[Openswan Users] can not load private key which is in ipsec.d/private
Michael Leung
gbcbooksmj at gmail.com
Wed Nov 26 04:15:56 EST 2014
HI Group
following is my ipsec.d/ipsec.secrets content
#------------------------------------------------------------
: RSA "gateway.openswan.com - HCA"
: RSA vpngateway.key "123123123ly"
#--------------------------------------------------------------
after starting ipsec setup start
we got debug info
-----------------------------------
could not open host cert with nick name 'vpngateway.key' in NSS DB
"/etc/ipsec.d/ipsec.secrets" line 2: NSS certficate not found
-----------------------------------
i notice that my OS is Centos 6.5 , i installed openswan from yum
repository , which means openswan have turn use_nss=true on, so i can
understand why we still have NSS certificate not found output
but for which i am wondering is
we also have this debug output
----------------------------------------
packet from 10.7.60.65:500: received Vendor ID payload [RFC 3947] method
set to=109
packet from 10.7.60.65:500: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109
packet from 10.7.60.65:500: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109
packet from 10.7.60.65:500: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-00]
packet from 10.7.60.65:500: ignoring Vendor ID payload [FRAGMENTATION
80000000]
packet from 10.7.60.65:500: received Vendor ID payload [Dead Peer Detection]
"L2TP-PSK-NAT"[1] 10.7.60.65 #1: responding to Main Mode from unknown peer
10.7.60.65
"L2TP-PSK-NAT"[1] 10.7.60.65 #1: transition from state STATE_MAIN_R0 to
state STATE_MAIN_R1
"L2TP-PSK-NAT"[1] 10.7.60.65 #1: STATE_MAIN_R1: sent MR1, expecting MI2
"L2TP-PSK-NAT"[1] 10.7.60.65 #1: NAT-Traversal: Result using RFC 3947
(NAT-Traversal): no NAT detected
"L2TP-PSK-NAT"[1] 10.7.60.65 #1: transition from state STATE_MAIN_R1 to
state STATE_MAIN_R2
"L2TP-PSK-NAT"[1] 10.7.60.65 #1: STATE_MAIN_R2: sent MR2, expecting MI3
"L2TP-PSK-NAT"[1] 10.7.60.65 #1: Main mode peer ID is ID_DER_ASN1_DN:
'C=CN, ST=Guangd, O=HCA, OU=HCA, CN=nexus.openswan.com, E=
supurstart at openswan.com'
"L2TP-PSK-NAT"[1] 10.7.60.65 #1: I am sending my cert
"L2TP-PSK-NAT"[1] 10.7.60.65 #1: password file contains no data
"L2TP-PSK-NAT"[1] 10.7.60.65 #1: password file contains no data
*"L2TP-PSK-NAT"[1] 10.7.60.65 #1: Can't find the private key from the NSS
CERT (err -8177)*
"L2TP-PSK-NAT"[1] 10.7.60.65 #1: transition from state STATE_MAIN_R2 to
state STATE_MAIN_R3
"L2TP-PSK-NAT"[1] 10.7.60.65 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA
established {auth=OAKLEY_RSA_SIG cipher=aes_256 prf=oakley_sha
group=modp1024}
-----------------------------------------------------------------------------
seems openswan dont load x509 certificate correctly
i have transform x509 certificate to pkcs12 , and import them to NSS DB.
-------------------------------------
[root at opensips log]# certutil -L -d /etc/ipsec.d/
Certificate Nickname Trust
Attributes
SSL,S/MIME,JAR/XPI
nexus.openswan.com - HCA u,u,u
gateway.openswan - HCA u,u,u
-------------------------------------
please give me some advice.
--Michael Leung
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20141126/6cbfc4c7/attachment-0001.html>
More information about the Users
mailing list