[strongSwan] Help regarding eap-sim-pcsc plugin of Strongswan

2012-01-09 Thread Deepika Agarwal
Hi Alan,

I was trying to use the eap-sim-pcsc plugin of strongswan and facing some
issues while testing it.I came across one of your threads in strongswan
mailer list where you mentioned that you used this plugin.I am stuck at one
of the parts and getting the following error on the client side:


<<
root@ubuntu5-desktop:/home/ubuntu5# ipsec up android
initiating IKE_SA android[2] to 192.168.1.154
generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
sending packet: from 192.168.1.8[500] to 192.168.1.154[500]
received packet: from 192.168.1.154[500] to 192.168.1.8[500]
parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP)
N(MULT_AUTH) ]
sending cert request for "C=UK, CN=nits"
establishing CHILD_SA android
generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ IDr SA TSi TSr
N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
sending packet: from 192.168.1.8[4500] to 192.168.1.154[4500]
received packet: from 192.168.1.154[4500] to 192.168.1.8[4500]
parsed IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ]
received end entity cert "C=UK, CN=nits"
  using certificate "C=UK, CN=nits"
  using trusted ca certificate "C=UK, CN=nits"
checking certificate status of "C=UK, CN=nits"
certificate status is not available
  reached self-signed root ca with a path length of 0
authentication of '192.168.1.154' with RSA signature successful
server requested EAP_IDENTITY (id 0x00), sending '9404118100734530'
generating IKE_AUTH request 2 [ EAP/RES/ID ]
sending packet: from 192.168.1.8[4500] to 192.168.1.154[4500]
received packet: from 192.168.1.154[4500] to 192.168.1.8[4500]
parsed IKE_AUTH response 2 [ EAP/FAIL ]
received EAP_FAILURE, EAP authentication failed
root@ubuntu5-desktop:/home/ubuntu5# ipsec up android
initiating IKE_SA android[3] to 192.168.1.154
generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) ]
sending packet: from 192.168.1.8[500] to 192.168.1.154[500]
received packet: from 192.168.1.154[500] to 192.168.1.8[500]
parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP)
N(MULT_AUTH) ]
sending cert request for "C=UK, CN=nits"
establishing CHILD_SA android
generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ IDr SA TSi TSr
N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
sending packet: from 192.168.1.8[4500] to 192.168.1.154[4500]
received packet: from 192.168.1.154[4500] to 192.168.1.8[4500]
parsed IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ]
received end entity cert "C=UK, CN=nits"
  using certificate "C=UK, CN=nits"
  using trusted ca certificate "C=UK, CN=nits"
checking certificate status of "C=UK, CN=nits"
certificate status is not available
  reached self-signed root ca with a path length of 0
authentication of '192.168.1.154' with RSA signature successful
server requested EAP_IDENTITY (id 0x00), sending '9404118100734530'
generating IKE_AUTH request 2 [ EAP/RES/ID ]
sending packet: from 192.168.1.8[4500] to 192.168.1.154[4500]
received packet: from 192.168.1.154[4500] to 192.168.1.8[4500]
parsed IKE_AUTH response 2 [ EAP/REQ/SIM ]
server requested EAP_SIM authentication (id 0xCA)
generating IKE_AUTH request 3 [ EAP/RES/SIM ]
sending packet: from 192.168.1.8[4500] to 192.168.1.154[4500]
received packet: from 192.168.1.154[4500] to 192.168.1.8[4500]
parsed IKE_AUTH response 3 [ EAP/REQ/SIM ]
*EAP_SIM MAC verification failed*
sending client error 'unable to process packet'
generating IKE_AUTH request 4 [ EAP/RES/SIM ]
sending packet: from 192.168.1.8[4500] to 192.168.1.154[4500]
received packet: from 192.168.1.154[4500] to 192.168.1.8[4500]
parsed IKE_AUTH response 4 [ EAP/FAIL ]
*received EAP_FAILURE, EAP authentication failed*
root@ubuntu5-desktop:/home/ubuntu5#
>>>

I was wondering if you can suggest if I'm missing something while testing
the plugin.My main doubts are:

1) Whether the eap-sim-pcsc plugin supports sim card based authentication.
If yes, then what should be the username and keys format that needs to be
stored on the radius server .
2) Is there any other dependencies for using this plugin?

 Thanks
Deepika
-- 
If you think you can or if you think you can't, you are right.
-Henry Ford
___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users

Re: [strongSwan] How to disable 'CRL' in strongswan.conf?

2012-01-09 Thread Andreas Steffen
Hello Yong Choo,

you can do that with an explicit load statement in strongswan.conf.

Just prepare two versions of strongswan.conf - one with the
revocation plugin in the load statement and one without it.
Depending on the situation you either start strongSwan with
one strongswan.conf or the second one. Is this dynamical enough?

Regards

Andreas

On 09.01.2012 20:59, Yong Choo wrote:
> Searching in database, I came up on the following in
> http://www.mail-archive.com/users@lists.strongswan.org/msg03918.html
> So, the question is 'how not to load the revocation plugin when it is
> already enabled by default?'
> 
> -Original Message-
> From: Andreas Steffen [mailto:andreas.stef...@strongswan.org] 
> Sent: jeudi 24 novembre 2011 12:51
> To: ABULIUS, MUGUR (MUGUR)
> Cc: users@lists.strongswan.org; SCARAZZINI, FABRICE (FABRICE); Pisano, 
> Stephen 
> G (Stephen); WASNIEWSKI, ALAIN (ALAIN)
> Subject: Re: [strongSwan] How to bypass CRL checks?
> 
> Hello Mugur,
> 
> with IKEv2 revocation checks can be easily disabled by not loading the 
> revocation plugin. What is not possible is to disable CRL checking on a per 
> connection definition basis.
> 
> Regards
> 
> Andreas
> 
> 
> 
> On 1/9/2012 12:30 PM, Yong Choo wrote:
>> Hi,
>> Looking at http://wiki.strongswan.org/projects/1/wiki/441,
>> OCSP/CRL checking in IKEv2 has been moved to the revocation plugin,
>> enabled
>> by default. Plase update manual load directives in strongswan.conf.
>>
>> How can I disable this plugin dynamically? We have a need of
>> dynamically controlling the loading of plugin at run-time.
>>
>> Thanks Much,
>> -Yong Choo

==
Andreas Steffen andreas.stef...@strongswan.org
strongSwan - the Linux VPN Solution!www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===[ITA-HSR]==



smime.p7s
Description: S/MIME Cryptographic Signature
___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users

Re: [strongSwan] Problem exporting pkcs12-File

2012-01-09 Thread Andreas Steffen
4.4.0 certainly doesn't support PEM output yet, so please upgrade
if possible to 4.6.1, although some 4.5.x versions should already
come with PEM conversion. And yes you have to add

  --outform pem

to both certificates and keys since the default is always binary
DER format.

Regards

Andreas

On 09.01.2012 12:05, Stefan Malte Schumacher wrote:
> 2012/1/9 Andreas Steffen :
>> Hello Stefan,
>>
>> could it be that you are using an older strongSwan version where
>> the ipsec pki commands do not support PEM format output yet, even
>> though the --outform option already exists?
>>
>> Regards
>>
> Hello Andreas
> 
> I am currently using strongSwan 4.4.0-4.1.1.i586, which came with my
> distribution. Should I update to a more current version?  Just to be
> sure: I have to use the --outform pem-Option for both the keys AND the
> certificates, correct?
> 
> Yours
> Stefan Malte Schumacher


-- 
==
Andreas Steffen andreas.stef...@strongswan.org
strongSwan - the Linux VPN Solution!www.strongswan.org
Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===[ITA-HSR]==



smime.p7s
Description: S/MIME Cryptographic Signature
___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users

Re: [strongSwan] How to disable 'CRL' in strongswan.conf?

2012-01-09 Thread Yong Choo
Searching in database, I came up on the following in 
http://www.mail-archive.com/users@lists.strongswan.org/msg03918.html
So, the question is 'how not to load the revocation plugin when it is 
already enabled by default?'


-Original Message-
From: Andreas Steffen [mailto:andreas.stef...@strongswan.org]
Sent: jeudi 24 novembre 2011 12:51
To: ABULIUS, MUGUR (MUGUR)
Cc: users@lists.strongswan.org; SCARAZZINI, FABRICE (FABRICE); Pisano, Stephen
G (Stephen); WASNIEWSKI, ALAIN (ALAIN)
Subject: Re: [strongSwan] How to bypass CRL checks?

Hello Mugur,

with IKEv2 revocation checks can be easily disabled by not loading the
revocation plugin. What is not possible is to disable CRL checking on a per
connection definition basis.

Regards

Andreas



On 1/9/2012 12:30 PM, Yong Choo wrote:

Hi,
Looking at http://wiki.strongswan.org/projects/1/wiki/441,
OCSP/CRL checking in IKEv2 has been moved to the revocation plugin, 
enabled

by default. Plase update manual load directives in strongswan.conf.

How can I disable this plugin dynamically? We have a need of 
dynamically controlling the loading of plugin at run-time.


Thanks Much,
-Yong Choo


___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users
___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users

[strongSwan] How to disable 'CRL' in strongswan.conf?

2012-01-09 Thread Yong Choo

Hi,
Looking at http://wiki.strongswan.org/projects/1/wiki/441,
OCSP/CRL checking in IKEv2 has been moved to the revocation plugin, enabled
by default. Plase update manual load directives in strongswan.conf.

How can I disable this plugin dynamically? We have a need of dynamically 
controlling the loading of plugin at run-time.


Thanks Much,
-Yong Choo
___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users

Re: [strongSwan] Tunnel layer 2 with ipsec

2012-01-09 Thread Klaus Darilion


On 02.01.2012 14:53, nima chavooshi wrote:
> Hi
> Is it possible that I forward layer 2 packet in ipsec tunnel??

I can not comment about IPSec, but I use OpenVPN for L2 tunneling and it 
works very well.

Klaus


___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users


Re: [strongSwan] Problem exporting pkcs12-File

2012-01-09 Thread Stefan Malte Schumacher
2012/1/9 Andreas Steffen :
> Hello Stefan,
>
> could it be that you are using an older strongSwan version where
> the ipsec pki commands do not support PEM format output yet, even
> though the --outform option already exists?
>
> Regards
>
Hello Andreas

I am currently using strongSwan 4.4.0-4.1.1.i586, which came with my
distribution. Should I update to a more current version?  Just to be
sure: I have to use the --outform pem-Option for both the keys AND the
certificates, correct?

Yours
Stefan Malte Schumacher

___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users