On 1.2.2022. 2:53, Paul Wouters wrote:
On Fri, 28 Jan 2022, Mirsad Goran Todorovac wrote:

Thank you, PLUTO_PEER_ID was exactly what I wanted, and it wasn't documented ;-)
 Could I possibly log the information which certificate was used when the
 IKEv2 connection was established?

 Yes, if you check the _updown script you should see all the environment
 variables we pass into it from our pluto daemon. Or you can check the
 function jam_common_shell_out() in programs/pluto/kernel.c (we might
 have not always updated the _updown env variables comments there)

This was a very useful advice. Don't worry about the script not being updated, nobody
throws a gem because it was not polished :-)

I've updated the variable list:

https://github.com/libreswan/libreswan/commit/beb07948532b6a0a9ff3435f21c44e6e62f1f596
I could also contribute my work on modifying pam_url to make it do a passwordless auth based
on an authorization file lookup:

[1] https://domac.alu.hr/~mtodorov/contrib/pam_url_0.3.3.mod.diff
[2] PHP authorization script: https://domac.alu.hr/~mtodorov/contrib/myauth.php.txt [3] sample /usr/local/etc/vpn-ikev2-authorized file: https://domac.alu.hr/~mtodorov/contrib/vpn-ikev2-authorized

... because otherwise it will not work (for pam_url to ask for password or auth token when the client is authenticated via certificate and there is no EAP/MS-CHAP v2.

So, the user is authorized via cert, but he can be blacklisted in authorization file. In fact, he must be
whitelisted to be authorized in the PAM auth pass.

Hope this helps someone.

Kind regards,
Mirsad

--
Mirsad Todorovac
CARNet system engineer
Faculty of Graphic Arts | Academy of Fine Arts
University of Zagreb
Republic of Croatia, the European Union
--
CARNet sistem inženjer
Grafički fakultet | Akademija likovnih umjetnosti
Sveučilište u Zagrebu

_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to