Hi list,

I am working on a secure VPN Connection for my iPad. I want it to
connect to my home network using the built-in IPsec Client.
I already managed to get the certificate stuff working. But there is
another problem left. It seems that the strongSwan Server and the iPad
have different concepts of generating Hashes.
The log says:

--- 8< snip ---
| received encrypted packet from 80.187.98.129:59786
| decrypting 48 bytes using algorithm AES_CBC
| decrypted:
|   0b 00 00 18  b7 1d 29 01  54 a8 d4 3e  34 83 34 7b
|   6e 56 9a d4  ea 41 c4 d8  00 00 00 0c  00 00 00 01
|   01 00 00 17  00 00 00 00  00 00 00 00  00 00 00 0c
| next IV:  73 7b 61 b4  66 c6 c1 60  dc 0c b0 a0  d4 d2 a9 73
| ***parse ISAKMP Hash Payload:
|    next payload type: ISAKMP_NEXT_N
|    length: 24
| ***parse ISAKMP Notification Payload:
|    next payload type: ISAKMP_NEXT_NONE
|    length: 12
|    DOI: ISAKMP_DOI_IPSEC
|    protocol ID: 1
|    SPI size: 0
|    Notify Message Type: INVALID_HASH_INFORMATION
| removing 12 bytes of padding
"iPad_psk"[1] 80.187.98.129:59786 #1: ignoring informational payload,
type INVALID_HASH_INFORMATION
--- 8< snap ---

Has anyone gotten around this issue? Or can tell me, where the problem
exactly is, so that I can solve it?
Best regards 

   Florian


-- 

Florian Wolters
Ostenwall 50
D-59065 Hamm

Fon: +49 2381 9727195
Fax: +49 2381 9727196
Mob: +49 160 94821259
Email: [email protected]
http://www.florian-wolters.de
PGP key ID: 0xAC7E90D0



Attachment: signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil

_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to