Re: [strongSwan] A couple of offerings for the community

2019-01-28 Thread Tobias Brunner
Hi Derek,

> (1) An IKEv2 profile importer for Windows 10, modeled on the
> strongSwan profile importer for Android:
> https://github.com/dcamero2016/vpn-importer

Nice idea.  local.ca is wrong, though, it's the CA certificate to verify
the remote's certificate, it hasn't necessarily anything to do with the
client's authentication or certificate (i.e. should be remote.ca, or
remote.cert to keep it compatible with our format).  And why change
local.p12 to local.pfx?  (It's still a PKCS#12 container, no?)

Regards,
Tobias


Re: [strongSwan] A couple of offerings for the community

2019-01-28 Thread Derek Cameron
I will look into changing local.ca to something more appropriate.

Originally I wanted to use p12 files with everything in them (CA cert,
client cert, client key), but this created messiness on the Windows
end. This is why I separated out the CA cert, with the client cert and
the client key going into a pfx file.

Regards,

Derek.

On Mon, Jan 28, 2019 at 1:32 AM Tobias Brunner  wrote:
>
> Hi Derek,
>
> > (1) An IKEv2 profile importer for Windows 10, modeled on the
> > strongSwan profile importer for Android:
> > https://github.com/dcamero2016/vpn-importer
>
> Nice idea.  local.ca is wrong, though, it's the CA certificate to verify
> the remote's certificate, it hasn't necessarily anything to do with the
> client's authentication or certificate (i.e. should be remote.ca, or
> remote.cert to keep it compatible with our format).  And why change
> local.p12 to local.pfx?  (It's still a PKCS#12 container, no?)
>
> Regards,
> Tobias


Re: [strongSwan] A couple of offerings for the community

2019-01-28 Thread Tobias Brunner
Hi Derek,

> Originally I wanted to use p12 files with everything in them (CA cert,
> client cert, client key), but this created messiness on the Windows
> end.

As mentioned in the previous mail, the CA certificate that issued the
client and server certificates don't have to be the same (often they
aren't).  Does Windows require the complete chain for the client
certificate?

> This is why I separated out the CA cert, with the client cert and
> the client key going into a pfx file.

Because you expect the PKCS#12/PFX file in local.p12 to contain CA
certificates?  That isn't necessarily the case, it could just as well be
only the client certificate and key (because the issuing CA certificate
is not required on Android).  Providing CA certificates to verify the
server certificate (if it's even necessary) via remote.cert is usually
better anyway as that avoids warnings on older Android releases (and
maybe cleaner if the CAs are different).

Regards,
Tobias