Hi list, I am working on a secure VPN Connection for my iPad. I want it to connect to my home network using the built-in IPsec Client. I already managed to get the certificate stuff working. But there is another problem left. It seems that the strongSwan Server and the iPad have different concepts of generating Hashes. The log says:
--- 8< snip --- | received encrypted packet from 80.187.98.129:59786 | decrypting 48 bytes using algorithm AES_CBC | decrypted: | 0b 00 00 18 b7 1d 29 01 54 a8 d4 3e 34 83 34 7b | 6e 56 9a d4 ea 41 c4 d8 00 00 00 0c 00 00 00 01 | 01 00 00 17 00 00 00 00 00 00 00 00 00 00 00 0c | next IV: 73 7b 61 b4 66 c6 c1 60 dc 0c b0 a0 d4 d2 a9 73 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_N | length: 24 | ***parse ISAKMP Notification Payload: | next payload type: ISAKMP_NEXT_NONE | length: 12 | DOI: ISAKMP_DOI_IPSEC | protocol ID: 1 | SPI size: 0 | Notify Message Type: INVALID_HASH_INFORMATION | removing 12 bytes of padding "iPad_psk"[1] 80.187.98.129:59786 #1: ignoring informational payload, type INVALID_HASH_INFORMATION --- 8< snap --- Has anyone gotten around this issue? Or can tell me, where the problem exactly is, so that I can solve it? Best regards Florian -- Florian Wolters Ostenwall 50 D-59065 Hamm Fon: +49 2381 9727195 Fax: +49 2381 9727196 Mob: +49 160 94821259 Email: [email protected] http://www.florian-wolters.de PGP key ID: 0xAC7E90D0
signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil
_______________________________________________ Users mailing list [email protected] https://lists.strongswan.org/mailman/listinfo/users
