Re: [strongSwan] Wildcard certificates

2010-07-09 Thread Claude Tompers
Oops, sometimes I forget the most evident things.
I forgot to put the keyfile into the ipsec.secrets.
My bad, so sorry.

kind regards,
Claude


On Wednesday 07 July 2010 13:06:11 Claude Tompers wrote:
> Hello Stefan,
> 
> Ok, in that case the IKEv2 ID is not that important, but why can't it find 
> the key for the default DN 'C=LU, ST=n/a, L=Luxembourg, O=Fondation RESTENA, 
> CN=*.restena.lu' ?
> 
> kind regards
> Claude
> 
> 
> On Wednesday 07 July 2010 12:43:03 Andreas Steffen wrote:
> > Hello Claude,
> > 
> > as far as I know strongSwan does not treat '*' in the subject
> > Distinguished Name as a wildcard in comparisons with an IKEv2 ID.
> > 
> > strongSwan rather treats a '*' in an IKEv2 ID as a wildcard in
> > comparisons with IDs contained in a certificate.
> > 
> > Regards
> > 
> > Andreas
> > 
> > On 07.07.2010 10:39, Claude Tompers wrote:
> > > Hello,
> > > 
> > > I'm trying to make strongswan work with our wildcard certificate, but I'm 
> > > getting a strange error.
> > > 
> > > Here's my log :
> > > 
> > > Jul  7 10:34:08 vpn6-test charon: 12[CFG]   id 'vpn6-pub.restena.lu' not 
> > > confirmed by certificate, defaulting to 'C=LU, ST=n/a, L=Luxembourg, 
> > > O=Fondation RESTENA, CN=*.restena.lu'
> > > 
> > > So far I think this is not a problem, but then :
> > > 
> > > Jul  7 10:34:18 vpn6-test charon: 10[IKE] no private key found for 'C=LU, 
> > > ST=n/a, L=Luxembourg, O=Fondation RESTENA, CN=*.restena.lu'
> > > 
> > > The wildcard certificate work perfectly on other servers.
> > > I installed the certificate exactly the same way as my self-signed 
> > > before. That one worked perfectly.
> > > 
> > > Is it possible the the "/" or the "*" characters make some issues ?
> > > 
> > > thanks a lot in advance
> > > 
> > > kind regards
> > > Claude
> > 
> > ==
> > Andreas Steffen andreas.stef...@strongswan.org
> > strongSwan - the Linux VPN Solution!www.strongswan.org
> > Institute for Internet Technologies and Applications
> > University of Applied Sciences Rapperswil
> > CH-8640 Rapperswil (Switzerland)
> > ===[ITA-HSR]==
> > 
> > 
> 
> 

-- 
Claude Tompers
Ingénieur réseau et système
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la 
Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473


signature.asc
Description: This is a digitally signed message part.
___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users

Re: [strongSwan] route-client error

2010-07-09 Thread Claude Tompers
Hi,

I still get that "unknown interface version" error if I'm trying to start pluto 
as non-privileged user, followed by the deletion of the SA.
Is there some fix to my issue or do I have to run strongswan as root as long as 
I use pluto ?

thanks a lot for your help

kind regards,
Claude


On Wednesday 07 July 2010 10:11:50 Claude Tompers wrote:
> Hi,
> 
> I've had it already compiled with --with-capabilities=libcap .
> I've tried sudo'ing and it has changed something, but I think there are still 
> missing some bits.
> 
> Here's the new log error :
> 
> Jul  2 13:33:56 vpn6-test pluto[3286]: "cisco-vpn"[6] 192.168.3.18:58180 #6: 
> up-client output: /usr/local/libexec/ipsec/_updown: unknown interface version 
> `'
> Jul  2 13:33:56 vpn6-test pluto[3286]: "cisco-vpn"[6] 192.168.3.18:58180 #6: 
> up-client command exited with status 2
> Jul  2 13:33:56 vpn6-test pluto[3286]: "cisco-vpn"[6] 192.168.3.18:58180 #6: 
> ERROR: netlink response for Del SA esp.63e0a...@192.168.1.13 included errno 
> 3: No such process
> Jul  2 13:33:57 vpn6-test pluto[3286]: "cisco-vpn"[6] 192.168.3.18:58180 #5: 
> ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x919ff160) not found (maybe 
> expired)
> Jul  2 13:33:57 vpn6-test pluto[3286]: "cisco-vpn"[6] 192.168.3.18:58180 #5: 
> ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0x63e0a322) not found (maybe 
> expired)
> 
> kind regards
> Claude
> 
> 
> On Friday 02 July 2010 12:13:21 Martin Willi wrote:
> > Hi,
> > 
> > > I've compiled strongswan with user vpn and group vpn.
> > 
> > If you use non-root users, you'll need support for capability handling
> > too. Add --with-capabilities=libcap to ./configure.
> > 
> > > route-client output: Not sufficient rights to flush
> > 
> > It is not possible to propagate the capabilities to the updown script.
> > Pluto uses the updown script not only for firewalling, but also for
> > route installation. 
> > You'll have to run the updown script with root privileges. Never tried
> > it, but file system based capability settings might work. Another
> > alternative is to define
> >   leftupdown="sudo ipsec _updown"
> > and configure sudo accordingly.
> > 
> > Regards
> > Martin
> > 
> > 
> 
> 

-- 
Claude Tompers
Ingénieur réseau et système
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la 
Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473


signature.asc
Description: This is a digitally signed message part.
___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users