[Openswan Users] Specifying SHA256?

Amos Shapira amos.shapira at gmail.com
Thu Apr 28 21:39:09 EDT 2016


Thanks everyone.

While I was away my colleague got the other side to just switch to sha1 and
the tunnel came up.

Cheers,

--Amos

On 27 April 2016 at 21:15, Amos Shapira <amos.shapira at gmail.com> wrote:

> Thanks. I'll try that when I get back to the office.
>
> On 26 April 2016 at 21:55, Daniel Cave <dan.cave at me.com> wrote:
>
>> Hi Amos.
>>
>> I found this document -which should help give you some clues what the
>> Juniper side is expecting.
>> http://kb.juniper.net/InfoCenter/index?page=content&id=KB10100&actp=search
>>
>> In an attempt to be helpful,  I would also look for examples - if you run
>> ipsec auto status, the first head of messages give you the phase 1/2
>> cyphers/algo's it supports, if your config has the correct settings, then
>> my guess of why it isn't connecting is that the remote peer doesn't
>> correctly support it.
>>
>> When this has happened to me before I've suggested the remote end use
>> 3des-sha1 but don't specify the phase 1 & 2 algo's in your config file, let
>> the OpenSwan daemon try and work out the connection itself, as it will try
>> the highest and drop down until it's successfully negotiated
>>
>> Failing that  -I would suggest that you look to the support people at
>> your remote peer side using the Juniper and ask them what they are seeing
>> and how they've got their end configured. ( if you haven't already ) -
>>  Also you have no idea of what version of firmware they are using on the
>> SRX device, most third parties i've dealt with won't tell you at all
>> because they're aware of pending security vulnerabilities, so just tell you
>> 'its a cisco/juniper/OEM/other device'
>>
>> The fact you've got the phase 1 & phase 2 lifetimes set to be the same,
>> doesn't seem correct to me, usually the phase 1 - what normally happens is
>> if you have both of them set at the same expiry, the tunnel appears to flap
>> when they're due to be renewed and the tunnel drops out temporarily (from
>> what i've seen - however you might want to bear this in mind as technically
>> the pending expiry should handle this and the tunnel *should* stay up
>>
>> I've discovered that the IKE lifetime should be higher and phase2 is
>> lower. these values work for me and were validated to the Cisco
>> ASA/5000 VPN we connected  to .
>> ###############################
>> # Settings
>> ###############################
>>    ike=3des-md5
>>    phase2alg=3des-md5
>>    phase2=esp
>> ###############################
>>    ikelifetime=86400s
>> #    keyexchange=ike
>>    keylife=28800s
>>
>> Hope that helps
>>
>> dan
>>
>> On Apr 26, 2016, at 06:24 AM, Amos Shapira <amos.shapira at gmail.com>
>> wrote:
>>
>> I have to condifer openswan 2.6.38 with Juniper SRX 1500 with the
>> following connection parameters (dictated by the other party):
>>
>> Phase 1 Properties
>> IKE Version v2
>> Authentication Method Pre-Shared Secret
>> Encryption Scheme IKE
>> Perfect Fwd Secrecy – IKE DH Group 14
>> Encryption Algorithm – IKE AES256
>> Hashing Algorithm – IKE SHA256
>> Renegotiate IKE SA time 28800 seconds
>>
>>
>> Phase 2 Properties CK Parameters covata Parameters
>> Transform (IPSEC Protocol) ESP
>> Perfect Fwd Secrecy - IPSEC DH Group 14
>> Encryption Algorithm - IPSEC AES256
>> Hashing Algorithm - IPSEC SHA1
>> Renegotiate IPSEC SA time 28800 seconds
>>
>> I'm trying to translate this to "openswan configuration speak" but hit a
>> problem with the Phase 1 settings.
>>
>> I tried to set it with:
>>
>>     ike=aes256-sha256;modp2048
>>     ikelifetime=8h
>>     salifetime=8h
>>     type=tunnel
>>     authby=secret
>>     forceencaps=yes
>>     auto=start
>>     left=%defaultroute
>>     leftid=xx
>>     leftnexthop=%defaultroute
>>     leftsubnet=yy
>>     right=zz
>>     rightid=zz
>>     rightsubnets={aaaaa}
>>     pfs=yes
>>     phase2=esp
>>     phase2alg=aes256-sha1;modp2048
>>     mtu=1360
>>
>> But the tunnel doesn't come up and the system log has the line:
>>
>> esp string error: hash_alg not found, enc_alg="aes", auth_alg="sha256",
>> modp="modp2048"
>>
>> I suppose I'm not specifying the sha256 correctly but I didn't find the
>> right way. What is it?
>>
>> Thanks,
>>
>> --Amos
>>
>> _______________________________________________
>> Users at lists.openswan.org
>> https://lists.openswan.org/mailman/listinfo/users
>> Micropayments: https://flattr.com/thing/38387/IPsec-for-Linux-made-easy
>> Building and Integrating Virtual Private Networks with Openswan:
>> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
>>
>>
>
>
> --
> <http://au.linkedin.com/in/gliderflyer>
>



-- 
<http://au.linkedin.com/in/gliderflyer>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20160429/db300809/attachment.html>


More information about the Users mailing list