Hi,
> My new setup uses MD5 passwords in Radius, while my old config used
> NT-hash. It seems now with radius-eap I have problems authenticating
> against the MD5 passwords. It is using eap-mschapv2 and it seems it is
> not a supported combination -
This can't work, a server verifying clients wit
On 02/20/2015 04:02 PM, Martin Willi wrote:
> Hi Milen,
>
>> 07[IKE] initiating EAP_IDENTITY method (id 0x00)
>> 07[IKE] peer supports MOBIKE
>> 07[IKE] authentication of '[...]' (myself) with RSA signature successful
>> 07[IKE] sending end entity cert "[...]"
>> 07[ENC] generating IKE_AUTH respon
I had a very similar experience recently.
For me it turned out that the certificate had expired.
___
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users
Hi Milen,
> 07[IKE] initiating EAP_IDENTITY method (id 0x00)
> 07[IKE] peer supports MOBIKE
> 07[IKE] authentication of '[...]' (myself) with RSA signature successful
> 07[IKE] sending end entity cert "[...]"
> 07[ENC] generating IKE_AUTH response 1 [IDr CERT AUTH EAP/REQ/ID ]
> 07[NET] sending pa
Hi,
I have a working strongswan 4.4.1 setup with ikev2 and eap-radius which
I am trying to replicate on strongswan 5.2.0 without success.
My configuration is as follows:
ipsec.conf:
conn ipsec-ikev2
type=tunnel
keyexchange=ikev2
left=left_ip_address
leftsubnet=0.