Hi
I'm trying to set up a roadwarrior scenario with X.509 certificates,
signed from a self-signed CA.
The VPN-gateway is running 2.01, the client is running 1.99, both with
the X.509-patch.
Everything looks fine during startup, but if I connect to the gateway, I
get his IP as ID instead of his certificate (setting leftid/rightid on
client and gateway didn't help). Both Freeswan's don't show any errors
during startup, they both find their local certificates/keys, the
ca-key and the crl. Both are directly connected to the internet, no
NAT.
FreeS/WAN config on gateway:
version 2.0
config setup
interfaces=%defaultroute
uniqueids=yes
strictcrlpolicy=yes
conn %default
keyingtries=1
disablearrivalcheck=no
authby=rsasig
keyexchange=ike
ikelifetime=240m
keylife=60m
pfs=yes
compress=no
leftrsasigkey=%cert
rightrsasigkey=%cert
conn roadwarrior
right=%any
left=%defaultroute
leftcert=mycert.pem
#leftsubnet=0.0.0.0/0
type=tunnel
auto=add
And now the incoming connection from the "roadwarrior":
pluto[30138]: "roadwarrior"[1] $IP #1: responding to Main Mode from
unknown peer $REMOTE_IP
pluto[30138]: "roadwarrior"[1] $IP #1: Peer ID is ID_DER_ASN1_DN: 'C=DE,
etc'
pluto[30138]: "packetdefault"[1] 0.0.0.0/0=== ...$REMOTE_IP===? #1:
deleting connection "roadwarrior" instance with peer 217.9.51.61
pluto[30138]: "packetdefault"[1] 0.0.0.0/0=== ...$REMOTE_IP===? #1: sent
MR3, ISAKMP SA established
pluto[30138]: "packetdefault"[1] 0.0.0.0/0=== ...$REMOTE_IP===? #1:
Informational Exchange message for an established ISAKMP SA must be
encrypted
And the client:
config setup
interfaces=%defaultroute
klipsdebug=none
plutodebug=none
plutoload=%search
plutostart=%search
uniqueids=yes
conn ipsec
left=$GATEWAY_IP
right=%defaultroute
authby=rsasig
rightrsasigkey=%cert
leftrsasigkey=%cert
leftcert=myhost.pem
rightcert=roadwarriorcert.pem
auto=add
pfs=yes
And now the connection (ipsec auto --up ipsec):
pluto[14363]: "ipsec" #1: initiating Main Mode
pluto[14363]: "ipsec" #1: Peer ID is ID_IPV4_ADDR: '217.9.34.16'
Aug 2 12:45:20 piggeldi pluto[14363]: "ipsec" #1: we require peer to
have ID 'C=DE etc.', but peer declares '$REMOTE_IP'
pluto[14363]: "ipsec" #1: sending notification INVALID_ID_INFORMATION to
217.9.34.16:500
pluto[14363]: "ipsec": terminating SAs using this connection
pluto[14363]: "ipsec" #1: deleting state (STATE_MAIN_I3)
Any idea what's going wrong here? How can I force the gateway to send
it's X.509 identity?
And there's one interesting thing: If I connect to the gateway from the
private LAN behind it, I don't have any problems.
--
Fridtjof Busse
/* James M doesn't say fuck enough. */
2.4.3 linux/net/core/netfilter.c