On 11/30/2011 05:41 PM, A. J. Clark wrote:
Hi there,

I can confirm that this issue exists in Linux as well... the same
certificate/VPN setup shows the following;

...
DB : phase1 resend event canceled ( ref count = 1 )
->  : send IKE packet 10.250.0.243:500 ->  10.250.0.241:500 ( 1984 bytes )
ii : unable to get certificate CRL(3) at depth:0
ii : subject :/ST=British Columbia/L=Kamloops/O=SuperTestzing/OU=IPSec
VPN/CN=0162072007000231/CN=(250)
434-8700/CN=ecdsa-key/CN=test.cert.vpn/CN=Adam Clark
ii : unable to get certificate CRL(3) at depth:1
ii : subject :/C=CA/ST=British
Columbia/L=Kamloops/O=Testzing/OU=StaffVPN/CN=test.cert.vpn
Segmentation fault


I'm not sure if/why iked might be having issues with no CRL setup (as
there's no place to put a CRL setup), or if it's just coincidence that
that's the last thing it logs before it crashes.


Hi Adam,

The only reason I think that there must be a CRL in your certs is because iirc none of the other cert-based iked logs that I've seen on this list say anything about CRLs.

Did I already ask if there's something that would block your certificate services on the client from going to the web to check a CRL?

BTW, if you've got linux, you should be able to run a command sort of like this to show you the cert and if there's a CRL in it (if it's not x509, use the appropriate format)
openssl x509 -in cert.crt -text
_______________________________________________
vpn-help mailing list
[email protected]
http://lists.shrew.net/mailman/listinfo/vpn-help

Reply via email to