On Thu, 5 Sep 2019, Greg Langford wrote:

My tunnel to my Mikrotik Router establishes without issue, I can send traffic 
over the tunnel both directions. However when I try and connect my road warrior 
via any
connectivity method be that cellular or wifi. The connection is matching the 
first found configuration in Libreswan which is incorrect. The host to host 
configuration does
not use xauth, however my Android VPN client does use xauth.

The connection matching should "switch" the the right connection when
more information becomes available. The first packet(s) do not contain
the remote ID yet, so it is not always possible to match the right
connection on the initial packet.

Is there a way to configure a connection e.g the site to site connection to 
only specifically serve requests from a certain ID or certificate?

No because the first packet is just the DH key exchange and you will not
have any IDs yet.

Is it possible to use two different server certificates on Libreswan with 
different CN's e.g vpn1.domain.com and road-warriors.domain.com to do this?

Yes, and with IKEv2 that is often done for multi-tenant systems because
with IKEv2 the remote client can send what it thinks the ID of the server is (The IDr payload, AKA the "me Tarzan, you Jane" mechanism)

But note that:
- Windows does not support IDr (big sigh)
- Android does not support IKEv2 (big sigh, but you can install the
  strongswan android client for IKEv2)

When using IKEv1 because of android, be sure to use Aggressive Mod
(aggressive=yes) so that the IDs come in more quickly and connection
switching can happen. That usually also means using XAUTH.

We have configuration examples on the libreswan wiki

Paul

I have been trying various configurations but the road warriors are always 
matching mikrotik-home not road-warriors.

Thank you in advance for your help.

My two configurations are as follows.

conn mikrotik-home
left=%defaultroute
leftsubnet=10.200.200.1/32
leftsourceip=10.200.200.1
leftcert=<server cert name>
right=%any
rightsubnet=10.200.200.2/32
rightid=@<id sent by mikrotik>
ike=aes128-sha1;modp1024
dpddelay=5
dpdtimeout=15
dpdaction=clear
auto=add

conn road-warriors
    left=176.58.106.154
    leftcert=<server cert name>
    leftsendcert=always
    leftsubnet=0.0.0.0/0
    rightaddresspool=10.20.30.1-10.20.30.254
    right=%any
    modecfgdns=8.8.8.8,8.8.4.4
    # Versions up to 3.22 used modecfgdns1 and modecfgdns2
    #modecfgdns1=193.110.157.123
    #modecfgdns2=8.8.8.8
    leftxauthserver=yes
    rightxauthclient=yes
    leftmodecfgserver=yes
    rightmodecfgclient=yes
    modecfgpull=yes
    xauthby=alwaysok
    ike-frag=yes
    # xauthby=pam
    # xauthfail=soft
    # Can be played with below
    # dpddelay=30
    # dpdtimeout=120
    # dpdaction=clear
    #authby=rsasig
    pfs=no
    auto=add
    rekey=no

Kind Regards,
Greg Langford


_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to