1) The log shows that while it took a couple of attempts to establish
and IKE SA, it was eventually up with and ESP Child SA as well. So, as
far as I can see in your logs, the connection should be up. What happens
next? do the logs show that the connection is dropped for some reason?
what is the output of "ipsec statusall"? Can you confirm that you are
receiving ESP packets afterward, or if ESP is blocked?
2) Depending on the vpn clients you use, your proposals seem OK. I
would expand them a bit with better DH group in case the client supports
it in both IKE and ESP configs. In ESP case you can have two proposals,
with and without DH groups if you have clients that can't do DH with
ESP. Unless you really think you need 3des-sha1 for some clients, there
is no reason to keep it. Here is an example:
ike=aes256-sha256-ecp521-ecp256-modp4096-modp2048!
esp=aes256-sha256-sha1-ecp521-ecp256-modp4096-modp2048, aes256-sha256-sha1!
Regards,
Jafar
On 5/11/2018 3:17 AM, Houman wrote:
Hello Jafar,
Apologies, as I didn't explain what I had already tried.
1) I have tried your suggestion:
ike=aes256-sha256-prfsha256-modp2048-modp1024!
esp=aes256-sha256,aes256-sha1,3des-sha1!
I can connect to it via iOS 11 and OSX High Sierra without any problem
from UK. And I no longer get that error message: "DH group MODP_2048
inacceptable, requesting MODP_1024".
However my user still can't connect. As he is connecting from Iran, I
strongly suspect this is because of a recent tightening of the VPN
traffic due to the recent political circumstances. Further below I
have pasted the log when he is trying to connect unsuccessfully. It
says "Connecting..." and after a few sconds, it drops.
2) Unrelated to that, considering what we discussed in this thread, it
seems I could skip both *prfsha256* and *modp1024*. Would you say this
is now the perfect settings for iOS 10+, OSX and Windows 10?
* ike=aes256-sha256-modp2048!*
* esp=aes256-sha256,aes256-sha1,3des-sha1!*
Many Thanks for your help,
Houman
Btw here is the log when he is trying to connect:
May 11 07:55:16 vpn-server charon: 02[NET] received packet: from
109.230.xxx.xx[500] to 172.31.xxx.xxx[500] (604 bytes)
May 11 07:55:16 vpn-server charon: 02[ENC] parsed IKE_SA_INIT request
0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
May 11 07:55:16 vpn-server charon: 02[IKE] 109.230.xxx.xx is
initiating an IKE_SA
May 11 07:55:16 vpn-server charon: 02[IKE] local host is behind NAT,
sending keep alives
May 11 07:55:16 vpn-server charon: 02[IKE] remote host is behind NAT
May 11 07:55:16 vpn-server charon: 02[ENC] generating IKE_SA_INIT
response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(MULT_AUTH) ]
May 11 07:55:16 vpn-server charon: 02[NET] sending packet: from
172.31.xxx.xxx[500] to 109.230.xxx.xx[500] (448 bytes)
May 11 07:55:36 vpn-server charon: 01[IKE] sending keep alive to
109.230.xxx.xx[500]
May 11 07:55:46 vpn-server charon: 11[JOB] deleting half open IKE_SA
after timeout
May 11 07:57:44 vpn-server charon: 16[NET] received packet: from
109.230.xxx.xx[1] to 172.31.xxx.xxx[500] (624 bytes)
May 11 07:57:44 vpn-server charon: 16[ENC] parsed IKE_SA_INIT request
0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) V V V V ]
May 11 07:57:44 vpn-server charon: 16[IKE] received MS NT5
ISAKMPOAKLEY v9 vendor ID
May 11 07:57:44 vpn-server charon: 16[IKE] received MS-Negotiation
Discovery Capable vendor ID
May 11 07:57:44 vpn-server charon: 16[IKE] received
Vid-Initial-Contact vendor ID
May 11 07:57:44 vpn-server charon: 16[ENC] received unknown vendor ID:
01:52:8b:bb:c0:06:96:12:18:49:ab:9a:1c:5b:2a:51:00:00:00:02
May 11 07:57:44 vpn-server charon: 16[IKE] 109.230.xxx.xx is
initiating an IKE_SA
May 11 07:57:44 vpn-server charon: 16[IKE] local host is behind NAT,
sending keep alives
May 11 07:57:44 vpn-server charon: 16[IKE] remote host is behind NAT
May 11 07:57:44 vpn-server charon: 16[ENC] generating IKE_SA_INIT
response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(MULT_AUTH) ]
May 11 07:57:44 vpn-server charon: 16[NET] sending packet: from
172.31.xxx.xxx[500] to 109.230.xxx.xx[1] (440 bytes)
May 11 07:57:45 vpn-server charon: 04[NET] received packet: from
109.230.xxx.xx[1024] to 172.31.xxx.xxx[4500] (1536 bytes)
May 11 07:57:45 vpn-server charon: 04[ENC] parsed IKE_AUTH request 1 [
IDi CERTREQ N(MOBIKE_SUP) CPRQ(ADDR DNS NBNS SRV ADDR6 DNS6 SRV6) SA
TSi TSr ]
May 11 07:57:45 vpn-server charon: 04[IKE] received 54 cert requests
for an unknown ca
May 11 07:57:45 vpn-server charon: 04[CFG] looking for peer configs
matching 172.31.xxx.xxx[%any]...109.230.xxx.xx[192.168.1.103]
May 11 07:57:45 vpn-server charon: 04[CFG] selected peer config
'roadwarrior'
May 11 07:57:45 vpn-server charon: 04[IKE] initiating EAP_IDENTITY
method (id 0x00)
May 11 07:57:45 vpn-server charon: 04[IKE] peer supports MOBIKE
May 11 07:57:45 vpn-server charon: 04[IKE] authentication of
'vpn1.xxx.com <http://vpn1.xxx.com>' (myself) with RSA signature
successful
May 11 07:57:45 vpn-server charon: 04[IKE] sending end entity cert
"CN=vpn1.xxx.com <http://vpn1.xxx.com>"
May 11 07:57:45 vpn-server charon: 04[IKE] sending issuer cert "C=US,
O=Let's Encrypt, CN=Let's Encrypt Authority X3"
May 11 07:57:45 vpn-server charon: 04[ENC] generating IKE_AUTH
response 1 [ IDr CERT CERT AUTH EAP/REQ/ID ]
May 11 07:57:45 vpn-server charon: 04[NET] sending packet: from
172.31.xxx.xxx[4500] to 109.230.xxx.xx[1024] (3616 bytes)
May 11 07:57:45 vpn-server charon: 02[NET] received packet: from
109.230.xxx.xx[1024] to 172.31.xxx.xxx[4500] (96 bytes)
May 11 07:57:45 vpn-server charon: 02[ENC] parsed IKE_AUTH request 2 [
EAP/RES/ID ]
May 11 07:57:45 vpn-server charon: 02[IKE] received EAP identity 'houmie'
May 11 07:57:45 vpn-server charon: 02[IKE] initiating EAP_MSCHAPV2
method (id 0x6C)
May 11 07:57:45 vpn-server charon: 02[ENC] generating IKE_AUTH
response 2 [ EAP/REQ/MSCHAPV2 ]
May 11 07:57:45 vpn-server charon: 02[NET] sending packet: from
172.31.xxx.xxx[4500] to 109.230.xxx.xx[1024] (112 bytes)
May 11 07:57:45 vpn-server charon: 03[NET] received packet: from
109.230.xxx.xx[1024] to 172.31.xxx.xxx[4500] (144 bytes)
May 11 07:57:45 vpn-server charon: 03[ENC] parsed IKE_AUTH request 3 [
EAP/RES/MSCHAPV2 ]
May 11 07:57:45 vpn-server charon: 03[ENC] generating IKE_AUTH
response 3 [ EAP/REQ/MSCHAPV2 ]
May 11 07:57:45 vpn-server charon: 03[NET] sending packet: from
172.31.xxx.xxx[4500] to 109.230.xxx.xx[1024] (144 bytes)
May 11 07:57:45 vpn-server charon: 01[NET] received packet: from
109.230.xxx.xx[1024] to 172.31.xxx.xxx[4500] (80 bytes)
May 11 07:57:45 vpn-server charon: 01[ENC] parsed IKE_AUTH request 4 [
EAP/RES/MSCHAPV2 ]
May 11 07:57:45 vpn-server charon: 01[IKE] EAP method EAP_MSCHAPV2
succeeded, MSK established
May 11 07:57:45 vpn-server charon: 01[ENC] generating IKE_AUTH
response 4 [ EAP/SUCC ]
May 11 07:57:45 vpn-server charon: 01[NET] sending packet: from
172.31.xxx.xxx[4500] to 109.230.xxx.xx[1024] (80 bytes)
May 11 07:57:46 vpn-server charon: 11[NET] received packet: from
109.230.xxx.xx[1024] to 172.31.xxx.xxx[4500] (112 bytes)
May 11 07:57:46 vpn-server charon: 11[ENC] parsed IKE_AUTH request 5 [
AUTH ]
May 11 07:57:46 vpn-server charon: 11[IKE] authentication of
'192.168.1.103' with EAP successful
May 11 07:57:46 vpn-server charon: 11[IKE] authentication of
'vpn1.xxx.com <http://vpn1.xxx.com>' (myself) with EAP
May 11 07:57:46 vpn-server charon: 11[IKE] IKE_SA roadwarrior[4]
established between 172.31.xxx.xxx[vpn1.xxx.com
<http://vpn1.xxx.com>]...109.230.xxx.xx[192.168.1.103]
May 11 07:57:46 vpn-server charon: 11[IKE] peer requested virtual IP %any
May 11 07:57:46 vpn-server charon: 11[CFG] reassigning offline lease
to 'houmie'
May 11 07:57:46 vpn-server charon: 11[IKE] assigning virtual IP
10.10.10.1 to peer 'houmie'
May 11 07:57:46 vpn-server charon: 11[IKE] peer requested virtual IP %any6
May 11 07:57:46 vpn-server charon: 11[IKE] no virtual IP found for
%any6 requested by 'houmie'
May 11 07:57:46 vpn-server charon: 11[IKE] CHILD_SA roadwarrior{2}
established with SPIs caa2d799_i 8f5ab10c_o and TS 0.0.0.0/0
<http://0.0.0.0/0> === 10.10.10.1/32 <http://10.10.10.1/32>
May 11 07:57:46 vpn-server charon: 11[ENC] generating IKE_AUTH
response 5 [ AUTH CPRP(ADDR DNS DNS) SA TSi TSr N(MOBIKE_SUP)
N(NO_ADD_ADDR) ]
May 11 07:57:46 vpn-server charon: 11[NET] sending packet: from
172.31.xxx.xxx[4500] to 109.230.xxx.xx[1024] (256 bytes)
On 10 May 2018 at 21:52, John Connett <[email protected]
<mailto:[email protected]>> wrote:
Don't know if this might be related:
https://support.microsoft.com/en-gb/help/4103721/windows-10-update-kb4103721
<https://support.microsoft.com/en-gb/help/4103721/windows-10-update-kb4103721>
"Addresses an issue that prevents certain VPN apps from working on
builds of Windows 10, version 1803. These apps were developed
using an SDK version that precedes Windows 10, version 1803, and
use the public RasSetEntryProperties API".
Regards
--
John Connett
------------------------------------------------------------------------
*From:* Users <[email protected]
<mailto:[email protected]>> on behalf of Jafar
Al-Gharaibeh <[email protected] <mailto:[email protected]>>
*Sent:* 10 May 2018 21:33
*To:* Houman
*Cc:* [email protected] <mailto:[email protected]>
*Subject:* Re: [strongSwan] Sudden issues with Windows 10 clients
Hi Houman,
Similar to the Windows problem you had earlier, you don't have
the correct combination of configured algorithms. look at the logs:
May 10 20:26:48 vpn-server charon: 12[IKE] DH group MODP_2048
inacceptable, requesting MODP_1024
The iphone expect modp2048, but your configuration says
modp1024. Look back at the suggestion we made for Windows and
just use the same configuration.
Regards,
Jafar