On Wed, 12 Apr 2017, Antonio Silva wrote:

I'm facing the same issue with android version 7.0

It work when i set sha2-truncbug=yes, without this no traffic is sent from the android device. If i set this option by default all non-android clients with ikev1 xauth will be broken.. is it possible to define a conn for a particular device model / client?

        sha2-truncbug=yes

You best bet is to use an phase2alg= (aka esp=) line that will favour
an another algorithm:

        phase2alg=aes_gcm256-null,aes256-sha2_512,aes256-sha2_256

Hopefully then most sane clients (like iOS) will pick aes_gcm and only
the android clients not supporting anything else will end up on
aes256-sha2_256, which your sha2-truncbug=yes will mangle.

For iOS when using .mobileconfig, be sure to not add sha2_256 as a
valid algorithm because then it will fail when it is mangled with
sha2-truncbug=yes

Paul



On 03/14/2017 05:09 PM, Viktor Keremedchiev wrote:
I’m sorry if I’ve made this confusing.

But simple answer is none of the stuff I’ve tried works for me when it
comes to Android.
Windows and OSX - do work fine.


On Mar 14, 2017, at 12:00 PM, Paul Wouters <[email protected]> wrote:

On Tue, 14 Mar 2017, Viktor Keremedchiev wrote:

And using AES_GCM does give traffic ?

Sorry, I'm really trying to make sure there are no new issues, and I'm
still a little confused what works or does not work for you.


Paul

Date: Tue, 14 Mar 2017 11:51:22
From: Viktor Keremedchiev <[email protected]>
To: [email protected]
Subject: Re: [Swan] Android VPN not passing any traffic, OSX does work
Just tried

000 "roaming": ESP algorithms wanted: AES_GCM_C(20)_000-NONE(0),
AES(12)_256-SHA2_256(5)
000 "roaming": ESP algorithms loaded: AES_GCM_C(20)_000-NONE(0),
AES(12)_256-SHA2_256(5)




Mar 14 15:48:22: "roaming"[2] 199.7.157.124 #1: transition from state
STATE_MODE_CFG_R0 to state STATE_MODE_CFG_R1
Mar 14 15:48:22: "roaming"[2] 199.7.157.124 #1: STATE_MODE_CFG_R1:
ModeCfg Set sent, expecting Ack
Mar 14 15:48:24: "roaming"[2] 199.7.157.124 #1: the peer proposed:
0.0.0.0/0:0/0 -> 172.31.255.1/32:0/0
Mar 14 15:48:24: "roaming"[2] 199.7.157.124 #2: responding to Quick Mode
proposal {msgid:f15da5ee}
Mar 14 15:48:24: "roaming"[2] 199.7.157.124 #2: us:
0.0.0.0/0===172.31.255.216<172.31.255.216>[MS+XS+S=C]
Mar 14 15:48:24: "roaming"[2] 199.7.157.124 #2: them:
199.7.157.124[10.156.163.19,+MC+XC+S=C]===172.31.255.1/32
Mar 14 15:48:24: "roaming"[2] 199.7.157.124 #2: transition from state
STATE_QUICK_R0 to state STATE_QUICK_R1
Mar 14 15:48:24: "roaming"[2] 199.7.157.124 #2: STATE_QUICK_R1: sent QR1,
inbound IPsec SA installed, expecting QI2 tunnel mode {ESP/NAT=>0x034dd8f5 <0xXXXXXXXX xfrm=AES_256-HMAC_SHA2_256 NATOA=none NATD=199.7.157.124:53562 DPD=passive username=XXXX
Mar 14 15:48:24: "roaming"[2] 199.7.157.124 #2: transition from state
STATE_QUICK_R1 to state STATE_QUICK_R2
Mar 14 15:48:24: "roaming"[2] 199.7.157.124 #2: STATE_QUICK_R2: IPsec SA
established tunnel mode {ESP/NAT=>0x034dd8f5 <0xXXXXXXXX xfrm=AES_256-HMAC_SHA2_256 NATOA=none NATD=199.7.157.124:53562 DPD=passive username=XXXX


Connects, but no traffic

IP 199.7.157.124.53562 > 172.31.255.216.ipsec-nat-t: UDP-encap:
ESP(spi=0xXXXXXXXX,seq=0x185), length 116
IP 199.7.157.124.53562 > 172.31.255.216.ipsec-nat-t: UDP-encap:
ESP(spi=0xXXXXXXXX,seq=0x186), length 116
IP 199.7.157.124.53562 > 172.31.255.216.ipsec-nat-t: UDP-encap:
ESP(spi=0xXXXXXXXX,seq=0x187), length 116
IP 199.7.157.124.53562 > 172.31.255.216.ipsec-nat-t: UDP-encap:
ESP(spi=0xXXXXXXXX,seq=0x188), length 116
IP 199.7.157.124.53562 > 172.31.255.216.ipsec-nat-t: UDP-encap:
ESP(spi=0xXXXXXXXX,seq=0x18a), length 100

On Mar 14, 2017, at 11:15 AM, Paul Wouters <[email protected]> wrote:

On Tue, 14 Mar 2017, Viktor Keremedchiev wrote:

I used this: phase2alg=aes_gcm-null
So Android does support AES-GCM now for phase2/esp ?

And traffic flow works properly with this?

Paul
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to