Hello,

I have installed the IKEv2 VPN connection at my colleague's laptop and he disappointingly noticed that there is no password authentication in addition to certificate.

This is also akward because we would have to change all certificates if i.e. one laptop configured for the Faculty VPN was lost or stolen. :-(

I tried to setup Windows 10 native VPN client with IKEv2 + username + password and pam-authorize=yes in /etc/ipsec.d/ikev2.conf

What I receive is rather odd: it seems that certificate rightid is taken as the username, instead of Windows-provided username and password:

Jan 20 09:45:03.533192: "MYCONN-ikev2-cp"[2] 193.198.186.218 #1: IKEv2 FAILED during pam_authenticate with 'User not known to the underlying authentication modu le' for state #1, MYCONN-ikev2-cp[2] user=CN=pc-mtodorov.alu.hr, O=ALU-UNIZG. Jan 20 09:45:03.533787: | PAM: #1: PAM-process completed for user 'CN=pc-mtodorov.alu.hr, O=ALU-UNIZG' with result FAILURE

I would like to authenticate users from Linux server's /etc/passwd. Is that possible?
I failed to Google anything on IKEv2 PAM authentication.

My /etc/ipsec.d/ikev2.conf is rather standard, and it works perfectly when I disable PAM auth:

conn MYCONN-ikev2-cp
        # The server's actual IP goes here - not elastic IPs
        left=161.53.235.3
        leftcert=vpn.alu.hr
        [email protected]
        leftsendcert=always
        leftsubnet=0.0.0.0/0
        leftrsasigkey=%cert
        # Clients
        right=%any
        # your addresspool to use - you might need NAT rules if providing full internet to clients
        rightaddresspool=192.168.101.10-192.168.101.253
        # optional rightid with restrictions
        # rightid="O=ALU-UNIZG,CN=win7client.alu.hr"
        rightca=%same
        rightrsasigkey=%cert
        #
        # connection configuration
        # DNS servers for clients to use
        modecfgdns=8.8.8.8,192.168.100.1
        # Versions up to 3.22 used modecfgdns1 and modecfgdns2
        #modecfgdns1=8.8.8.8
        #modecfgdns2=193.110.157.123
        narrowing=yes
        # recommended dpd/liveness to cleanup vanished clients
        dpddelay=30
        dpdtimeout=120
        dpdaction=clear
        auto=add
        ikev2=insist
        rekey=no
esp=aes_gcm256,aes_gcm128,aes256-sha2_512,aes128-sha2_512,aes256-sha1,aes128-sha1
        # esp=aes_gcm256-null,aes_gcm128-null,aes256-sha2_512,aes128-sha2_512,aes256-sha1,aes128-sha1,aes_gcm256-null;modp1024
        # ikev2 fragmentation support requires libreswan 3.14 or newer
        fragmentation=yes
        # optional PAM username verification (eg to implement bandwidth quota
        # pam-authorize=yes
        ms-dh-downgrade=yes
        authby=rsa-sha1
        # authby=ecdsa

Kind regards,
Mirsad

--
Mirsad Goran Todorovac
CARNet sistem inženjer
Grafički fakultet | Akademija likovnih umjetnosti
Sveučilište u Zagrebu
--
CARNet system engineer
Faculty of Graphic Arts | Academy of Fine Arts
University of Zagreb, Republic of Croatia
tel. +385 (0)1 3711 451
mob. +385 91 57 88 355

_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to