Hello All,
I'm testing strongSwan as a VPN gateway for a 3rd party VPN client. PSK and
certificate authentication works fine, but when testing EAP-TLS and I get this
error message on the strongSwan side, after the EAP authentication succeeds.
Jul 10 16:42:11 debian-vm1-alexis charon: 14[ENC] payload of type AUTH more
than 1 times (2) occurred in current message
Jul 10 16:42:11 debian-vm1-alexis charon: 14[IKE] message verification failed
See attachment for full logs.
Here is my strongSwan configuration:
# ipsec.conf - strongSwan IPsec configuration file
config setup
# strictcrlpolicy=yes
# uniqueids = no
conn %default
ikelifetime=60m
keylife=20m
rekeymargin=3m
keyingtries=1
keyexchange=ikev2
conn rw-eap-tls
left=10.1.65.147
[email protected]
leftsubnet=10.99.0.0/24
leftcert=ocmCert.pem
leftauth=pubkey
leftfirewall=yes
rightsourceip=172.22.0.0/24
rightauth=eap-radius
rightsendcert=never
right=%any
auto=add
eap_identity=%identity
Does any of you know what this is about?
what is strongSwan expecting at this point? Looking at the RFC [1] there should
be a message type AUTH (message 7).
I can enable more logging if needed.
Thanks.
Alexis.
[1] : https://tools.ietf.org/html/rfc7296#section-2.16
~# tail -f /var/log/daemon.log
Jul 10 16:42:10 debian-vm1-alexis charon: 09[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[500]
Jul 10 16:42:10 debian-vm1-alexis charon: 09[NET] waiting for data on sockets
Jul 10 16:42:10 debian-vm1-alexis charon: 03[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[500] (460 bytes)
Jul 10 16:42:10 debian-vm1-alexis charon: 03[ENC] parsed IKE_SA_INIT request 0
[ SA KE No N(NATD_D_IP) N(NATD_S_IP) V V V V ]
Jul 10 16:42:10 debian-vm1-alexis charon: 03[ENC] received unknown vendor ID:
eb:4c:1b:78:8a:fd:4a:9c:b7:73:0a:68:d5:6d:08:8b
Jul 10 16:42:10 debian-vm1-alexis charon: 03[ENC] received unknown vendor ID:
c6:1b:ac:a1:f1:a6:0c:c1:08:00:00:00:00:00:00:00
Jul 10 16:42:10 debian-vm1-alexis charon: 03[ENC] received unknown vendor ID:
cb:e7:94:44:a0:87:0d:e4:22:4a:2c:15:1f:bf:e0:99
Jul 10 16:42:10 debian-vm1-alexis charon: 03[ENC] received unknown vendor ID:
40:48:b7:d5:6e:bc:e8:85:25:e7:de:7f:00:d6:c2:d3:c0:00:00:00
Jul 10 16:42:10 debian-vm1-alexis charon: 03[IKE] 10.1.65.126 is initiating an
IKE_SA
Jul 10 16:42:10 debian-vm1-alexis charon: 03[IKE] IKE_SA (unnamed)[20] state
change: CREATED => CONNECTING
Jul 10 16:42:10 debian-vm1-alexis charon: 03[IKE] remote host is behind NAT
Jul 10 16:42:10 debian-vm1-alexis charon: 03[ENC] generating IKE_SA_INIT
response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(MULT_AUTH) ]
Jul 10 16:42:10 debian-vm1-alexis charon: 03[NET] sending packet: from
10.1.65.147[500] to 10.1.65.126[49300] (376 bytes)
Jul 10 16:42:10 debian-vm1-alexis charon: 10[NET] sending packet: from
10.1.65.147[500] to 10.1.65.126[49300]
Jul 10 16:42:10 debian-vm1-alexis charon: 09[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500]
Jul 10 16:42:10 debian-vm1-alexis charon: 09[NET] waiting for data on sockets
Jul 10 16:42:10 debian-vm1-alexis charon: 12[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500] (1264 bytes)
Jul 10 16:42:10 debian-vm1-alexis charon: 12[ENC] unknown attribute type (20002)
Jul 10 16:42:10 debian-vm1-alexis charon: 12[ENC] unknown attribute type (20006)
Jul 10 16:42:10 debian-vm1-alexis charon: 12[ENC] unknown attribute type (20007)
Jul 10 16:42:10 debian-vm1-alexis charon: 12[ENC] unknown attribute type (20003)
Jul 10 16:42:10 debian-vm1-alexis charon: 12[ENC] unknown attribute type (20004)
Jul 10 16:42:10 debian-vm1-alexis charon: 12[ENC] unknown attribute type (20005)
Jul 10 16:42:10 debian-vm1-alexis charon: 12[ENC] parsed IKE_AUTH request 1 [ V
IDi CERT N(INIT_CONTACT) N(HTTP_CERT_LOOK) CERTREQ CPRQ(ADDR MASK DNS NBNS
(20002) VER U_BANNER U_SAVEPWD U_DEFDOM (20006) (20007) U_SPLITDNS U_SPLITINC
U_NATTPORT U_LOCALLAN U_PFS U_FWTYPE U_BKPSRV (20003) (20004) U_DDNSHOST
(20005) U_DDNSHOST) SA No TSi TSr V N(MOBIKE_SUP) ]
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] received end entity cert
"C=CA, O=Test, CN=Client"
Jul 10 16:42:10 debian-vm1-alexis charon: 12[CFG] looking for peer configs
matching 10.1.65.147[%any]...10.1.65.126[172.22.0.101]
Jul 10 16:42:10 debian-vm1-alexis charon: 12[CFG] selected peer config
'rw-eap-tls'
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] initiating EAP_IDENTITY
method (id 0x00)
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing
INTERNAL_IP4_ADDRESS attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing
INTERNAL_IP4_NETMASK attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing INTERNAL_IP4_DNS
attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing INTERNAL_IP4_NBNS
attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing (20002) attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing
APPLICATION_VERSION attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing UNITY_BANNER
attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing UNITY_SAVE_PASSWD
attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing UNITY_DEF_DOMAIN
attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing (20006) attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing (20007) attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing
UNITY_SPLITDNS_NAME attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing
UNITY_SPLIT_INCLUDE attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing UNITY_NATT_PORT
attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing UNITY_LOCAL_LAN
attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing UNITY_PFS attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing UNITY_FW_TYPE
attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing
UNITY_BACKUP_SERVERS attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing (20003) attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing (20004) attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing
UNITY_DDNS_HOSTNAME attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing (20005) attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] processing
UNITY_DDNS_HOSTNAME attribute
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] peer supports MOBIKE
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] authentication of
'[email protected]' (myself) with RSA signature successful
Jul 10 16:42:10 debian-vm1-alexis charon: 12[IKE] sending end entity cert
"C=CA, O=Test, CN=oCM"
Jul 10 16:42:10 debian-vm1-alexis charon: 12[ENC] generating IKE_AUTH response
1 [ IDr CERT AUTH EAP/REQ/ID ]
Jul 10 16:42:10 debian-vm1-alexis charon: 12[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300] (1200 bytes)
Jul 10 16:42:10 debian-vm1-alexis charon: 10[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300]
Jul 10 16:42:10 debian-vm1-alexis charon: 09[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500]
Jul 10 16:42:10 debian-vm1-alexis charon: 09[NET] waiting for data on sockets
Jul 10 16:42:10 debian-vm1-alexis charon: 11[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500] (112 bytes)
Jul 10 16:42:10 debian-vm1-alexis charon: 11[ENC] parsed IKE_AUTH request 2 [
EAP/RES/ID ]
Jul 10 16:42:10 debian-vm1-alexis charon: 11[IKE] received EAP identity
'[email protected]'
Jul 10 16:42:10 debian-vm1-alexis charon: 11[CFG] sending RADIUS Access-Request
to server '10.1.65.50'
Jul 10 16:42:10 debian-vm1-alexis charon: 11[CFG] received RADIUS
Access-Challenge from server '10.1.65.50'
Jul 10 16:42:10 debian-vm1-alexis charon: 11[IKE] initiating EAP_TLS method (id
0x01)
Jul 10 16:42:10 debian-vm1-alexis charon: 11[ENC] generating IKE_AUTH response
2 [ EAP/REQ/TLS ]
Jul 10 16:42:10 debian-vm1-alexis charon: 11[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300] (80 bytes)
Jul 10 16:42:10 debian-vm1-alexis charon: 10[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300]
Jul 10 16:42:10 debian-vm1-alexis charon: 09[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500]
Jul 10 16:42:10 debian-vm1-alexis charon: 09[NET] waiting for data on sockets
Jul 10 16:42:10 debian-vm1-alexis charon: 13[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500] (144 bytes)
Jul 10 16:42:10 debian-vm1-alexis charon: 13[ENC] parsed IKE_AUTH request 3 [
EAP/RES/TLS ]
Jul 10 16:42:10 debian-vm1-alexis charon: 13[CFG] sending RADIUS Access-Request
to server '10.1.65.50'
Jul 10 16:42:10 debian-vm1-alexis charon: 13[CFG] received RADIUS
Access-Challenge from server '10.1.65.50'
Jul 10 16:42:10 debian-vm1-alexis charon: 13[ENC] generating IKE_AUTH response
3 [ EAP/REQ/TLS ]
Jul 10 16:42:10 debian-vm1-alexis charon: 13[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300] (1104 bytes)
Jul 10 16:42:10 debian-vm1-alexis charon: 10[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300]
Jul 10 16:42:10 debian-vm1-alexis charon: 09[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500]
Jul 10 16:42:10 debian-vm1-alexis charon: 09[NET] waiting for data on sockets
Jul 10 16:42:10 debian-vm1-alexis charon: 05[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500] (80 bytes)
Jul 10 16:42:10 debian-vm1-alexis charon: 05[ENC] parsed IKE_AUTH request 4 [
EAP/RES/TLS ]
Jul 10 16:42:10 debian-vm1-alexis charon: 05[CFG] sending RADIUS Access-Request
to server '10.1.65.50'
Jul 10 16:42:10 debian-vm1-alexis charon: 05[CFG] received RADIUS
Access-Challenge from server '10.1.65.50'
Jul 10 16:42:10 debian-vm1-alexis charon: 05[ENC] generating IKE_AUTH response
4 [ EAP/REQ/TLS ]
Jul 10 16:42:10 debian-vm1-alexis charon: 05[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300] (880 bytes)
Jul 10 16:42:10 debian-vm1-alexis charon: 10[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300]
Jul 10 16:42:11 debian-vm1-alexis charon: 09[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500]
Jul 10 16:42:11 debian-vm1-alexis charon: 09[NET] waiting for data on sockets
Jul 10 16:42:11 debian-vm1-alexis charon: 02[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500] (1376 bytes)
Jul 10 16:42:11 debian-vm1-alexis charon: 02[ENC] parsed IKE_AUTH request 5 [
EAP/RES/TLS ]
Jul 10 16:42:11 debian-vm1-alexis charon: 02[CFG] sending RADIUS Access-Request
to server '10.1.65.50'
Jul 10 16:42:11 debian-vm1-alexis charon: 02[CFG] received RADIUS
Access-Challenge from server '10.1.65.50'
Jul 10 16:42:11 debian-vm1-alexis charon: 02[ENC] generating IKE_AUTH response
5 [ EAP/REQ/TLS ]
Jul 10 16:42:11 debian-vm1-alexis charon: 02[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300] (80 bytes)
Jul 10 16:42:11 debian-vm1-alexis charon: 10[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300]
Jul 10 16:42:11 debian-vm1-alexis charon: 09[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500]
Jul 10 16:42:11 debian-vm1-alexis charon: 09[NET] waiting for data on sockets
Jul 10 16:42:11 debian-vm1-alexis charon: 16[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500] (224 bytes)
Jul 10 16:42:11 debian-vm1-alexis charon: 16[ENC] parsed IKE_AUTH request 6 [
EAP/RES/TLS ]
Jul 10 16:42:11 debian-vm1-alexis charon: 16[CFG] sending RADIUS Access-Request
to server '10.1.65.50'
Jul 10 16:42:11 debian-vm1-alexis charon: 16[CFG] received RADIUS
Access-Challenge from server '10.1.65.50'
Jul 10 16:42:11 debian-vm1-alexis charon: 16[ENC] generating IKE_AUTH response
6 [ EAP/REQ/TLS ]
Jul 10 16:42:11 debian-vm1-alexis charon: 16[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300] (144 bytes)
Jul 10 16:42:11 debian-vm1-alexis charon: 10[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300]
Jul 10 16:42:11 debian-vm1-alexis charon: 09[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500]
Jul 10 16:42:11 debian-vm1-alexis charon: 09[NET] waiting for data on sockets
Jul 10 16:42:11 debian-vm1-alexis charon: 15[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500] (80 bytes)
Jul 10 16:42:11 debian-vm1-alexis charon: 15[ENC] parsed IKE_AUTH request 7 [
EAP/RES/TLS ]
Jul 10 16:42:11 debian-vm1-alexis charon: 15[CFG] sending RADIUS Access-Request
to server '10.1.65.50'
Jul 10 16:42:11 debian-vm1-alexis charon: 15[CFG] received RADIUS Access-Accept
from server '10.1.65.50'
Jul 10 16:42:11 debian-vm1-alexis charon: 15[IKE] RADIUS authentication of
'[email protected]' successful
Jul 10 16:42:11 debian-vm1-alexis charon: 15[IKE] EAP method EAP_TLS succeeded,
MSK established
Jul 10 16:42:11 debian-vm1-alexis charon: 15[ENC] generating IKE_AUTH response
7 [ EAP/SUCC ]
Jul 10 16:42:11 debian-vm1-alexis charon: 15[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300] (80 bytes)
Jul 10 16:42:11 debian-vm1-alexis charon: 10[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300]
Jul 10 16:42:11 debian-vm1-alexis charon: 09[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500]
Jul 10 16:42:11 debian-vm1-alexis charon: 09[NET] waiting for data on sockets
Jul 10 16:42:11 debian-vm1-alexis charon: 14[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500] (384 bytes)
Jul 10 16:42:11 debian-vm1-alexis charon: 14[ENC] payload of type AUTH more
than 1 times (2) occurred in current message
Jul 10 16:42:11 debian-vm1-alexis charon: 14[IKE] message verification failed
Jul 10 16:42:11 debian-vm1-alexis charon: 14[ENC] generating IKE_AUTH response
8 [ N(INVAL_SYN) ]
Jul 10 16:42:11 debian-vm1-alexis charon: 14[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300] (80 bytes)
Jul 10 16:42:11 debian-vm1-alexis charon: 14[IKE] IKE_AUTH request with message
ID 8 processing failed
Jul 10 16:42:11 debian-vm1-alexis charon: 10[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300]
Jul 10 16:42:11 debian-vm1-alexis charon: 09[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500]
Jul 10 16:42:11 debian-vm1-alexis charon: 09[NET] waiting for data on sockets
Jul 10 16:42:11 debian-vm1-alexis charon: 01[NET] received packet: from
10.1.65.126[49300] to 10.1.65.147[4500] (80 bytes)
Jul 10 16:42:11 debian-vm1-alexis charon: 01[ENC] parsed INFORMATIONAL request
9 [ D ]
Jul 10 16:42:11 debian-vm1-alexis charon: 01[IKE] AUTH payload missing
Jul 10 16:42:11 debian-vm1-alexis charon: 01[ENC] generating INFORMATIONAL
response 9 [ N(AUTH_FAILED) ]
Jul 10 16:42:11 debian-vm1-alexis charon: 01[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300] (80 bytes)
Jul 10 16:42:11 debian-vm1-alexis charon: 01[IKE] IKE_SA rw-eap-tls[20] state
change: CONNECTING => DESTROYING
Jul 10 16:42:11 debian-vm1-alexis charon: 10[NET] sending packet: from
10.1.65.147[4500] to 10.1.65.126[49300]
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users