Okey, one correction
left=%hostname is working for one of my tunnels, but not the other. See
below.
The working:
sending cert request for "C=US, O=Let's Encrypt, CN=Let's Encrypt
Authority X3"
authentication of 'hostname' (myself) with pre-shared key
establishing CHILD_SA Azure
generating IKE_AUTH request 1 [ IDi CERTREQ IDr AUTH SA TSi TSr
N(EAP_ONLY) ]
sending packet: from 85.24.x.x[500] to 137.135.x.x[500] (380 bytes)
received packet: from 137.135.x.x[500] to 85.24.x.x[500] (204 bytes)
parsed IKE_AUTH response 1 [ IDr AUTH SA TSi TSr ]
authentication of '137.135.x.x' with pre-shared key successful
IKE_SA Azure[2] established between
85.24.x.x[hostname]...137.135.x.x[137.135.x.x]
scheduling reauthentication in 27923s
maximum IKE_SA lifetime 28463s
connection 'Azure' established successfully
The non-working:
sending cert request for "C=US, O=Let's Encrypt, CN=Let's Encrypt
Authority X3"
authentication of 'hostname' (myself) with pre-shared key
establishing CHILD_SA Wesafe
generating IKE_AUTH request 1 [ IDi CERTREQ IDr AUTH SA TSi TSr
N(MULT_AUTH) N(EAP_ONLY) ]
sending packet: from 85.24.x.x[500] to 94.254.x.x[500] (380 bytes)
received packet: from 94.254.x.x[500] to 85.24.x.x[500] (76 bytes)
parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
received AUTHENTICATION_FAILED notify error
establishing connection 'Wesafe' failed
ipsec.secrets
%hostname 137.135.x.x : PSK "xxxx"
%hostname 94.254.x.x : PSK "xxxxx"
I don't know why Strongswan seems to send my local certificate, it
should only be used when roadwarriors connect.
Den 2017-04-21 kl. 10:16, skrev Dusan Ilic:
Hi!
I have some issues, please read on.
1. I have one side of the IP-sec tunnel with dynamic IP (associated
with a dynamic hostname), I would like not need to change the
"left"-parameter in both ipsec.conf and ipsec.secrets whenever the
local WAN IP changes, so I have tried putting "left = %any" or "left =
%hostname". Now, with %hostname (preferable) it wont connect, but with
%any it does connect, sometimes. I can see in the documentation that
%any does a local root lookup if the local host is initiating the
connection, but only accepting all local IP-adresses if it responds to
the remote peer initiation. In my case ths always work when the remote
peer is initiating the connection, but if my local end initiates it
(ie start=route) it seem to choose the wrong public source IP to
connect from.
In my case, my local gateway running Strongswan have multiple public
interfaces (but only one should be used for IP-sec tunnels), se below
route information:
default
nexthop via 90.225.x.x dev vlan845 weight 1
nexthop via 10.248.x.x dev ppp0 weight 256
nexthop via 85.24.x.x dev vlan847 weight 1
nexthop via 46.195.x.x dev ppp1 weight 1
My gateway is configured to use 10.248.0.x as "default route" (highest
weight/priority), but when Strongswan tried to initiate the tunnel it
seems to always default too the last route, 46.195.x.x, and this wont
work as the remote peer is expecting 85.24.x.x. Now, is there a way to
tell Strongswan to use this IP/interface? I hope "left=%hostname"
would work, because the hostname is dynamically ponting to the IP at
interface vlan847, but as already stated this isn't working either.
Any suggestions?
2. Probably also cause by the above routing setup (wild guess), I also
have IKEv2 EAP roadwarrior connectin in Strongswan on the same
interface. The Strongswan client on Android connects to my public
hostname, and everything works (and in this setup I can have
left=%hostname on the server), it's a full tunnel with
leftsubnet=0.0.0.0/0. However, all VPN-clients are beeing routed out
on this same interface the connect to, so the third route above is
being automatically used (vlan847) instead of the second route on ppp0
(with higher weight/priority). Locally connected clients to the
gateway all gets routed out on ppp0, but not VPN-clients. Why is this,
and what can be done to correct this? The reason for me wanting the
VPN clients connecting on vlan847 also routed on the the Internet on
ppp0 is simple, ppp0 is a VPN connection from the gateway out to the
Internet.
I can add that in strongswan.conf I have changed so that all
VPN-routes added by Strongswan is done in the standard, main routing
table (instead of 220), so technically the VPN-clients should be
routed the same as the local clients by the gateway.
_______________________________________________
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users
_______________________________________________
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users