Hi all,
I have configured Ikev2 in strongswan version 4.3.6 as below.
ipsec.conf on Host1
Ipsec.secrets on host1
Ipsec.conf on host2
Ipsec.secrets on host2
The Certificates are IP addresses based.
Host1 is made to act as responder alone. Ipsec connections are initiated from
Host2 always.
With above configuration, both connections r1~v1 and r2~v2 gets established
(Initiated from Host2).
Logs at Host1(Responder)
10[IKE] (vr2)14.0.0.2 is initiating an IKE_SA
10[IKE] sending cert request for "C=de, ST=Bayern, L=Munich, O=Nokia Siemens
Networks, OU=RTP, CN=www.nokiasiemensnetworks.com, [email protected]"
09[IKE] received cert request for "C=de, ST=Bayern, L=Munich, O=Nokia Siemens
Networks, OU=RTP, CN=www.nokiasiemensnetworks.com, [email protected]"
09[IKE] received end entity cert "C=de, ST=Bayern, L=Munich, O=Nokia Siemens
Networks, OU=RTP, CN=ATCA_eipu2, [email protected]"
09[CFG] looking for peer configs matching
(vr2)30.0.0.1[(vr*)%any]...(vr2)14.0.0.2[(vr*)14.0.0.2]
09[CFG] selected peer config 'r1~v1'
09[CFG] using certificate "C=de, ST=Bayern, L=Munich, O=Nokia Siemens
Networks, OU=RTP, CN=ATCA_eipu2, [email protected]"
09[CFG] using trusted ca certificate "C=de, ST=Bayern, L=Munich, O=Nokia
Siemens Networks, OU=RTP, CN=www.nokiasiemensnetworks.com,
[email protected]"
09[CFG] checking certificate status of "C=de, ST=Bayern, L=Munich, O=Nokia
Siemens Networks, OU=RTP, CN=ATCA_eipu2, [email protected]"
09[CFG] certificate status is not available
09[CFG] reached self-signed root ca with a path length of 0
09[IKE] authentication of '(vr*)14.0.0.2' with RSA signature successful
09[IKE] authentication of '(vr*)30.0.0.1' (myself) with RSA signature successful
10[IKE] 13.0.0.2 is initiating an IKE_SA
10[IKE] sending cert request for "C=de, ST=Bayern, L=Munich, O=Nokia Siemens
Networks, OU=RTP, CN=www.nokiasiemensnetworks.com, [email protected]"
12[IKE] received cert request for "C=de, ST=Bayern, L=Munich, O=Nokia Siemens
Networks, OU=RTP, CN=www.nokiasiemensnetworks.com, [email protected]"
12[IKE] received end entity cert "C=de, ST=Bayern, L=Munich, O=Nokia Siemens
Networks, OU=RTP, CN=ATCA_eipu, [email protected]"
12[CFG] looking for peer configs matching
20.0.0.1[(vr*)%any]...13.0.0.2[(vr*)13.0.0.2]
12[CFG] selected peer config 'r2~v2'
12[CFG] using certificate "C=de, ST=Bayern, L=Munich, O=Nokia Siemens
Networks, OU=RTP, CN=ATCA_eipu, [email protected]"
12[CFG] using trusted ca certificate "C=de, ST=Bayern, L=Munich, O=Nokia
Siemens Networks, OU=RTP, CN=www.nokiasiemensnetworks.com,
[email protected]"
12[CFG] checking certificate status of "C=de, ST=Bayern, L=Munich, O=Nokia
Siemens Networks, OU=RTP, CN=ATCA_eipu, [email protected]"
12[CFG] certificate status is not available
12[CFG] reached self-signed root ca with a path length of 0
12[IKE] authentication of '(vr*)13.0.0.2' with RSA signature successful
12[IKE] authentication of '(vr*)20.0.0.1' (myself) with RSA signature successful
But same configuration with secrets does not go through fine.
Host1 ipsec.conf, ipsec.secrets
Host 2 ipsec.conf, ipsec.secrets
When r1~v1, r2~v2 are initiated from Host2, Host1 fails the authentication with
below error :-
09[IKE] (vr2)14.0.0.2 is initiating an IKE_SA
09[IKE] sending cert request for "C=de, ST=Bayern, L=Munich, O=Nokia Siemens
Networks, OU=RTP, CN=www.nokiasiemensnetworks.com, [email protected]"
08[IKE] received cert request for "C=de, ST=Bayern, L=Munich, O=Nokia Siemens
Networks, OU=RTP, CN=www.nokiasiemensnetworks.com, [email protected]"
08[CFG] looking for peer configs matching
(vr2)30.0.0.1[(vr*)%any]...(vr2)14.0.0.2[(vr*)14.0.0.2]
08[CFG] selected peer config 'r1~v1'
08[IKE] no shared key found for '(vr*)%any' - '(vr*)14.0.0.2'
11[IKE] 13.0.0.2 is initiating an IKE_SA
11[IKE] sending cert request for "C=de, ST=Bayern, L=Munich, O=Nokia Siemens
Networks, OU=RTP, CN=www.nokiasiemensnetworks.com, [email protected]"
10[IKE] received cert request for "C=de, ST=Bayern, L=Munich, O=Nokia Siemens
Networks, OU=RTP, CN=www.nokiasiemensnetworks.com, [email protected]"
10[CFG] looking for peer configs matching
20.0.0.1[(vr*)%any]...13.0.0.2[(vr*)13.0.0.2]
10[CFG] selected peer config 'r2~v2'
10[IKE] no shared key found for '(vr*)%any' - '(vr*)13.0.0.2'
As far as my understanding goes, %any identity is looked for in ipsec.secrets
file of HOST1, which is not available and hence the error.
But then for certificates too, %any is not mentioned in ipsec.secrets file,
then how does the authentication goes through fine for both the connections
with the respective private keys at HOST1.
Can someone explain this.
Thanks
Sumit
# ipsec.conf
# FlexiPlatform: IPsec configuration file
config setup
charonstart=yes
plutostart=no
uniqueids=no
charondebug="knl 0,enc 0,net 0"
conn %default
auto=route
keyexchange=ikev2
reauth=no
ca r2~v2
cacert="/etc/ipsec/certs/ipsec.d/cacerts/cacert.pem"
conn r2~v2
rekeymargin=500
rekeyfuzz=100%
left=20.0.0.1
right=0.0.0.0
leftsubnet=20.0.0.1/32
rightsubnet=13.0.0.2/32
leftprotoport=1
rightprotoport=1
authby=rsasig
leftcert="/etc/ipsec/certs/ipsec.d/certs/cfpu-cert.pem"
leftid=20.0.0.1
rightid=%any
ike=aes128-md5-modp768!
esp=aes128-md5!
type=tunnel
ikelifetime=10000s
keylife=5000s
mobike=no
auto=route
reauth=no
encapdscp=yes
vrfid=0
ca r1~v1
cacert="/etc/ipsec/certs/ipsec.d/cacerts/cacert.pem"
conn r1~v1
rekeymargin=500
rekeyfuzz=100%
left=30.0.0.1
right=0.0.0.0
leftsubnet=30.0.0.1/32
rightsubnet=14.0.0.2/32
leftprotoport=1
rightprotoport=1
authby=rsasig
leftcert="/etc/ipsec/certs/ipsec.d/certs/cfpu2-cert.pem"
leftid=30.0.0.1
rightid=%any
ike=aes128-md5-modp768!
esp=aes128-md5!
type=tunnel
ikelifetime=10000s
keylife=5000s
mobike=no
auto=route
reauth=no
encapdscp=yes
vrfid=2
# //etc/ipsec.secrets
# FlexiPlatform: IPSec Pre-Shared-Key file
20.0.0.1 : RSA "/etc/ipsec/certs/ipsec.d/private/cfpu-key.pem"
30.0.0.1 : RSA "/etc/ipsec/certs/ipsec.d/private/cfpu2-key.pem"
# //etc/ipsec.secrets
# FlexiPlatform: IPSec Pre-Shared-Key file
20.0.0.1 13.0.0.2 : RSA "/etc/ipsec/certs/ipsec.d/private/eipu-key.pem"
30.0.0.1 14.0.0.2 : RSA "/etc/ipsec/certs/ipsec.d/private/eipu2-key.pem"
# ipsec.conf
# FlexiPlatform: IPsec configuration file
config setup
charonstart=yes
plutostart=no
uniqueids=no
charondebug="knl 0,enc 0,net 0"
conn %default
auto=route
keyexchange=ikev2
reauth=no
ca r2~v2
cacert="/etc/ipsec/certs/ipsec.d/cacerts/cacert.pem"
conn r2~v2
rekeymargin=50
rekeyfuzz=100%
left=13.0.0.2
right=20.0.0.1
leftsubnet=13.0.0.2/32
rightsubnet=20.0.0.1/32
leftprotoport=1
rightprotoport=1
authby=rsasig
leftcert="/etc/ipsec/certs/ipsec.d/certs/eipu-cert.pem"
leftid=13.0.0.2
rightid=%any
ike=aes128-md5-modp768!
esp=aes128-md5!
type=tunnel
ikelifetime=10000s
keylife=5000s
mobike=no
auto=route
reauth=no
encapdscp=yes
vrfid=0
ca r1~v1
cacert="/etc/ipsec/certs/ipsec.d/cacerts/cacert.pem"
conn r1~v1
rekeymargin=50
rekeyfuzz=100%
left=14.0.0.2
right=30.0.0.1
leftsubnet=14.0.0.2/32
rightsubnet=30.0.0.1/32
leftprotoport=1
rightprotoport=1
authby=rsasig
leftcert="/etc/ipsec/certs/ipsec.d/certs/eipu2-cert.pem"
leftid=14.0.0.2
rightid=%any
ike=aes128-md5-modp768!
esp=aes128-md5!
type=tunnel
ikelifetime=10000s
keylife=5000s
mobike=no
auto=route
reauth=no
encapdscp=yes
vrfid=2
# ipsec.conf
# FlexiPlatform: IPsec configuration file
config setup
charonstart=yes
plutostart=no
uniqueids=no
charondebug="knl 0,enc 0,net 0"
conn %default
auto=route
keyexchange=ikev2
reauth=no
conn r2~v2
rekeymargin=500
rekeyfuzz=100%
left=20.0.0.1
right=0.0.0.0
leftsubnet=20.0.0.1/32
rightsubnet=13.0.0.2/32
leftprotoport=1
rightprotoport=1
authby=secret
leftid=20.0.0.1
rightid=%any
ike=aes128-md5-modp768!
esp=aes128-md5!
type=tunnel
ikelifetime=10000s
keylife=5000s
mobike=no
auto=route
reauth=no
encapdscp=yes
vrfid=0
conn r1~v1
rekeymargin=500
rekeyfuzz=100%
left=30.0.0.1
right=0.0.0.0
leftsubnet=30.0.0.1/32
rightsubnet=14.0.0.2/32
leftprotoport=1
rightprotoport=1
authby=secret
leftid=30.0.0.1
rightid=%any
ike=aes128-md5-modp768!
esp=aes128-md5!
type=tunnel
ikelifetime=10000s
keylife=5000s
mobike=no
auto=route
reauth=no
encapdscp=yes
vrfid=2
# //etc/ipsec.secrets
# FlexiPlatform: IPSec Pre-Shared-Key file
20.0.0.1 : PSK "secret"
30.0.0.1 : PSK "secret2"
# ipsec.conf
# FlexiPlatform: IPsec configuration file
config setup
charonstart=yes
plutostart=no
uniqueids=no
charondebug="knl 0,enc 0,net 0"
conn %default
auto=route
keyexchange=ikev2
reauth=no
conn r2~v2
rekeymargin=50
rekeyfuzz=100%
left=13.0.0.2
right=20.0.0.1
leftsubnet=13.0.0.2/32
rightsubnet=20.0.0.1/32
leftprotoport=1
rightprotoport=1
authby=secret
leftid=13.0.0.2
rightid=%any
ike=aes128-md5-modp768!
esp=aes128-md5!
type=tunnel
ikelifetime=10000s
keylife=5000s
mobike=no
auto=route
reauth=no
encapdscp=yes
vrfid=0
conn r1~v1
rekeymargin=50
rekeyfuzz=100%
left=14.0.0.2
right=30.0.0.1
leftsubnet=14.0.0.2/32
rightsubnet=30.0.0.1/32
leftprotoport=1
rightprotoport=1
authby=secret
leftid=14.0.0.2
rightid=%any
ike=aes128-md5-modp768!
esp=aes128-md5!
type=tunnel
ikelifetime=10000s
keylife=5000s
mobike=no
auto=route
reauth=no
encapdscp=yes
vrfid=2
# //etc/ipsec.secrets
# FlexiPlatform: IPSec Pre-Shared-Key file
20.0.0.1 13.0.0.2 : PSK "secret"
30.0.0.1 14.0.0.2 : PSK "secret2"
# openssl x509 -in cacert.pem -noout -text
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
e2:2b:97:cb:02:70:1b:f3
Signature Algorithm: md5WithRSAEncryption
Issuer: C=de, ST=Bayern, L=Munich, O=Nokia Siemens Networks, OU=RTP,
CN=www.nokiasiemensnetworks.com/[email protected]
Validity
Not Before: Jan 28 10:57:16 2015 GMT
Not After : Feb 27 10:57:16 2015 GMT
Subject: C=de, ST=Bayern, L=Munich, O=Nokia Siemens Networks, OU=RTP,
CN=www.nokiasiemensnetworks.com/[email protected]
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:d9:f9:37:c4:54:74:a5:a3:75:a0:d5:d3:b6:ca:
9c:bd:91:14:72:01:d2:c3:c5:98:9b:eb:18:a6:52:
31:d1:86:69:16:71:17:1c:84:51:22:4a:fa:2e:33:
70:bc:42:27:4b:31:a1:a9:1f:5a:f4:42:15:d8:e6:
7b:dd:87:74:f4:5c:29:0b:20:e9:a7:8e:76:ef:8f:
09:7a:cb:33:e2:99:7e:30:35:86:e6:a5:b0:20:b8:
0d:ff:60:f7:ee:98:64:96:3c:c9:4d:84:75:e2:a5:
b9:cd:ec:63:4a:ff:b4:48:ed:7a:e1:f2:8d:69:84:
d8:2b:cf:7e:61:21:56:03:73
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Key Identifier:
0A:C2:2B:EF:8D:42:2A:D0:A2:4A:A8:C2:0F:F9:CA:12:50:D7:09:DA
X509v3 Authority Key Identifier:
keyid:0A:C2:2B:EF:8D:42:2A:D0:A2:4A:A8:C2:0F:F9:CA:12:50:D7:09:DA
DirName:/C=de/ST=Bayern/L=Munich/O=Nokia Siemens
Networks/OU=RTP/CN=www.nokiasiemensnetworks.com/[email protected]
serial:E2:2B:97:CB:02:70:1B:F3
Signature Algorithm: md5WithRSAEncryption
4a:ba:c8:68:bb:0f:81:0a:59:bc:8f:0e:9c:a8:ae:2e:49:42:
37:b4:2b:e8:20:f7:76:28:56:59:d3:75:d9:03:e0:f9:26:c4:
a7:80:3a:e8:8e:4e:d7:ed:5b:8a:91:5e:0f:7a:2a:62:c5:5c:
0c:6c:cc:64:9c:22:20:ba:86:95:16:ab:db:96:b1:17:e4:42:
2a:e7:22:c2:d1:b8:62:82:a5:e0:13:73:74:73:d3:91:b6:c0:
52:f5:78:92:09:38:3c:35:18:c4:3b:4d:b0:0d:9f:04:db:69:
22:ef:e1:0b:30:49:73:8e:30:34:aa:4f:7c:6d:0c:4f:43:f6:
c2:1e
# openssl x509 -in cfpu-cert.pem -noout -text
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 3 (0x3)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=de, ST=Bayern, L=Munich, O=Nokia Siemens Networks, OU=RTP,
CN=www.nokiasiemensnetworks.com/[email protected]
Validity
Not Before: Jan 28 10:57:16 2015 GMT
Not After : Feb 27 10:57:16 2015 GMT
Subject: C=de, ST=Bayern, L=Munich, O=Nokia Siemens Networks, OU=RTP,
CN=ATCA_cfpu/[email protected]
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:97:36:a3:ee:0e:f9:9a:f5:2e:bf:56:ac:97:87:
4f:8e:6b:db:5b:8d:d9:20:32:be:d0:84:f2:ab:55:
34:a1:c7:de:56:61:75:69:d8:21:f4:30:75:59:43:
c3:79:93:d9:2d:f7:dd:ae:7a:4b:4d:5d:d0:60:29:
48:3c:e5:53:1e:44:83:50:d1:4b:1c:80:71:8d:4b:
3b:92:88:1c:40:d5:e4:2b:fc:1e:c0:ed:72:77:6b:
25:3a:c8:cb:5b:20:04:5a:53:f5:16:c1:5a:21:a8:
f6:f2:01:1d:b0:aa:f5:c3:1f:4d:b0:50:90:63:a4:
5a:0e:36:a6:e7:d3:6b:d5:13
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
X509v3 Key Usage:
Digital Signature, Non Repudiation, Key Encipherment
X509v3 Subject Alternative Name:
IP Address:20.0.0.1
Signature Algorithm: sha1WithRSAEncryption
69:ab:4b:de:f6:1e:3b:2e:aa:f5:08:19:ed:fc:00:fa:1d:1b:
1f:ce:c2:73:14:6c:f9:13:7d:16:1f:3f:0c:5f:ba:b9:51:18:
b1:95:69:fe:b6:e6:bc:f3:02:15:9d:34:f2:8e:ae:be:f6:db:
64:79:7d:26:52:cc:52:52:31:70:78:53:9a:80:dc:58:04:62:
39:6c:8f:d3:0b:65:d1:5a:34:a0:f9:a8:7b:7a:13:ba:87:86:
df:a6:36:51:b4:ac:27:06:dc:76:7b:30:e1:dd:85:ac:d1:71:
13:36:fd:9f:8d:9b:f3:a0:b2:6e:00:a9:f2:53:42:22:24:3e:
5c:bb
# openssl x509 -in cfpu2-cert.pem -noout -text
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 3 (0x3)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=de, ST=Bayern, L=Munich, O=Nokia Siemens Networks, OU=RTP,
CN=www.nokiasiemensnetworks.com/[email protected]
Validity
Not Before: Jan 28 10:57:16 2015 GMT
Not After : Feb 27 10:57:16 2015 GMT
Subject: C=de, ST=Bayern, L=Munich, O=Nokia Siemens Networks, OU=RTP,
CN=ATCA_cfpu2/[email protected]
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:e6:27:25:a0:d9:bf:ec:c7:09:7c:f3:ee:26:7e:
1f:a0:ae:f6:e3:60:1c:3c:bb:cc:1f:2a:81:59:13:
69:69:1a:a6:76:4f:5e:af:b2:06:72:05:f4:c2:e5:
e8:e0:a0:69:af:e6:88:94:95:33:61:8a:71:25:2f:
30:26:db:7e:be:ff:c1:af:cd:07:93:9e:7f:ba:a3:
ec:10:5e:54:46:d5:64:d1:ba:53:d1:5e:05:67:e1:
d7:a3:27:32:61:c4:ed:ba:cf:41:f2:f7:4f:4d:53:
ba:b8:36:21:c4:f1:a1:61:f6:10:8f:55:49:27:5d:
90:8d:90:a4:b7:d3:a6:83:e9
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
X509v3 Key Usage:
Digital Signature, Non Repudiation, Key Encipherment
X509v3 Subject Alternative Name:
IP Address:30.0.0.1
Signature Algorithm: sha1WithRSAEncryption
5f:bd:31:d9:a5:f9:8a:f6:79:86:41:99:ca:8c:5e:4a:97:6d:
2a:35:47:9f:ad:35:78:7b:3a:9c:62:20:d6:63:9d:85:a8:5d:
2c:59:77:0d:d0:da:94:56:70:62:dd:2c:5f:8f:86:15:73:69:
9a:39:b9:a8:1e:00:be:2e:40:4d:cb:62:db:87:dc:b0:57:88:
26:07:a9:22:c5:14:d6:01:1d:0e:bf:4d:8d:3e:cf:8e:f8:9f:
6c:2b:99:39:47:13:b1:d7:9c:4a:2c:b4:50:7d:7c:7a:bc:1c:
34:ad:84:55:6b:53:8d:84:58:ee:bd:8f:aa:0a:a6:fd:c1:97:
87:3c
# openssl x509 -in cacert.pem -noout -text
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
e2:2b:97:cb:02:70:1b:f3
Signature Algorithm: md5WithRSAEncryption
Issuer: C=de, ST=Bayern, L=Munich, O=Nokia Siemens Networks, OU=RTP,
CN=www.nokiasiemensnetworks.com/[email protected]
Validity
Not Before: Jan 28 10:57:16 2015 GMT
Not After : Feb 27 10:57:16 2015 GMT
Subject: C=de, ST=Bayern, L=Munich, O=Nokia Siemens Networks, OU=RTP,
CN=www.nokiasiemensnetworks.com/[email protected]
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:d9:f9:37:c4:54:74:a5:a3:75:a0:d5:d3:b6:ca:
9c:bd:91:14:72:01:d2:c3:c5:98:9b:eb:18:a6:52:
31:d1:86:69:16:71:17:1c:84:51:22:4a:fa:2e:33:
70:bc:42:27:4b:31:a1:a9:1f:5a:f4:42:15:d8:e6:
7b:dd:87:74:f4:5c:29:0b:20:e9:a7:8e:76:ef:8f:
09:7a:cb:33:e2:99:7e:30:35:86:e6:a5:b0:20:b8:
0d:ff:60:f7:ee:98:64:96:3c:c9:4d:84:75:e2:a5:
b9:cd:ec:63:4a:ff:b4:48:ed:7a:e1:f2:8d:69:84:
d8:2b:cf:7e:61:21:56:03:73
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:TRUE
X509v3 Subject Key Identifier:
0A:C2:2B:EF:8D:42:2A:D0:A2:4A:A8:C2:0F:F9:CA:12:50:D7:09:DA
X509v3 Authority Key Identifier:
keyid:0A:C2:2B:EF:8D:42:2A:D0:A2:4A:A8:C2:0F:F9:CA:12:50:D7:09:DA
DirName:/C=de/ST=Bayern/L=Munich/O=Nokia Siemens
Networks/OU=RTP/CN=www.nokiasiemensnetworks.com/[email protected]
serial:E2:2B:97:CB:02:70:1B:F3
Signature Algorithm: md5WithRSAEncryption
4a:ba:c8:68:bb:0f:81:0a:59:bc:8f:0e:9c:a8:ae:2e:49:42:
37:b4:2b:e8:20:f7:76:28:56:59:d3:75:d9:03:e0:f9:26:c4:
a7:80:3a:e8:8e:4e:d7:ed:5b:8a:91:5e:0f:7a:2a:62:c5:5c:
0c:6c:cc:64:9c:22:20:ba:86:95:16:ab:db:96:b1:17:e4:42:
2a:e7:22:c2:d1:b8:62:82:a5:e0:13:73:74:73:d3:91:b6:c0:
52:f5:78:92:09:38:3c:35:18:c4:3b:4d:b0:0d:9f:04:db:69:
22:ef:e1:0b:30:49:73:8e:30:34:aa:4f:7c:6d:0c:4f:43:f6:
c2:1e
# openssl x509 -in eipu-cert.pem -noout -text
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 3 (0x3)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=de, ST=Bayern, L=Munich, O=Nokia Siemens Networks, OU=RTP,
CN=www.nokiasiemensnetworks.com/[email protected]
Validity
Not Before: Jan 28 10:57:16 2015 GMT
Not After : Feb 27 10:57:16 2015 GMT
Subject: C=de, ST=Bayern, L=Munich, O=Nokia Siemens Networks, OU=RTP,
CN=ATCA_eipu/[email protected]
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:a0:17:ea:77:4e:51:5d:d3:11:4c:f5:4b:70:ec:
4e:c9:11:e5:96:41:98:10:df:ba:a4:38:9f:28:64:
33:7d:90:a7:64:10:63:e7:0a:8f:b2:8d:6c:d6:cb:
80:46:76:c6:9b:eb:3a:9a:fc:a0:04:ed:f3:9c:ef:
db:ba:10:df:e8:d2:eb:ca:b4:56:05:d3:25:e2:35:
d9:fb:21:cb:84:87:f6:25:d7:09:e2:4e:4d:58:ea:
02:fc:ec:1a:98:98:42:2a:97:4a:e5:cf:04:61:b5:
98:7d:35:7f:6d:b8:35:c6:ce:56:b2:5d:d7:87:8b:
69:51:70:28:60:af:be:b8:d1
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
X509v3 Key Usage:
Digital Signature, Non Repudiation, Key Encipherment
X509v3 Subject Alternative Name:
IP Address:13.0.0.2
Signature Algorithm: sha1WithRSAEncryption
46:0c:07:6c:e8:a3:34:b4:3f:88:78:15:9c:66:b9:7d:4b:34:
a9:75:21:4d:40:ba:93:c3:04:39:18:83:64:18:7a:e5:c4:b8:
22:a8:00:89:07:9d:1e:21:e2:ec:5b:50:34:bb:43:d5:a6:77:
85:66:79:6f:c5:d8:80:15:0d:c5:26:73:51:55:0b:ec:90:d3:
60:a8:50:f7:73:21:f1:6c:8c:a4:4e:d1:da:da:3b:e0:9b:c5:
e4:b1:28:6b:83:15:41:5a:57:5d:9e:2a:df:a0:05:4d:8a:be:
90:58:d4:32:3f:cc:27:4a:f4:5a:af:c8:69:5b:c7:02:da:77:
3f:f8
# openssl x509 -in eipu2-cert.pem -noout -text
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 3 (0x3)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=de, ST=Bayern, L=Munich, O=Nokia Siemens Networks, OU=RTP,
CN=www.nokiasiemensnetworks.com/[email protected]
Validity
Not Before: Jan 28 10:57:16 2015 GMT
Not After : Feb 27 10:57:16 2015 GMT
Subject: C=de, ST=Bayern, L=Munich, O=Nokia Siemens Networks, OU=RTP,
CN=ATCA_eipu2/[email protected]
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:e0:47:42:76:8d:3c:94:2d:53:f9:91:50:0e:5b:
eb:ab:a8:79:a5:88:c6:50:bc:8a:f6:39:ce:f4:4c:
6e:d9:06:cf:64:4f:32:b3:8e:e0:30:f9:fb:eb:28:
9a:44:9d:5b:ac:fd:0a:d2:fe:7b:4e:d2:b1:8c:12:
78:64:3e:8c:5e:6c:2d:61:00:d7:d5:f5:94:64:53:
cd:f5:6e:dd:7a:75:4d:b0:2d:07:74:7b:25:b7:bb:
f2:fa:84:27:4a:cf:a4:2a:85:95:03:d5:35:fb:8b:
14:16:60:ba:a0:88:e0:10:7b:cd:54:da:ff:41:c7:
86:67:15:21:25:6e:a0:20:a5
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
X509v3 Key Usage:
Digital Signature, Non Repudiation, Key Encipherment
X509v3 Subject Alternative Name:
IP Address:14.0.0.2
Signature Algorithm: sha1WithRSAEncryption
02:8f:58:f2:93:4e:1f:bb:a8:50:b5:1b:4d:35:1a:e7:d3:46:
90:c2:bf:e6:90:8e:93:67:49:a3:46:bf:4a:2b:6c:bd:df:9e:
96:1e:fc:30:a4:71:e8:89:b0:35:17:2b:03:8f:b4:92:ca:4c:
02:fc:33:84:ab:43:c5:40:ac:ce:d2:b4:66:d2:0a:da:97:5a:
b4:3b:04:2e:fb:00:5f:2e:1d:2c:df:0f:9b:c4:05:5d:48:2b:
fd:cd:07:8a:35:07:d1:dd:48:8a:d5:40:0b:db:dc:60:7b:21:
8f:13:f1:9d:44:08:d7:cc:54:73:93:7f:2f:97:99:0b:b5:c5:
94:c1
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users