Hi,
I'm currently banging my head against the wall in trying to get a Nokia
E71 (Nokia VPN Client 3.1) connect to strongswan 4.2.9. It fails with
the following error on the Symbian VPN Client Log:

Error: Failed to activate VPN access point 'VPN nokia', reason code -15

As far as I can see, the tunnel is built just fine, it's just the Nokia
that's freaking out. Sooo... maybe someone from the nokia front here who
can give me a tip in the right direction?

Btw, the whole thing with the exact same certificates is working
perfectly with the Strongswan NetworkManager Plugin.

Have a nice weekend,
Robert


This is the serverside config I'm using:

/etc/ipsec.conf:
<snip>
config setup
        # charondebug="ike 2, cfg 2, knl 2, dmn 2"
        plutostart=no

ca strongswan
        cacert=/etc/ssl/test.com/cacerts/cacert.pem
        crluri=file://localhost/etc/ssl/test.com/crls/crl.pem
        auto=add

conn roadwarrior
        left=%any
        leftsubnet=192.168.0.0/24
        leftcert=/etc/ssl/test.com/certs/vpn_cert.pem
        left...@sun.test.com
        right=%any
        rightsourceip=10.38.241.0/24
        keyexchange=ikev2
</snip>

The phone settings were done using the rather nice (german) tutorial
from [1]. The actual Settings in the "Nokia Mobile VPN Client Tool" were:

<snip>
Policy name: Home intern
VPN gateway address: sun.dyndns.org
IKE mode: IKEv2
Authentication method: RSA_SIGNATURES
Identity type:
Remote ID type:
Certificate:
Private key:
Subject DN suffix:
RFC822NAME (FQDN):
Key length: 1024
Format: BIN
Data: [cacert.pem]
PKCS file: [nokia.p12]
VPC file:
</snip>

[1] http://mopoinfo.vpn.uni-freiburg.de/node/80

And below is the relevant output of /var/log/daemon.log (all IP
addresses and domains are purely fictional) - for better readability
please see http://paste.debian.net/54362/:

<snip>
Dec 18 12:10:16 sun charon: 01[JOB] spawning 16 worker threads
Dec 18 12:10:16 sun charon: 03[CFG] received stroke: add ca 'strongswan'
Dec 18 12:10:16 sun charon: 03[LIB]   loaded certificate file
'/etc/ssl/test.com/cacerts/cacert.pem'
Dec 18 12:10:16 sun charon: 03[CFG] added ca 'strongswan'
Dec 18 12:10:16 sun charon: 03[CFG] received stroke: add connection
'roadwarrior'
Dec 18 12:10:16 sun charon: 03[CFG] left nor right host is our side,
assuming left=local
Dec 18 12:10:16 sun charon: 03[LIB]   loaded certificate file
'/etc/ssl/test.com/certs/vpn_cert.pem'
Dec 18 12:10:16 sun charon: 03[CFG]   peerid sun.test.com not confirmed
by certificate, defaulting to subject DN
Dec 18 12:10:16 sun charon: 03[CFG] added configuration 'roadwarrior':
%any[C=DE, ST=AB, L=Test, O=Test, OU=IT Department,
CN=vpn.test.com]...%any[%any]
Dec 18 12:10:16 sun charon: 03[CFG] adding virtual IP address pool
'roadwarrior': 10.38.241.0/24

#### now the fun begins ####

Dec 18 12:11:30 sun charon: 12[NET] received packet: from
80.xxx.xxx.xxx[13054] to 192.168.0.1[500]
Dec 18 12:11:30 sun charon: 12[ENC] parsed IKE_SA_INIT request 0 [ SA KE
No N(NATD_S_IP) N(NATD_D_IP) ]
Dec 18 12:11:30 sun charon: 12[IKE] 80.xxx.xxx.xxx is initiating an IKE_SA
Dec 18 12:11:30 sun charon: 12[IKE] local host is behind NAT, sending
keep alives
Dec 18 12:11:30 sun charon: 12[IKE] remote host is behind NAT
Dec 18 12:11:30 sun charon: 12[IKE] sending cert request for "C=DE,
ST=AB, L=Test, O=Test, OU=IT Department, CN=ca.test.com"
Dec 18 12:11:30 sun charon: 12[ENC] generating IKE_SA_INIT response 0 [
SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ ]
Dec 18 12:11:30 sun charon: 12[NET] sending packet: from
192.168.0.1[500] to 80.xxx.xxx.xxx[13054]
Dec 18 12:11:31 sun charon: 13[NET] received packet: from
80.xxx.xxx.xxx[41035] to 192.168.0.1[4500]
Dec 18 12:11:31 sun charon: 13[ENC] parsed IKE_AUTH request 1 [ IDi CERT
N(INIT_CONTACT) CERTREQ AUTH CP SA TSi TSr ]
Dec 18 12:11:31 sun charon: 13[IKE] received cert request for "C=DE,
ST=AB, L=Test, O=Test, OU=IT Department, CN=vpn.test.com"
Dec 18 12:11:31 sun charon: 13[IKE] received end entity cert "C=DE,
ST=AB, L=Test, O=Test, OU=IT Department, cn=no...@test.com"
Dec 18 12:11:31 sun charon: 13[CFG]   using certificate "C=DE, ST=AB,
L=Test, O=Test, OU=IT Department, cn=no...@test.com"
Dec 18 12:11:31 sun charon: 13[CFG]   using trusted ca certificate
"C=DE, ST=AB, L=Test, O=Test, OU=IT Department, CN=ca.test.com"
Dec 18 12:11:31 sun charon: 13[CFG] checking certificate status of
"C=DE, ST=AB, L=Test, O=Test, OU=IT Department, cn=no...@test.com"
Dec 18 12:11:31 sun charon: 13[CFG]   fetching crl from
'file://localhost/etc/ssl/test.com/crls/crl.pem' ...
Dec 18 12:11:31 sun charon: 13[LIB] L0 - certificateList: ASN1 tag 0x30
expected, but is 0x2d
Dec 18 12:11:31 sun charon: 13[LIB] failed to create a builder for
credential type CRED_CERTIFICATE, subtype (2)
Dec 18 12:11:31 sun charon: 13[CFG] crl fetched successfully but parsing
failed
Dec 18 12:11:31 sun charon: 13[CFG] certificate status is not available
Dec 18 12:11:31 sun charon: 13[IKE] authentication of 'C=DE, ST=AB,
L=Test, O=Test, OU=IT Department, cn=no...@test.com' with RSA signature
successful
Dec 18 12:11:31 sun charon: 13[CFG] found matching peer config
"roadwarrior": C=DE, ST=AB, L=Test, O=Test, OU=IT Department,
CN=vpn.test.com...%any with prio 2.2
Dec 18 12:11:31 sun charon: 13[IKE] authentication of 'C=DE, ST=AB,
L=Test, O=Test, OU=IT Department, CN=vpn.test.com' (myself) with RSA
signature successful
Dec 18 12:11:31 sun charon: 13[IKE] scheduling reauthentication in 10217s
Dec 18 12:11:31 sun charon: 13[IKE] maximum IKE_SA lifetime 10757s
Dec 18 12:11:31 sun charon: 13[IKE] IKE_SA roadwarrior[1] established
between 192.168.0.1[C=DE, ST=AB, L=Test, O=Test, OU=IT Department,
CN=vpn.test.com]...80.xxx.xxx.xxx[C=DE, ST=AB, L=Test, O=Test, OU=IT
Department, cn=no...@test.com]
Dec 18 12:11:31 sun charon: 13[IKE] peer requested virtual IP %any
Dec 18 12:11:31 sun charon: 13[IKE] assigning virtual IP 10.38.241.1 to peer
Dec 18 12:11:31 sun charon: 13[IKE] CHILD_SA roadwarrior{1} established
with SPIs c7347aae_i 27c296e8_o and TS 192.168.0.0/24 === 10.38.241.1/32
Dec 18 12:11:31 sun charon: 13[ENC] generating IKE_AUTH response 1 [ IDr
AUTH CP SA TSi TSr N(AUTH_LFT) ]
Dec 18 12:11:31 sun charon: 13[NET] sending packet: from
192.168.0.1[4500] to 80.xxx.xxx.xxx[41035]
Dec 18 12:11:51 sun charon: 15[IKE] sending keep alive
Dec 18 12:11:51 sun charon: 15[NET] sending packet: from
192.168.0.1[4500] to 80.xxx.xxx.xxx[41035]
Dec 18 12:12:11 sun charon: 17[IKE] sending keep alive
Dec 18 12:12:11 sun charon: 17[NET] sending packet: from
192.168.0.1[4500] to 80.xxx.xxx.xxx[41035]
Dec 18 12:12:31 sun charon: 08[IKE] sending keep alive
Dec 18 12:12:31 sun charon: 08[NET] sending packet: from
192.168.0.1[4500] to 80.xxx.xxx.xxx[41035]
Dec 18 12:12:51 sun charon: 09[IKE] sending keep alive
Dec 18 12:12:51 sun charon: 09[NET] sending packet: from
192.168.0.1[4500] to 80.xxx.xxx.xxx[41035]
Dec 18 12:13:11 sun charon: 10[IKE] sending keep alive
Dec 18 12:13:11 sun charon: 10[NET] sending packet: from
192.168.0.1[4500] to 80.xxx.xxx.xxx[41035]
Dec 18 12:13:31 sun charon: 11[IKE] sending keep alive
Dec 18 12:13:31 sun charon: 11[NET] sending packet: from
192.168.0.1[4500] to 80.xxx.xxx.xxx[41035]
Dec 18 12:13:51 sun charon: 12[IKE] sending keep alive
Dec 18 12:13:51 sun charon: 12[NET] sending packet: from
192.168.0.1[4500] to 80.xxx.xxx.xxx[41035]
</snip>
_______________________________________________
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to