Hi all.
We are using libreswan between two different RedHat Servers and want to do
host-to-host transport tunnel encryption to port 8080.
Left: RHEL 7.6 ( SELinux set to Permissive )
libreswan version: libreswan-3.25-2.el7.x86_64
Right: RHEL 6.10
Libreswan version : libreswan-3.15-7.5.el6_9.x86_64
I initialized NSS DB
ipsec initnss
Imported the certificate and used the nickname to reference them in the
connection config file.
They seem to talk to each other but then the message " sending encrypted
notification INVALID_ID_INFORMATION ".
I have to say that the left certificate has a CN which contains an
left-server-alias for Loadbalancer, which is not yet in place. But the
certificate has also a SAN list which contains the correct hostname.
But if libreswan ignores SAN and checks for the exact entry in the first DN
than this will fail.
Can you say whether libreswan checks also for the SAN entries ?
pluto.log from Server right:
Jan 31 18:28:23: added connection description "cloud_core_tunnel"
Jan 31 18:31:13: packet from <left-IP>:500: received Vendor ID payload [Dead
Peer Detection]
Jan 31 18:31:13: packet from <left-IP>:500: received Vendor ID payload
[FRAGMENTATION]
Jan 31 18:31:13: packet from <left-IP>:500: received Vendor ID payload [RFC
3947]
Jan 31 18:31:13: packet from <left-IP>:500: ignoring Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-03]
Jan 31 18:31:13: packet from <left-IP>:500: ignoring Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02_n]
Jan 31 18:31:13: packet from <left-IP>:500: ignoring Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02]
Jan 31 18:31:13: "cloud_core_tunnel" #681: enabling possible NAT-traversal with
method RFC 3947 (NAT-Traversal)
Jan 31 18:31:13: "cloud_core_tunnel" #681: responding to Main Mode
Jan 31 18:31:13: "cloud_core_tunnel" #681: transition from state STATE_MAIN_R0
to state STATE_MAIN_R1
Jan 31 18:31:13: "cloud_core_tunnel" #681: STATE_MAIN_R1: sent MR1, expecting
MI2
Jan 31 18:31:13: "cloud_core_tunnel" #681: NAT-Traversal: Result using RFC 3947
(NAT-Traversal) sender port 500: no NAT detected
Jan 31 18:31:13: "cloud_core_tunnel" #681: transition from state STATE_MAIN_R1
to state STATE_MAIN_R2
Jan 31 18:31:13: "cloud_core_tunnel" #681: STATE_MAIN_R2: sent MR2, expecting
MI3
Jan 31 18:31:13: "cloud_core_tunnel" #681: Main mode peer ID is ID_DER_ASN1_DN:
'<CN-of-LB-Alias-which-does-not-yet-exist>'
Jan 31 18:31:13: "cloud_core_tunnel" #681: EXPECTATION FAILED at
/var/tmp/build-libreswan-3.15-7.5.el6_9.src.rpm/BUILD/libreswan-3.15/programs/pluto/ikev1.c:2843:
r != NULL
Jan 31 18:31:13: "cloud_core_tunnel" #681: no suitable connection for peer
'<CN-of-LB-Alias-which-does-not-yet-exist>'
Jan 31 18:31:13: "cloud_core_tunnel" #681: sending encrypted notification
INVALID_ID_INFORMATION to <left-IP>:500
Jan 31 18:31:13: "cloud_core_tunnel" #681: Main mode peer ID is ID_DER_ASN1_DN:
'<CN-of-LB-Alias-which-does-not-yet-exist>'
Jan 31 18:31:13: "cloud_core_tunnel" #681: EXPECTATION FAILED at
/var/tmp/build-libreswan-3.15-7.5.el6_9.src.rpm/BUILD/libreswan-3.15/programs/pluto/ikev1.c:2843:
r != NULL
Jan 31 18:31:13: "cloud_core_tunnel" #681: no suitable connection for peer
'<CN-of-LB-Alias-which-does-not-yet-exist>'
Jan 31 18:31:13: "cloud_core_tunnel" #681: sending encrypted notification
INVALID_ID_INFORMATION to <left-IP>:500
Jan 31 18:31:14: "cloud_core_tunnel" #681: Main mode peer ID is ID_DER_ASN1_DN:
'<CN-of-LB-Alias-which-does-not-yet-exist>'
Jan 31 18:31:14: "cloud_core_tunnel" #681: EXPECTATION FAILED at
/var/tmp/build-libreswan-3.15-7.5.el6_9.src.rpm/BUILD/libreswan-3.15/programs/pluto/ikev1.c:2843:
r != NULL
Jan 31 18:31:14: "cloud_core_tunnel" #681: no suitable connection for peer
'<CN-of-LB-Alias-which-does-not-yet-exist>'
Jan 31 18:31:14: "cloud_core_tunnel" #681: sending encrypted notification
INVALID_ID_INFORMATION to <left-IP>:500
Jan 31 18:31:15: "cloud_core_tunnel" #681: Main mode peer ID is ID_DER_ASN1_DN:
'<CN-of-LB-Alias-which-does-not-yet-exist>'
Jan 31 18:31:15: "cloud_core_tunnel" #681: EXPECTATION FAILED at
/var/tmp/build-libreswan-3.15-7.5.el6_9.src.rpm/BUILD/libreswan-3.15/programs/pluto/ikev1.c:2843:
r != NULL
Jan 31 18:31:15: "cloud_core_tunnel" #681: no suitable connection for peer
'<CN-of-LB-Alias-which-does-not-yet-exist>'
Jan 31 18:31:15: "cloud_core_tunnel" #681: sending encrypted notification
INVALID_ID_INFORMATION to <left-IP>:500
Jan 31 18:31:17: "cloud_core_tunnel" #681: Main mode peer ID is ID_DER_ASN1_DN:
'<CN-of-LB-Alias-which-does-not-yet-exist>'
Jan 31 18:31:17: "cloud_core_tunnel" #681: EXPECTATION FAILED at
/var/tmp/build-libreswan-3.15-7.5.el6_9.src.rpm/BUILD/libreswan-3.15/programs/pluto/ikev1.c:2843:
r != NULL
Jan 31 18:31:17: "cloud_core_tunnel" #681: no suitable connection for peer
'<CN-of-LB-Alias-which-does-not-yet-exist>'
Jan 31 18:31:17: "cloud_core_tunnel" #681: sending encrypted notification
INVALID_ID_INFORMATION to <left-IP>:500
Jan 31 18:31:21: "cloud_core_tunnel" #681: Main mode peer ID is ID_DER_ASN1_DN:
'<CN-of-LB-Alias-which-does-not-yet-exist>'
Jan 31 18:31:21: "cloud_core_tunnel" #681: EXPECTATION FAILED at
/var/tmp/build-libreswan-3.15-7.5.el6_9.src.rpm/BUILD/libreswan-3.15/programs/pluto/ikev1.c:2843:
r != NULL
Jan 31 18:31:21: "cloud_core_tunnel" #681: no suitable connection for peer
'<CN-of-LB-Alias-which-does-not-yet-exist>'
Jan 31 18:31:21: "cloud_core_tunnel" #681: sending encrypted notification
INVALID_ID_INFORMATION to <left-IP>:500
Jan 31 18:31:29: "cloud_core_tunnel" #681: Main mode peer ID is ID_DER_ASN1_DN:
'<CN-of-LB-Alias-which-does-not-yet-exist>'
Jan 31 18:31:29: "cloud_core_tunnel" #681: EXPECTATION FAILED at
/var/tmp/build-libreswan-3.15-7.5.el6_9.src.rpm/BUILD/libreswan-3.15/programs/pluto/ikev1.c:2843:
r != NULL
Jan 31 18:31:29: "cloud_core_tunnel" #681: no suitable connection for peer
'<CN-of-LB-Alias-which-does-not-yet-exist>'
Jan 31 18:31:29: "cloud_core_tunnel" #681: sending encrypted notification
INVALID_ID_INFORMATION to <left-IP>:500
Jan 31 18:31:36: "cloud_core_tunnel": deleting connection
Jan 31 18:31:36: "cloud_core_tunnel" #681: deleting state #681 (STATE_MAIN_R2)
Jan 31 18:31:36: added connection description "cloud_core_tunnel"
Jan 31 18:31:43: "cloud_core_tunnel" #682: initiating Main Mode
Jan 31 18:31:43: "cloud_core_tunnel" #682: received Vendor ID payload [Dead
Peer Detection]
Jan 31 18:31:43: "cloud_core_tunnel" #682: received Vendor ID payload
[FRAGMENTATION]
Jan 31 18:31:43: "cloud_core_tunnel" #682: received Vendor ID payload [RFC 3947]
Jan 31 18:31:43: "cloud_core_tunnel" #682: enabling possible NAT-traversal with
method RFC 3947 (NAT-Traversal)
Jan 31 18:31:43: "cloud_core_tunnel" #682: transition from state STATE_MAIN_I1
to state STATE_MAIN_I2
Jan 31 18:31:43: "cloud_core_tunnel" #682: STATE_MAIN_I2: sent MI2, expecting
MR2
Jan 31 18:31:43: "cloud_core_tunnel" #682: NAT-Traversal: Result using RFC 3947
(NAT-Traversal) sender port 500: no NAT detected
Jan 31 18:31:43: "cloud_core_tunnel" #682: I am sending my cert
Jan 31 18:31:43: "cloud_core_tunnel" #682: I am sending a certificate request
Jan 31 18:31:43: "cloud_core_tunnel" #682: transition from state STATE_MAIN_I2
to state STATE_MAIN_I3
Jan 31 18:31:43: "cloud_core_tunnel" #682: STATE_MAIN_I3: sent MI3, expecting
MR3
Jan 31 18:31:43: "cloud_core_tunnel" #682: ignoring informational payload
INVALID_ID_INFORMATION, msgid=00000000, length=12
Jan 31 18:31:43: | ISAKMP Notification Payload
Jan 31 18:31:43: | 00 00 00 0c 00 00 00 01 01 00 00 12
Jan 31 18:31:43: "cloud_core_tunnel" #682: received and ignored informational
message
Jan 31 18:31:43: "cloud_core_tunnel" #682: discarding duplicate packet; already
STATE_MAIN_I3
Jan 31 18:31:43: "cloud_core_tunnel" #682: ignoring informational payload
INVALID_ID_INFORMATION, msgid=00000000, length=12
Jan 31 18:31:43: | ISAKMP Notification Payload
Jan 31 18:31:43: | 00 00 00 0c 00 00 00 01 01 00 00 12
Jan 31 18:31:43: "cloud_core_tunnel" #682: received and ignored informational
message
Jan 31 18:31:44: "cloud_core_tunnel" #682: discarding duplicate packet; already
STATE_MAIN_I3
Jan 31 18:31:44: "cloud_core_tunnel" #682: ignoring informational payload
INVALID_ID_INFORMATION, msgid=00000000, length=12
Jan 31 18:31:44: | ISAKMP Notification Payload
Jan 31 18:31:44: | 00 00 00 0c 00 00 00 01 01 00 00 12
Jan 31 18:31:44: "cloud_core_tunnel" #682: received and ignored informational
message
Jan 31 18:31:45: "cloud_core_tunnel" #682: discarding duplicate packet; already
STATE_MAIN_I3
Jan 31 18:31:45: "cloud_core_tunnel" #682: ignoring informational payload
INVALID_ID_INFORMATION, msgid=00000000, length=12
Jan 31 18:31:45: | ISAKMP Notification Payload
Jan 31 18:31:45: | 00 00 00 0c 00 00 00 01 01 00 00 12
Jan 31 18:31:45: "cloud_core_tunnel" #682: received and ignored informational
message
Jan 31 18:31:45: packet from <left-IP>:500: phase 1 message is part of an
unknown exchange
Jan 31 18:31:45: packet from <left-IP>:500: phase 1 message is part of an
unknown exchange
Jan 31 18:31:45: packet from <left-IP>:500: phase 1 message is part of an
unknown exchange
Jan 31 18:31:45: packet from <left-IP>:500: phase 1 message is part of an
unknown exchange
Jan 31 18:31:45: packet from <left-IP>:500: phase 1 message is part of an
unknown exchange
Jan 31 18:31:47: "cloud_core_tunnel" #682: discarding duplicate packet; already
STATE_MAIN_I3
Jan 31 18:31:47: "cloud_core_tunnel" #682: ignoring informational payload
INVALID_ID_INFORMATION, msgid=00000000, length=12
Jan 31 18:31:47: | ISAKMP Notification Payload
Jan 31 18:31:47: | 00 00 00 0c 00 00 00 01 01 00 00 12
Jan 31 18:31:47: "cloud_core_tunnel" #682: received and ignored informational
message
Jan 31 18:31:51: "cloud_core_tunnel" #682: discarding duplicate packet; already
STATE_MAIN_I3
Jan 31 18:31:51: "cloud_core_tunnel" #682: ignoring informational payload
INVALID_ID_INFORMATION, msgid=00000000, length=12
Jan 31 18:31:51: | ISAKMP Notification Payload
Jan 31 18:31:51: | 00 00 00 0c 00 00 00 01 01 00 00 12
Jan 31 18:31:51: "cloud_core_tunnel" #682: received and ignored informational
message
Jan 31 18:31:54: "cloud_core_tunnel": terminating SAs using this connection
Jan 31 18:31:54: "cloud_core_tunnel" #682: deleting state #682 (STATE_MAIN_I3)
Jan 31 18:31:59: packet from <left-IP>:500: phase 1 message is part of an
unknown exchange
Jan 31 18:32:24: "cloud_core_tunnel": deleting connection
pluto.log form Server left:
Jan 31 18:30:59.087939: shutting down
Jan 31 18:30:59.088214: forgetting secrets
Jan 31 18:30:59.088246: shutting down interface eth1/eth1 <left-IP>:4500
Jan 31 18:30:59.088251: shutting down interface eth1/eth1 <left-IP>:500
Jan 31 18:30:59.088662: leak detective found no leaks
Jan 31 18:31:02.693356: FIPS Product: NO
Jan 31 18:31:02.693488: FIPS Kernel: NO
Jan 31 18:31:02.693492: FIPS Mode: NO
Jan 31 18:31:02.693496: NSS DB directory: sql:/etc/ipsec.d
Jan 31 18:31:02.693578: Initializing NSS
Jan 31 18:31:02.693601: Opening NSS database "sql:/etc/ipsec.d" read-only
Jan 31 18:31:02.815400: NSS initialized
Jan 31 18:31:02.815418: NSS crypto library initialized
Jan 31 18:31:02.815423: FIPS HMAC integrity support [enabled]
Jan 31 18:31:02.815427: FIPS mode disabled for pluto daemon
Jan 31 18:31:02.840930: FIPS HMAC integrity verification self-test passed
Jan 31 18:31:02.841604: libcap-ng support [enabled]
Jan 31 18:31:02.841616: Linux audit support [enabled]
Jan 31 18:31:02.841804: Linux audit activated
Jan 31 18:31:02.841811: Starting Pluto (Libreswan Version 3.25 XFRM(netkey)
KLIPS FORK PTHREAD_SETSCHEDPRIO GCC_EXCEPTIONS NSS DNSSEC SYSTEMD_WATCHDOG
FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER
CURL(non-NSS) LDAP(non-NSS)) pid:58065
Jan 31 18:31:02.841815: core dump dir: /run/pluto
Jan 31 18:31:02.841819: secrets file: /etc/ipsec.secrets
Jan 31 18:31:02.841822: leak-detective enabled
Jan 31 18:31:02.841836: NSS crypto [enabled]
Jan 31 18:31:02.841840: XAUTH PAM support [enabled]
Jan 31 18:31:02.841900: NAT-Traversal support [enabled]
Jan 31 18:31:02.841926: Initializing libevent in pthreads mode: headers:
2.0.21-stable (2001500); library: 2.0.21-stable (2001500)
Jan 31 18:31:02.842148: Encryption algorithms:
Jan 31 18:31:02.842161: AES_CCM_16 IKEv1: ESP IKEv2: ESP
FIPS {256,192,*128} (aes_ccm aes_ccm_c)
Jan 31 18:31:02.842174: AES_CCM_12 IKEv1: ESP IKEv2: ESP
FIPS {256,192,*128} (aes_ccm_b)
Jan 31 18:31:02.842181: AES_CCM_8 IKEv1: ESP IKEv2: ESP
FIPS {256,192,*128} (aes_ccm_a)
Jan 31 18:31:02.842188: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP
FIPS [*192] (3des)
Jan 31 18:31:02.842195: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP
{256,192,*128}
Jan 31 18:31:02.842201: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP
{256,192,*128} (camellia)
Jan 31 18:31:02.842207: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP
FIPS {256,192,*128} (aes_gcm aes_gcm_c)
Jan 31 18:31:02.842213: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP
FIPS {256,192,*128} (aes_gcm_b)
Jan 31 18:31:02.842220: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP
FIPS {256,192,*128} (aes_gcm_a)
Jan 31 18:31:02.842226: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP
FIPS {256,192,*128} (aesctr)
Jan 31 18:31:02.842231: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP
FIPS {256,192,*128} (aes)
Jan 31 18:31:02.842237: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP
{256,192,*128} (serpent)
Jan 31 18:31:02.842243: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP
{256,192,*128} (twofish)
Jan 31 18:31:02.842250: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP
{256,192,*128} (twofish_cbc_ssh)
Jan 31 18:31:02.842256: CAST_CBC IKEv1: ESP IKEv2: ESP
{*128} (cast)
Jan 31 18:31:02.842262: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP
{256,192,*128} (aes_gmac)
Jan 31 18:31:02.842266: NULL IKEv1: ESP IKEv2: ESP
[]
Jan 31 18:31:02.842274: Hash algorithms:
Jan 31 18:31:02.842279: MD5 IKEv1: IKE IKEv2:
Jan 31 18:31:02.842283: SHA1 IKEv1: IKE IKEv2:
FIPS (sha)
Jan 31 18:31:02.842287: SHA2_256 IKEv1: IKE IKEv2:
FIPS (sha2 sha256)
Jan 31 18:31:02.842291: SHA2_384 IKEv1: IKE IKEv2:
FIPS (sha384)
Jan 31 18:31:02.842294: SHA2_512 IKEv1: IKE IKEv2:
FIPS (sha512)
Jan 31 18:31:02.842302: PRF algorithms:
Jan 31 18:31:02.842307: HMAC_MD5 IKEv1: IKE IKEv2: IKE
(md5)
Jan 31 18:31:02.842311: HMAC_SHA1 IKEv1: IKE IKEv2: IKE
FIPS (sha sha1)
Jan 31 18:31:02.842314: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE
FIPS (sha2 sha256 sha2_256)
Jan 31 18:31:02.842318: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE
FIPS (sha384 sha2_384)
Jan 31 18:31:02.842323: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE
FIPS (sha512 sha2_512)
Jan 31 18:31:02.842327: AES_XCBC IKEv1: IKEv2: IKE
FIPS (aes128_xcbc)
Jan 31 18:31:02.842336: Integrity algorithms:
Jan 31 18:31:02.842340: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH (md5 hmac_md5)
Jan 31 18:31:02.842344: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH FIPS (sha sha1 sha1_96 hmac_sha1)
Jan 31 18:31:02.842348: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH FIPS (sha512 sha2_512 hmac_sha2_512)
Jan 31 18:31:02.842352: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH FIPS (sha384 sha2_384 hmac_sha2_384)
Jan 31 18:31:02.842356: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH FIPS (sha2 sha256 sha2_256 hmac_sha2_256)
Jan 31 18:31:02.842360: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP
AH FIPS (aes_xcbc aes128_xcbc aes128_xcbc_96)
Jan 31 18:31:02.842364: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP
AH FIPS (aes_cmac)
Jan 31 18:31:02.842368: NONE IKEv1: ESP IKEv2: ESP
FIPS (null)
Jan 31 18:31:02.842378: DH algorithms:
Jan 31 18:31:02.842382: NONE IKEv1: IKEv2: IKE ESP
AH (null dh0)
Jan 31 18:31:02.842388: MODP1024 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH (dh2)
Jan 31 18:31:02.842393: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH (dh5)
Jan 31 18:31:02.842397: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH FIPS (dh14)
Jan 31 18:31:02.842400: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH FIPS (dh15)
Jan 31 18:31:02.842404: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH FIPS (dh16)
Jan 31 18:31:02.842408: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH FIPS (dh17)
Jan 31 18:31:02.842412: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH FIPS (dh18)
Jan 31 18:31:02.842416: DH19 IKEv1: IKE IKEv2: IKE ESP
AH FIPS (ecp_256)
Jan 31 18:31:02.842419: DH20 IKEv1: IKE IKEv2: IKE ESP
AH FIPS (ecp_384)
Jan 31 18:31:02.842423: DH21 IKEv1: IKE IKEv2: IKE ESP
AH FIPS (ecp_521)
Jan 31 18:31:02.842427: DH22 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH
Jan 31 18:31:02.842431: DH23 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH FIPS
Jan 31 18:31:02.842434: DH24 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH FIPS
Jan 31 18:31:02.844407: starting up 4 crypto helpers
Jan 31 18:31:02.844477: started thread for crypto helper 0
Jan 31 18:31:02.844500: started thread for crypto helper 1
Jan 31 18:31:02.844519: started thread for crypto helper 2
Jan 31 18:31:02.844537: started thread for crypto helper 3
Jan 31 18:31:02.844671: Using Linux XFRM/NETKEY IPsec interface code on
3.10.0-957.1.3.el7.x86_64
Jan 31 18:31:02.876826: | selinux support is enabled.
Jan 31 18:31:02.877271: systemd watchdog for ipsec service configured with
timeout of 200000000 usecs
Jan 31 18:31:02.877280: watchdog: sending probes every 100 secs
Jan 31 18:31:02.891177: listening for IKE messages
Jan 31 18:31:02.891406: adding interface eth1/eth1 <left-IP>:500
Jan 31 18:31:02.891462: adding interface eth1/eth1 <left-IP>:4500
Jan 31 18:31:02.891471: skipping interface eth0 with 10.99.8.131
Jan 31 18:31:02.891477: skipping interface lo with 127.0.0.1
Jan 31 18:31:02.891537: | setup callback for interface eth1:4500 fd 17
Jan 31 18:31:02.891546: | setup callback for interface eth1:500 fd 16
Jan 31 18:31:02.891580: loading secrets from "/etc/ipsec.secrets"
Jan 31 18:31:02.891652: loading secrets from "/etc/ipsec.d/ivoryserver.secrets"
Jan 31 18:31:02.892423: "/etc/ipsec.d/ivoryserver.secrets" line 1: WARNING: The
:RSA secrets entries for X.509 certificates are no longer needed
Jan 31 18:31:02.892466: loading secrets from "/etc/ipsec.d/lagu-conn.secrets"
Jan 31 18:31:02.892519: loaded private key for keyid: PKK_RSA:AwEAAai2q
Jan 31 18:31:06.032957: added connection description "cloud_core_tunnel"
Jan 31 18:31:13.233300: "cloud_core_tunnel" #1: initiating Main Mode
Jan 31 18:31:13.239412: "cloud_core_tunnel" #1: STATE_MAIN_I2: sent MI2,
expecting MR2
Jan 31 18:31:13.244679: "cloud_core_tunnel" #1: I am sending my cert
Jan 31 18:31:13.244704: "cloud_core_tunnel" #1: I am sending a certificate
request
Jan 31 18:31:13.250324: "cloud_core_tunnel" #1: STATE_MAIN_I3: sent MI3,
expecting MR3
Jan 31 18:31:13.254655: "cloud_core_tunnel" #1: ignoring informational payload
INVALID_ID_INFORMATION, msgid=00000000, length=12
Jan 31 18:31:13.254681: | ISAKMP Notification Payload
Jan 31 18:31:13.254688: | 00 00 00 0c 00 00 00 01 01 00 00 12
Jan 31 18:31:13.254694: "cloud_core_tunnel" #1: received and ignored
informational message
Jan 31 18:31:13.744914: "cloud_core_tunnel" #1: STATE_MAIN_I3: retransmission;
will wait 0.5 seconds for response
Jan 31 18:31:13.747787: "cloud_core_tunnel" #1: ignoring informational payload
INVALID_ID_INFORMATION, msgid=00000000, length=12
Jan 31 18:31:13.747805: | ISAKMP Notification Payload
Jan 31 18:31:13.747811: | 00 00 00 0c 00 00 00 01 01 00 00 12
Jan 31 18:31:13.747815: "cloud_core_tunnel" #1: received and ignored
informational message
Jan 31 18:31:14.246371: "cloud_core_tunnel" #1: STATE_MAIN_I3: retransmission;
will wait 1 seconds for response
Jan 31 18:31:14.249222: "cloud_core_tunnel" #1: ignoring informational payload
INVALID_ID_INFORMATION, msgid=00000000, length=12
Jan 31 18:31:14.249243: | ISAKMP Notification Payload
Jan 31 18:31:14.249249: | 00 00 00 0c 00 00 00 01 01 00 00 12
Jan 31 18:31:14.249253: "cloud_core_tunnel" #1: received and ignored
informational message
Jan 31 18:31:15.248312: "cloud_core_tunnel" #1: STATE_MAIN_I3: retransmission;
will wait 2 seconds for response
Jan 31 18:31:15.252637: "cloud_core_tunnel" #1: ignoring informational payload
INVALID_ID_INFORMATION, msgid=00000000, length=12
Jan 31 18:31:15.252657: | ISAKMP Notification Payload
Jan 31 18:31:15.252662: | 00 00 00 0c 00 00 00 01 01 00 00 12
Jan 31 18:31:15.252666: "cloud_core_tunnel" #1: received and ignored
informational message
Jan 31 18:31:17.249826: "cloud_core_tunnel" #1: STATE_MAIN_I3: retransmission;
will wait 4 seconds for response
Jan 31 18:31:17.252971: "cloud_core_tunnel" #1: ignoring informational payload
INVALID_ID_INFORMATION, msgid=00000000, length=12
Jan 31 18:31:17.252991: | ISAKMP Notification Payload
Jan 31 18:31:17.252996: | 00 00 00 0c 00 00 00 01 01 00 00 12
Jan 31 18:31:17.253001: "cloud_core_tunnel" #1: received and ignored
informational message
Jan 31 18:31:21.254066: "cloud_core_tunnel" #1: STATE_MAIN_I3: retransmission;
will wait 8 seconds for response
Jan 31 18:31:21.257004: "cloud_core_tunnel" #1: ignoring informational payload
INVALID_ID_INFORMATION, msgid=00000000, length=12
Jan 31 18:31:21.257027: | ISAKMP Notification Payload
Jan 31 18:31:21.257032: | 00 00 00 0c 00 00 00 01 01 00 00 12
Jan 31 18:31:21.257037: "cloud_core_tunnel" #1: received and ignored
informational message
Jan 31 18:31:29.260002: "cloud_core_tunnel" #1: STATE_MAIN_I3: retransmission;
will wait 16 seconds for response
Jan 31 18:31:29.263114: "cloud_core_tunnel" #1: ignoring informational payload
INVALID_ID_INFORMATION, msgid=00000000, length=12
Jan 31 18:31:29.263137: | ISAKMP Notification Payload
Jan 31 18:31:29.263143: | 00 00 00 0c 00 00 00 01 01 00 00 12
Jan 31 18:31:29.263151: "cloud_core_tunnel" #1: received and ignored
informational message
Jan 31 18:31:42.978288: "cloud_core_tunnel" #2: responding to Main Mode
Jan 31 18:31:42.978398: "cloud_core_tunnel" #2: STATE_MAIN_R1: sent MR1,
expecting MI2
Jan 31 18:31:42.983222: "cloud_core_tunnel" #2: STATE_MAIN_R2: sent MR2,
expecting MI3
Jan 31 18:31:42.992330: "cloud_core_tunnel" #2: Peer ID is ID_DER_ASN1_DN:
'<DN-of-righ-server-alias>'
Jan 31 18:31:43.000467: "cloud_core_tunnel" #2: X509: no EE-cert in chain!
Jan 31 18:31:43.000482: "cloud_core_tunnel" #2: X509: Certificate rejected for
this connection
Jan 31 18:31:43.000487: "cloud_core_tunnel" #2: X509: CERT payload bogus or
revoked
Jan 31 18:31:43.000500: "cloud_core_tunnel" #2: sending encrypted notification
INVALID_ID_INFORMATION to <right-IP>:500
Jan 31 18:31:43.487204: "cloud_core_tunnel" #2: STATE_MAIN_R2: retransmission;
will wait 0.5 seconds for response
Jan 31 18:31:43.487366: "cloud_core_tunnel" #2: Peer ID is ID_DER_ASN1_DN:
'<DN-of-righ-server-alias>'
Jan 31 18:31:43.490862: "cloud_core_tunnel" #2: X509: no EE-cert in chain!
Jan 31 18:31:43.490874: "cloud_core_tunnel" #2: X509: Certificate rejected for
this connection
Jan 31 18:31:43.490879: "cloud_core_tunnel" #2: X509: CERT payload bogus or
revoked
Jan 31 18:31:43.490893: "cloud_core_tunnel" #2: sending encrypted notification
INVALID_ID_INFORMATION to <right-IP>:500
Jan 31 18:31:43.988658: "cloud_core_tunnel" #2: STATE_MAIN_R2: retransmission;
will wait 1 seconds for response
Jan 31 18:31:43.989154: "cloud_core_tunnel" #2: Peer ID is ID_DER_ASN1_DN:
'<DN-of-righ-server-alias>'
Jan 31 18:31:43.993705: "cloud_core_tunnel" #2: X509: no EE-cert in chain!
Jan 31 18:31:43.993720: "cloud_core_tunnel" #2: X509: Certificate rejected for
this connection
Jan 31 18:31:43.993726: "cloud_core_tunnel" #2: X509: CERT payload bogus or
revoked
Jan 31 18:31:43.993741: "cloud_core_tunnel" #2: sending encrypted notification
INVALID_ID_INFORMATION to <right-IP>:500
Jan 31 18:31:44.990237: "cloud_core_tunnel" #2: STATE_MAIN_R2: retransmission;
will wait 2 seconds for response
Jan 31 18:31:44.990425: "cloud_core_tunnel" #2: Peer ID is ID_DER_ASN1_DN:
'<DN-of-righ-server-alias>'
Jan 31 18:31:44.994998: "cloud_core_tunnel" #2: X509: no EE-cert in chain!
Jan 31 18:31:44.995013: "cloud_core_tunnel" #2: X509: Certificate rejected for
this connection
Jan 31 18:31:44.995019: "cloud_core_tunnel" #2: X509: CERT payload bogus or
revoked
Jan 31 18:31:44.995035: "cloud_core_tunnel" #2: sending encrypted notification
INVALID_ID_INFORMATION to <right-IP>:500
Jan 31 18:31:45.265441: "cloud_core_tunnel" #1: STATE_MAIN_I3: retransmission;
will wait 32 seconds for response
Jan 31 18:31:46.992124: "cloud_core_tunnel" #2: STATE_MAIN_R2: retransmission;
will wait 4 seconds for response
Jan 31 18:31:46.992551: "cloud_core_tunnel" #2: Peer ID is ID_DER_ASN1_DN:
'<DN-of-righ-server-alias>'
Jan 31 18:31:46.996179: "cloud_core_tunnel" #2: X509: no EE-cert in chain!
Jan 31 18:31:46.996195: "cloud_core_tunnel" #2: X509: Certificate rejected for
this connection
Jan 31 18:31:46.996201: "cloud_core_tunnel" #2: X509: CERT payload bogus or
revoked
Jan 31 18:31:46.996214: "cloud_core_tunnel" #2: sending encrypted notification
INVALID_ID_INFORMATION to <right-IP>:500
Jan 31 18:31:50.996673: "cloud_core_tunnel" #2: STATE_MAIN_R2: retransmission;
will wait 8 seconds for response
Jan 31 18:31:50.996866: "cloud_core_tunnel" #2: Peer ID is ID_DER_ASN1_DN:
'<DN-of-righ-server-alias>'
Jan 31 18:31:51.001665: "cloud_core_tunnel" #2: X509: no EE-cert in chain!
Jan 31 18:31:51.001680: "cloud_core_tunnel" #2: X509: Certificate rejected for
this connection
Jan 31 18:31:51.001687: "cloud_core_tunnel" #2: X509: CERT payload bogus or
revoked
Jan 31 18:31:51.001702: "cloud_core_tunnel" #2: sending encrypted notification
INVALID_ID_INFORMATION to <right-IP>:500
Jan 31 18:31:59.009857: "cloud_core_tunnel" #2: STATE_MAIN_R2: retransmission;
will wait 16 seconds for response
Jan 31 18:32:02.096743: "cloud_core_tunnel": terminating SAs using this
connection
Jan 31 18:32:02.096778: "cloud_core_tunnel" #2: deleting state (STATE_MAIN_R2)
and NOT sending notification
Jan 31 18:32:02.096866: "cloud_core_tunnel" #1: deleting state (STATE_MAIN_I3)
and NOT sending notification
Jan 31 18:32:12.578197: "cloud_core_tunnel": deleting non-instance connection
Thank you very much for the help.
Best regards.
Giuseppe
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan