Hello I am trying to connect to a Cisco VPN Terminator. Unfortunately I do not have access to this point.
I have obtained certificate and key and entered them in /etc/ipsec.d/certs, /etc/ipsec.d/cacerts and /etc/ipsec.d/private. But I get an AUTHENTICATION_FAILED notify error. I don't know where to start. Some questions: My strongSwan version is 5.4.0. Too old? Can I ignore the warning "opening triplet file /etc/ipsec.d/triplets.dat failed: No such file or directory"? What about the warning "cert payload ANY not supported - ignored"? My ipsec.conf file is simple. Especially concerning the right side. Do I need rightid for example? I am glad for any hints. Log and configurations below. René ---------- # ipsec.secrets : RSA ***mobile.key ---------- # ipsec.conf config setup charondebug="ike 1, mgr 1, lib 1, cfg 1, net 1, enc 1, asn 1, job 1, knl 1, dmn 1" conn %default ikelifetime=86400 lifetime=1090 fragmentation=yes mobike=yes dpddelay=2 dpdtimeout=10 rekeymargin=3m keyingtries=%forever keyexchange=ikev2 ike=aes128gcm16-sha512-ecp384,aes256-sha512-ecp384 esp=aes256-sha512-ecp384! conn one left=10.162.225.64 leftsubnet=10.162.110.96/27 leftid="C=**, ST=**, L=***, O=***, OU=***, CN=***, E=***" leftcert=***mobile.crt leftsendcert=always right=x.x.x.x rightsubnet=10.0.0.0/8 rightauth=pubkey auto=start ---------- # ipsec start Starting strongSwan 5.4.0 IPsec [starter]... no netkey IPsec stack detected no KLIPS IPsec stack detected no known IPsec stack detected, ignoring! # Jan 28 09:43:26 EGVxx_06717537 ipsec_starter[18258]: Starting strongSwan 5.4.0 IPsec [starter]... Jan 28 09:43:26 ipsec_starter[18258]: no netkey IPsec stack detected Jan 28 09:43:26 ipsec_starter[18258]: no KLIPS IPsec stack detected Jan 28 09:43:26 ipsec_starter[18258]: no known IPsec stack detected, ignoring! Jan 28 09:43:26 charon[18267]: 00[DMN] Starting IKE charon daemon (strongSwan 5.4.0, Linux 4.4.107, armv7l) Jan 28 09:43:26 charon[18267]: 00[KNL] received netlink error: Address family not supported by protocol (97) Jan 28 09:43:26 charon[18267]: 00[KNL] unable to create IPv6 routing table rule Jan 28 09:43:26 charon[18267]: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts' Jan 28 09:43:26 charon[18267]: 00[CFG] loaded ca certificate "DC=**, DC=***, DC=cert, CN=***" from '/etc/ipsec.d/cacerts/cacert.crt' Jan 28 09:43:26 charon[18267]: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts' Jan 28 09:43:26 charon[18267]: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts' Jan 28 09:43:26 charon[18267]: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts' Jan 28 09:43:26 charon[18267]: 00[CFG] loading crls from '/etc/ipsec.d/crls' Jan 28 09:43:26 charon[18267]: 00[CFG] loading secrets from '/etc/ipsec.secrets' Jan 28 09:43:27 charon[18267]: 00[CFG] loaded RSA private key from '/etc/ipsec.d/private/***mobile.key' Jan 28 09:43:27 charon[18267]: 00[CFG] opening triplet file /etc/ipsec.d/triplets.dat failed: No such file or directory Jan 28 09:43:27 charon[18267]: 00[CFG] loaded 0 RADIUS server configurations Jan 28 09:43:27 charon[18267]: 00[LIB] loaded plugins: charon openssl pkcs11 aes des rc2 sha2 sha1 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem fips-prf gmp xcbc cmac hmac attr kernel-netlink resolve socket-default stroke vici updown eap-identity eap-sim eap-aka eap-aka-3gpp2 eap-simaka-pseudonym eap-simaka-reauth eap-md5 eap-gtc eap-mschapv2 eap-dynamic eap-radius eap-tls eap-ttls eap-peap eap-tnc xauth-generic tnc-tnccs tnccs-20 tnccs-11 led Jan 28 09:43:27 charon[18267]: 00[JOB] spawning 16 worker threads Jan 28 09:43:27 ipsec_starter[18266]: charon (18267) started after 720 ms Jan 28 09:43:27 charon[18267]: 05[CFG] received stroke: add connection 'one' Jan 28 09:43:27 charon[18267]: 05[CFG] loaded certificate "C=**, ST=**, L=***, O=***, OU=***, CN=***, E=***" from '***mobile.crt' Jan 28 09:43:27 charon[18267]: 05[CFG] added configuration 'one' Jan 28 09:43:27 charon[18267]: 07[CFG] received stroke: initiate 'one' Jan 28 09:43:27 charon[18267]: 07[IKE] initiating IKE_SA one[1] to x.x.x.x Jan 28 09:43:27 charon[18267]: 07[IKE] initiating IKE_SA one[1] to x.x.x.x Jan 28 09:43:27 charon[18267]: 07[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ] Jan 28 09:43:27 charon[18267]: 07[NET] sending packet: from 10.162.225.64[500] to x.x.x.x[500] (1008 bytes) Jan 28 09:43:28 charon[18267]: 13[NET] received packet: from x.x.x.x[500] to 10.162.225.64[500] (341 bytes) Jan 28 09:43:28 charon[18267]: 13[ENC] parsed IKE_SA_INIT response 0 [ SA KE No V V N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(HTTP_CERT_LOOK) ] Jan 28 09:43:28 charon[18267]: 13[IKE] received Cisco Delete Reason vendor ID Jan 28 09:43:28 charon[18267]: 13[ENC] received unknown vendor ID: 46:4c:45:58:56:50:4e:2d:53:55:50:50:4f:52:54:45:44 Jan 28 09:43:28 charon[18267]: 13[IKE] cert payload ANY not supported - ignored Jan 28 09:43:28 charon[18267]: 13[IKE] sending cert request for "DC=**, DC=***, DC=***, CN=***-CA" Jan 28 09:43:28 charon[18267]: 13[IKE] authentication of 'C=**, ST=**, L=***, O=***, OU=***, CN=***, E=***' (myself) with RSA signature successful Jan 28 09:43:28 charon[18267]: 13[IKE] sending end entity cert "C=**, ST=**, L=***, O=***, OU=***, CN=*** E=***" Jan 28 09:43:28 charon[18267]: 13[IKE] establishing CHILD_SA one Jan 28 09:43:28 charon[18267]: 13[IKE] establishing CHILD_SA one Jan 28 09:43:28 charon[18267]: 13[ENC] generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(EAP_ONLY) ] Jan 28 09:43:28 charon[18267]: 13[NET] sending packet: from 10.162.225.64[4500] to x.x.x.x[4500] (2277 bytes) Jan 28 09:43:32 charon[18267]: 15[IKE] retransmit 1 of request with message ID 1 Jan 28 09:43:32 charon[18267]: 15[NET] sending packet: from 10.162.225.64[4500] to x.x.x.x[4500] (2277 bytes) Jan 28 09:43:39 charon[18267]: 08[IKE] retransmit 2 of request with message ID 1 Jan 28 09:43:39 charon[18267]: 08[NET] sending packet: from 10.162.225.64[4500] to x.x.x.x[4500] (2277 bytes) Jan 28 09:43:44 charon[18267]: 05[NET] received packet: from x.x.x.x[4500] to 10.162.225.64[4500] (65 bytes) Jan 28 09:43:44 charon[18267]: 05[ENC] parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ] Jan 28 09:43:44 charon[18267]: 05[IKE] received AUTHENTICATION_FAILED notify error ----------