Hi Martin,

thank you very much for your answer.

As Peter wrote the only way to disable XAuth is using an IPCU profile. I'm 
discussing that issue with our mdm vendor because currently they don't support 
setting the XAuthEnabled parameter.
Maybe one should add that parameter to the wiki article about iOS devices.

About my second issue I have a question regarding the crl signing. The crl is 
produced by our root ca (Microsoft based). I put the certificate of the ca in 
ipsec.d/cacerts/. Do I need to put that (or another?) certificate for crl 
verification into another subfolder of ipsec.d/? Or has the ca certificate to 
be part of the openssl trust chain of the local system?

The key usage of the ca certificate look right:

        X509v3 extensions:
            X509v3 Key Usage:
                Digital Signature, Certificate Sign, CRL Sign
            X509v3 Basic Constraints: critical
                CA:TRUE

bye
Daniel





Besuchen Sie WAREMA auf der ISH 2013 in Frankfurt.
12.03. - 16.03.2013, Halle 10.3, Stand A79
http://www.warema.de

-----Ursprüngliche Nachricht-----
Von: Martin Willi [mailto:[email protected]]
Gesendet: Mittwoch, 27. Februar 2013 09:06
An: Fiederling, Daniel
Cc: '[email protected]'
Betreff: Re: [strongSwan] iOS (iPad) connections without xauth

Hi Daniel,

> if I change the authby to rsasig it seems as if the client still tries
> to enforce xauth:

I'm not sure, but I don't think there is a way to configure the native iOS 
client to use certificate authentication only. It always wants to do XAuth.

You may try the patch at [1]; it implements a simple XAuth mechanism that does 
no authentication, but just returns SUCCESS. With the patch applied, configure 
rightauth2=xauth-noauth.

> 01[CFG] checking certificate status of "***del*** 
> [email protected]"
> 01[CFG]   fetching crl from 'http://cert.example.org/CertEnroll/myca.crl' ...
> 01[CFG]   using trusted certificate "DC=org, DC=example, CN=myca"
> 01[CFG] crl response verification failed

The daemon is unable to verify the CRL signature, therefore the CRL can't be 
used to check for revoked certificates. Do you have the CRL signer certificate 
and the full trust-chain installed on your system?
Does it have the CRLSigner X509 keyusage or the CA basic constraint flag set?

> 01[LIB] LDAP bind to 'ldap:///CN=myca,[...]' failed: Can't contact
> LDAP server

Your LDAP URI does not contain any host information. Unfortunately there is 
currently no way to configure a static LDAP host for your URIs in strongSwan.

Regards
Martin

[1]http://git.strongswan.org/?p=strongswan.git;a=commitdiff;h=fb780b21

_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to