Of course not, you didn't do what I wrote. You need two conns. One for your host-to-host scenario and one for the initiators from the internet. What you previously had worked for the host-to-host scenario.
On 27.03.2018 21:20, Info wrote: > > Back to this from the very beginning. > > Tue, 2018-03-27 12:18 15[CFG] added vici connection: ikev2-pubkey > Tue, 2018-03-27 12:18 08[CFG] vici client 1 disconnected > Tue, 2018-03-27 12:18 11[NET] <1> received packet: from 172.58.44.91[43260] > to 192.168.1.16[500] (704 bytes) > Tue, 2018-03-27 12:18 11[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No > N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ] > Tue, 2018-03-27 12:18 11[CFG] <1> looking for an ike config for > 192.168.1.16...172.58.44.91 > Tue, 2018-03-27 12:18 11[IKE] <1> no IKE config found for > 192.168.1.16...172.58.44.91, sending NO_PROPOSAL_CHOSEN > Tue, 2018-03-27 12:18 11[ENC] <1> generating IKE_SA_INIT response 0 [ > N(NO_PROP) ] > Tue, 2018-03-27 12:18 11[NET] <1> sending packet: from 192.168.1.16[500] to > 172.58.44.91[43260] (36 bytes) > Tue, 2018-03-27 12:18 11[IKE] <1> IKE_SA (unnamed)[1] state change: CREATED > => DESTROYING > > connections { > > # Roadwarrior Responder: > https://wiki.strongswan.org/projects/strongswan/wiki/UsableExamples > > ikev2-pubkey { > version = 2 > remote_addrs = 192.168.1.0/24 > rekey_time = 0s > fragmentation = yes > dpd_delay = 30s > # dpd_timeout doesn't do anything for IKEv2. The general > IKEv2 packet timeouts are used. > local-1 { > certs = cygnus-Cert.pem > id = cygnus.darkmatter.org > } > remote-1 { > # defaults are fine. > } > children { > ikev2-pubkey { > local_ts = 0.0.0.0/0 #,::/0 > rekey_time = 0s > dpd_action = clear > } > } > } > } > > > On 03/27/2018 12:07 PM, Noel Kuntze wrote: >> Use "certs", not "cert". It's a typo. >> >> On 27.03.2018 21:05, Info wrote: >>> Back to the old: >>> >>> Mar 27 11:54:16 cygnus.darkmatter.org charon-systemd[64014]: loaded ANY >>> private key >>> Mar 27 11:54:16 cygnus.darkmatter.org swanctl[64031]: no authorities found, >>> 0 unloaded >>> Mar 27 11:54:16 cygnus.darkmatter.org swanctl[64031]: no pools found, 0 >>> unloaded >>> Mar 27 11:54:16 cygnus.darkmatter.org swanctl[64031]: loading connection >>> 'ikev2-pubkey' failed: unknown option: cert, config discarded >>> Mar 27 11:54:16 cygnus.darkmatter.org swanctl[64031]: loaded 0 of 1 >>> connections, 1 failed to load, 0 unloaded >>> Mar 27 11:54:16 cygnus.darkmatter.org systemd[1]: >>> strongswan-swanctl.service: control process exited, code=exited status=22 >>> >>> Daemon won't start. And in fact in >>> https://wiki.strongswan.org/projects/strongswan/wiki/Swanctlconf >>> ... there is no cert directive, to go anywhere. When I comment out cert >>> the daemon starts._ >>> >>> >>> _ >>> >>> _swanctl.conf_ >>> >>> connections { >>> >>> # Roadwarrior Responder: >>> https://wiki.strongswan.org/projects/strongswan/wiki/UsableExamples >>> >>> ikev2-pubkey { >>> version = 2 >>> remote_addrs = 192.168.111.0/24 >>> rekey_time = 0s >>> fragmentation = yes >>> dpd_delay = 30s >>> # dpd_timeout doesn't do anything for IKEv2. The general >>> IKEv2 packet timeouts are used. >>> local-1 { >>> cert = zeta-Cert.pem >>> id = zeta.darkmatter.org >>> } >>> remote-1 { >>> # defaults are fine. >>> } >>> children { >>> ikev2-pubkey { >>> local_ts = 0.0.0.0/0 #,::/0 >>> rekey_time = 0s >>> dpd_action = clear >>> } >>> } >>> } >>> } >>> >>> >>> On 03/27/2018 11:38 AM, Noel Kuntze wrote: >>>> Also: You need a second conn that is fitting to what the initiators from >>>> the Internet want: >>>> - Tunnel Mode >>>> - A virtual IP >>>> - Access to the Internet >>>> >>>> Take the IKEv2 related parts of the roadwarrior configurations from the >>>> UsableExamples page. And make sure you get the structure right this time. >>>> >>>> On 27.03.2018 20:32, Info wrote: >>>>> Nothing has worked. So starting over again, with another new config, pro >>>>> forma <https://wiki.strongswan.org/projects/strongswan/wiki/HelpRequests>. >>>>> >>>>> Running CentOS 7.4 with IPSec gateway as OpenStack VM, DNATted to and >>>>> SNATted from by LAN gateway. Certs only, SELinux permissive, firewall >>>>> down. >>>>> >>>>> The remote Android Strongswan app (initiator) is set: >>>>> Server: quantum-equities.com VPN Type IKEv2 certificate >>>>> User certificate: aries User Identity: >>>>> Default >>>>> CA cert: Select automatically Profile name: cygnus >>>>> Adv. Server ID: cygnus.darkmatter.org Send cert requests >>>>> Custom subnets: 192.168.1.0/24 >>>>> >>>>> >>>>> _strongswan.conf:_ >>>>> charon { >>>>> load_modular = yes >>>>> plugins { >>>>> include strongswan.d/charon/*.conf >>>>> } >>>>> } >>>>> include strongswan.d/*.conf >>>>> >>>>> _charon.conf_ >>>>> >>>>> # Needed to avoid in journalctl "fragmented IKE message is too >>>>> large" >>>>> max_packet = 30000 >>>>> >>>>> filelog { >>>>> /var/log/charon.log { >>>>> time_format = %a, %Y-%m-%d %R >>>>> ike_name = yes >>>>> append = no >>>>> default = 2 >>>>> flush_line = yes >>>>> >>>>> mgr = 0 >>>>> net = 1 >>>>> enc = 1 >>>>> asn = 1 >>>>> job = 1 >>>>> knl = 1 >>>>> } >>>>> } >>>>> } >>>>> >>>>> >>>>> _swanctl.conf_ >>>>> >>>>> connections { >>>>> >>>>> ikev2-pubkey { >>>>> remote_addrs = %any >>>>> local { >>>>> } >>>>> remote { >>>>> } >>>>> >>>>> children { >>>>> remote_ts = 192.168.1.0/24 >>>>> local_ts = 192.168.1.0/24 >>>>> local_addrs = 192.168.1.16 >>>>> remote_addrs = 192.168.1.5 >>>>> mode = transport >>>>> } >>>>> } >>>>> } >>>>> >>>>> # swanctl -L >>>>> ikev2-pubkey: IKEv1/2, no reauthentication, rekeying every 14400s >>>>> local: %any >>>>> remote: %any >>>>> local unspecified authentication: >>>>> remote unspecified authentication: >>>>> # swanctl -l >>>>> # >>>>> >>>>> # ip route show table all >>>>> default via 192.168.1.1 dev eth0 >>>>> 169.254.0.0/16 dev eth0 scope link metric 1002 >>>>> 192.168.111.0/24 dev eth0 proto kernel scope link src 192.168.1.16 >>>>> broadcast 127.0.0.0 dev lo table local proto kernel scope link src >>>>> 127.0.0.1 >>>>> local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1 >>>>> local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1 >>>>> broadcast 127.255.255.255 dev lo table local proto kernel scope link src >>>>> 127.0.0.1 >>>>> broadcast 192.168.1.0 dev eth0 table local proto kernel scope link src >>>>> 192.168.1.16 >>>>> local 192.168.1.16 dev eth0 table local proto kernel scope host src >>>>> 192.168.1.16 >>>>> broadcast 192.168.1.255 dev eth0 table local proto kernel scope link src >>>>> 192.168.1.16 >>>>> unreachable ::/96 dev lo metric 1024 error -113 >>>>> unreachable ::ffff:0.0.0.0/96 dev lo metric 1024 error -113 >>>>> unreachable 2002:a00::/24 dev lo metric 1024 error -113 >>>>> unreachable 2002:7f00::/24 dev lo metric 1024 error -113 >>>>> unreachable 2002:a9fe::/32 dev lo metric 1024 error -113 >>>>> unreachable 2002:ac10::/28 dev lo metric 1024 error -113 >>>>> unreachable 2002:c0a8::/32 dev lo metric 1024 error -113 >>>>> unreachable 2002:e000::/19 dev lo metric 1024 error -113 >>>>> unreachable 3ffe:ffff::/32 dev lo metric 1024 error -113 >>>>> fe80::/64 dev eth0 proto kernel metric 256 >>>>> local ::1 dev lo table local proto kernel metric 0 >>>>> local fe80::5054:ff:fec0:9330 dev lo table local proto kernel metric 0 >>>>> ff00::/8 dev eth0 table local metric 256 >>>>> >>>>> >>>>> # ip address >>>>> 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen >>>>> 1000 >>>>> link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 >>>>> inet 127.0.0.1/8 scope host lo >>>>> valid_lft forever preferred_lft forever >>>>> inet6 ::1/128 scope host >>>>> valid_lft forever preferred_lft forever >>>>> 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast >>>>> state UP qlen 1000 >>>>> link/ether 52:54:00:c0:93:30 brd ff:ff:ff:ff:ff:ff >>>>> inet 192.168.1.16/24 brd 192.168.1.255 scope global eth0 >>>>> valid_lft forever preferred_lft forever >>>>> inet6 fe80::5054:ff:fec0:9330/64 scope link >>>>> valid_lft forever preferred_lft forever >>>>> >>>>> >>>>> # iptables-save >>>>> # Generated by iptables-save v1.4.21 on Tue Mar 27 11:19:49 2018 >>>>> *nat >>>>> :PREROUTING ACCEPT [21:3556] >>>>> :INPUT ACCEPT [21:3556] >>>>> :OUTPUT ACCEPT [25:1200] >>>>> :POSTROUTING ACCEPT [25:1200] >>>>> COMMIT >>>>> # Completed on Tue Mar 27 11:19:49 2018 >>>>> # Generated by iptables-save v1.4.21 on Tue Mar 27 11:19:49 2018 >>>>> *mangle >>>>> :PREROUTING ACCEPT [195:20990] >>>>> :INPUT ACCEPT [195:20990] >>>>> :FORWARD ACCEPT [0:0] >>>>> :OUTPUT ACCEPT [143:13859] >>>>> :POSTROUTING ACCEPT [142:13775] >>>>> COMMIT >>>>> # Completed on Tue Mar 27 11:19:49 2018 >>>>> # Generated by iptables-save v1.4.21 on Tue Mar 27 11:19:49 2018 >>>>> *raw >>>>> :PREROUTING ACCEPT [195:20990] >>>>> :OUTPUT ACCEPT [142:13775] >>>>> COMMIT >>>>> # Completed on Tue Mar 27 11:19:49 2018 >>>>> # Generated by iptables-save v1.4.21 on Tue Mar 27 11:19:49 2018 >>>>> *filter >>>>> :INPUT ACCEPT [195:20990] >>>>> :FORWARD ACCEPT [0:0] >>>>> :OUTPUT ACCEPT [142:13775] >>>>> COMMIT >>>>> # Completed on Tue Mar 27 11:19:49 2018 >>>>> >
signature.asc
Description: OpenPGP digital signature