Hi Gerd,

I disagree with your statement because I think you're not making two key differentiations that result in an unfair blanket judgment.

First, there was a post a while ago stating that there is a known problem using XAUTH with Juniper SRX-based devices, because Juniper has changed how their XAUTH implementation works between the older SSG devices and their newer SRX devices.

On the other hand, the SSG devices seem to work very well with the Shrew Soft VPN Client - there are lots of people successfully using SSGs and Shrew on this list.

The second differentiation is relevant to the issue below, which is the difference between using passwords vs certificates. Certificates are hard; people struggle with them all the time in all kinds of applications (try getting an embedded Java implementation to trust self-signed certificates for instance) and signing chains are frequently an issue. That people trying to use certificates are having problems is not necessarily a problem with Shrew or Juniper - it could just be the certificates themselves.

I am sure that there are people on this list who use certificates with Juniper SSGs and Shrew who can help. We merely have to be patient in the hope that one of them will help out.


On 04/22/2013 07:58 AM, Gerd Röthig wrote:
Hello all,

I read this mailing list for some time now. Again and again, there are
problems with Shrew Soft VPN client and several Juniper equipment. It seems
that Shrew Soft VPN Client simply does not work with the Juniper devices.
Perhaps, this is by design (if Juniper offers their own client software).
Or, it is like many ultra-professional "Web Applications" which only work
with Internet Explorer. Although it seems like a suboptimal idea at a first
glance, you should perhaps be thinking about using the Juniper certified
client software (if there is any) or reverting to Cisco Systems VPN client.

Kind regards,

Gerd


2013/4/22 eric xu <[email protected]>

Hi All,

While testing Client 2.17 on Ubuntu 12.04 LTS following
Howto_Juniper_SSG_Using_Certs) with SSG20 I come across following problem:

13/04/22 15:34:16 -> : send NAT-T:IKE packet 192.168.1.108:4500 ->
120.72.49.xxx:4500 ( 2036 bytes )
13/04/22 15:34:16 ii : *unable to get local issuer certificate(20) at
depth:0*
13/04/22 15:34:16 ii : subject :/C=CN/ST=Beijing/L=Beijing/O= Ltd.
/O=Chenhongli Beijing Co./OU=IT/CN=0164022011000224/CN=rsa-key/CN=
vpn.chenhongli-bj.net/CN=Ms. Helen Wang
13/04/22 15:34:16 !! : unable to verify remote peer certificate

Since it is a self-signed certificate and per howto I did place the ca.crt
into ~/.ike/certs but still has above problem.

Any help will be appreciated.



_______________________________________________
vpn-help mailing list
[email protected]
https://lists.shrew.net/mailman/listinfo/vpn-help

Reply via email to