(Here again the same message with better formating relative to gmail)

Hello All,

I'm struggling to get Strongswan to work with my Blackberry 10 without success.
Can you please help
I get every time a Delay connection error on my BB10

Here extract of a Whireshark trace (without the timestamps)

80.12.51.34   -  192.168.1.29   ISAKMP 442 IKE_SA_INIT MID=00 Initiator Request
192.168.1.29 -  80.12.51.34     ISAKMP 354 IKE_SA_INIT MID=00 Responder Response
80.12.51.34   -  192.168.1.29   ISAKMP 330 IKE_AUTH MID=01 Initiator Request
192.168.1.29 -  80.12.51.34     ISAKMP 154 IKE_AUTH MID=01 Responder Response
80.12.51.34  -  192.168.1.29    ISAKMP 330 IKE_AUTH MID=01 Initiator Request
80.12.51.34  -  192.168.1.29    ISAKMP 330 IKE_AUTH MID=01 Initiator Request

Thanks

Christian


Mobile BB10-----INTERNET-----NAT gateway
80.12.51.34                          Public: 78.229.20.105
                                                    : ckl.freeboxos.fr
                                           Private:192.168.1.254/24
                                              |
                                              |
                                        VPN (Pi)-----------(Home Network)
                                      (Raspberry Pi)    192.168.1.0/24
                                       192.168.1.29


Mobile BB10
    Blackberry Z10 Client in the Internet, that establishes a tunneled
    connection to the VPN gateway (Pi) in the home network
    by using the MSCHAPv2 EAP protocol via IKEv2. (Preshared Key)
NAT Gateway:
    This device, serving as a NAT-router of the home network,
    performs forwarding the VPN requests of my BB10
    to the VPN gateway (Pi). The gateway is accessible by the
    FQDN: "ckl.freeboxos.fr" from the internet.
    Local IP address of the gateway is 192.168.1.254
VPN (Pi):
    Acts as the other endpoint for the VPN connection to my
    Home Network 192.168.1.0/24.
    Uses the StrongSwan VPN library .
Goal:
    My BB10 (from the Internet) to have access to my Home Network

StrongSwan (Version):
---------------------------------
Linux strongSwan U5.2.1/K4.4.13+

Port Forwarded on NAT Gateway
-----------------------------------------------
UDP 500,4500  -- Forwarded -->   192.168.1.29


Configuration BB10:
------------------------------
Profile Name            : home
Server Address          : 78.229.20.105
Gateway Type            : Generic IKEv2 VPN Server
Authentication Type        : EAP-MSCHAPv2
Authentication ID Type    : email
ID Authentication        : alice     (not used can be enything)
MSCHAPv2 EAP Identity    : alice     (not used can be enything)
MSCHAPv2 Username        : alice     (-->username in ipsec.secrets)
MSCHAPv2 Password        : alicepass (-->alice pasword in ipsec.secrets)
Gateway Auth Type        : PSK
Gateway Auth ID Type    : IPv4
Gateway Preshared Key    : pskpass   (-->PSK password in ipsec.secrets)

file /etc/sysctl.conf:
-----------------------------
net.ipv4.ip_forward = 1

file /etc/ipsec.secrets:
--------------------------------
include /var/lib/strongswan/ipsec.secrets.inc
: PSK "pskpass"
alice : EAP "alicepass"

file /etc/ipsec.conf:
------------------------------
config setup
   uniqueids=yes

conn %default
   ikelifetime=60m
   keylife=20m
   rekeymargin=3m
   keyingtries=1
   keyexchange=ikev2
   authby=secret

conn rem
   rekey=no
   leftsubnet=0.0.0.0/0
   leftauth=psk
   [email protected]
   right=%any
   rightsourceip=192.168.1.254/24
   rightauth=eap-mschapv2
   rightsendcert=never
   eap_identity=%any
   auto=add

file /etc/strongswan.conf :
-----------------------------------
charon {
  load = aes des sha1 sha2 md4 md5 pem pkcs1 gmp random nonce x509
curl revocation hmac xcbc stroke kernel-netlink socket-default
fips-prf eap-mschapv2 eap-identity updown
}

Adjustments to IPTABLES, so that the Pi maps the traffic of the VPN
network to its physical network adapter
---------------------------------------------------------------------------------------------------------------------------------------------------------------
sudo iptables -A POSTROUTING -t nat -o eth0 -j MASQUERADE
sudo iptables -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS
--clamp-mss-to-pmtu
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to