Hello,

I am trying to setup IKEv2 roadwarrior based VPN. I've the client
functional in Windows 7 using the native client. I am trying to get the
same functional on OSX, but facing problems.

The authentication is being done using certificates. I used ikectl to
generate, CA, server's certificate as well as a client certificate. Used
the ikectl export option to generate the zip file containing ca and client
p12 files.

I am using Apple Configurator 2, from the appstore to create the profile
file. The profile contains the two certificates as well as the ikev2
configuration. Starting the VPN client, I see the following in the server
side logs:

OSX 10.11.3 Unsuccessful Connection Log entry:
sa_stateok: VALID flags 0x18, require 0x1f cert,certvalid,auth,authvalid,sa
sa_state: cannot switch: AUTH_SUCCESS -> VALID
config_free_proposals: free 0x71d6d207180
ca_setauth: auth length 256
ca_x509_subjectaltname: FQDN/server.obsd57.com
ca_x509_subjectaltname_cmp: FQDN/server.obsd57.com mismatched
ca_validate_cert:
/C=CA/ST=Ontario/L=Toronto/O=stark/OU=ITOPS/CN=client-number-1/emailAddress=
ad...@obsd57.com invalid subjectAltName extension
ikev2_getimsgdata: imsg 23 rspi 0xf9048b97fef10e03 ispi 0xa01ca6865f9c0754
initiator 0 sa valid type 1 data length 256
ikev2_dispatch_cert: AUTH type 1 len 256
sa_stateflags: 0x18 -> 0x1c auth,authvalid,sa (required 0x1f
cert,certvalid,auth,authvalid,sa)
sa_stateok: VALID flags 0x1c, require 0x1f cert,certvalid,auth,authvalid,sa
sa_state: cannot switch: AUTH_SUCCESS -> VALID
ikev2_dispatch_cert: peer certificate is invalid
sa_stateok: VALID flags 0x1c, require 0x1f cert,certvalid,auth,authvalid,sa
sa_state: cannot switch: AUTH_SUCCESS -> VALID


Compared to a successful connection in Windows 7:

Windows Successful Connection Log entry:
sa_stateok: VALID flags 0x18, require 0x1f cert,certvalid,auth,authvalid,sa
sa_state: cannot switch: AUTH_SUCCESS -> VALID
config_free_proposals: free 0x71d9dda6e00
ca_getreq: found CA
/C=CA/ST=Ontario/L=Toronto/O=stark/OU=ITOPS/CN=obsd57/emailAddress=
ad...@obsd57.com
ca_x509_subjectaltname: FQDN/server.obsd57.com
ca_getreq: found local certificate
/C=CA/ST=Ontario/L=Toronto/O=stark/OU=ITOPS/CN=
server.obsd57.com/emailAddress=ad...@obsd57.com
ca_setauth: auth length 256
ca_validate_cert:
/C=CA/ST=Ontario/L=Toronto/O=stark/OU=ITOPS/CN=client-number-1/emailAddress=
ad...@obsd57.com ok
ikev2_getimsgdata: imsg 18 rspi 0xd4cd1307801a4461 ispi 0x0e3d4164b4884c93
initiator 0 sa valid type 4 data length 1011
ikev2_dispatch_cert: cert type X509_CERT length 1011, ok
sa_stateflags: 0x18 -> 0x19 cert,authvalid,sa (required 0x1f
cert,certvalid,auth,authvalid,sa)
sa_stateok: VALID flags 0x19, require 0x1f cert,certvalid,auth,authvalid,sa
sa_state: cannot switch: AUTH_SUCCESS -> VALID

Inside /etc/ssl/x509v3.cnf file, my CERTFQDN has the value server.obsd57.com

In Apple Configurator profile, I've the following:

Remote Identifier: server.obsd57.com
Local Identifier: client-number-1

I've tried populating the following fields, but neither of them helps:
Server Certificate Issuer Common Name: obsd57 (Thats the CN for my CA)
Server Certificate Common Name: server.obsd57.com (Thats the CN for my
server certificate)

Not sure where to go from here. Can you help point me to the right
direction on what maybe wrong here?

Thanks,
dot.yet

Reply via email to