I was configuring IPsec transport mode between a strongswan client and Windows 
2008,
but ran into problems:

> On to the quick mode neg., which fails:

> generating QUICK_MODE request 2717344713 [ HASH SA No KE ID ID ]
> sending packet: from 192.168.0.3[500] to 192.168.0.2[500] (300 bytes)
> received packet: from 192.168.0.2[500] to 192.168.0.3[500] (76 bytes)
> parsed INFORMATIONAL_V1 request 2390185800 [ HASH N(NO_PROP) ]
> received NO_PROPOSAL_CHOSEN error notify
> establishing connection 'host-host' failed

> The event log:
> EventID 4654:
> An IPsec quick mode negotiation failed.

> Failure Information:

>  State:No state
>  Message ID:3573913272
>  Failure Point:Local computer
>  Failure Reason:Policy match error


Solution: I enabled PFS for the Filter Action on the server. Turns out the 
client
enables PFS, even though my ipsec.conf looks like (proposing esp without dh 
group):

conn %default
       
ikelifetime=480m
       
keylife=60m
       
rekeymargin=3m
       
keyingtries=3
       
keyexchange=ikev1
       
ike=3des-sha1,3des-sha1-modp1024
       
esp=3des-sha1,3des-sha1-modp1024
       
aggressive=no

Does it look reasonable?

It was a bit tricky to get this right, as it is not obvious if PFS is enabled 
or not.

Regards,
Lars
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to