether or not it's possible to establish such an connection?
Thanks.
Kind regards,
Moritz
--
Dipl.-Inform. Moritz Bunkus
Geschäftsführer/CTO
LINET Services GmbH | Am Alten Bahnhof 4b | 38122 Braunschweig
Tel. 0531-180508-0 | Fax 0531-180508-29 |
http://www.linet-services.de
Geschäftsführung: Moritz Bunkus, Philip Reetz und Timo Springmann
HR B 9170 Amtsgericht Braunschweig
More information about the Users
mailing list