Package: strongswan
Version: 5.1.0-3~bpo70+1
Severity: normal

Dear Maintainer,

After upgrading to strongswan 5.1.2-4~bpo70+1 and installing 
libcharon-extra-plugins package 
which  provides the xauth-pam functions, it's not possible to authenticate with 
xauth-pam

Log files show 

/var/log/syslog

Apr 15 13:30:25 spycatcher charon: 16[ENC] parsed ID_PROT request 0 [ SA V V V 
V V V V V ]
Apr 15 13:30:25 spycatcher charon: 16[IKE] received NAT-T (RFC 3947) vendor ID
Apr 15 13:30:25 spycatcher charon: 16[IKE] received 
draft-ietf-ipsec-nat-t-ike-02 vendor ID
Apr 15 13:30:25 spycatcher charon: 16[IKE] received 
draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Apr 15 13:30:25 spycatcher charon: 16[IKE] received 
draft-ietf-ipsec-nat-t-ike-00 vendor ID
Apr 15 13:30:25 spycatcher charon: 16[IKE] received XAuth vendor ID
Apr 15 13:30:25 spycatcher charon: 16[IKE] received Cisco Unity vendor ID
Apr 15 13:30:25 spycatcher charon: 16[IKE] received FRAGMENTATION vendor ID
Apr 15 13:30:25 spycatcher charon: 16[IKE] received DPD vendor ID
Apr 15 13:30:25 spycatcher charon: 16[IKE] 149.254.xxx.xxx is initiating a Main 
Mode IKE_SA
Apr 15 13:30:25 spycatcher charon: 16[ENC] generating ID_PROT response 0 [ SA V 
V V ]
Apr 15 13:30:25 spycatcher charon: 16[NET] sending packet: from 
194.82.xxx.xxx[500] to 149.254.xxx.xxx[887] (136 bytes)
Apr 15 13:30:25 spycatcher charon: 04[NET] received packet: from 
149.254.xxx.xxx[887] to 194.82.xxx.xxx[500] (228 bytes)
Apr 15 13:30:25 spycatcher charon: 04[ENC] parsed ID_PROT request 0 [ KE No 
NAT-D NAT-D ]
Apr 15 13:30:25 spycatcher charon: 04[IKE] remote host is behind NAT
Apr 15 13:30:25 spycatcher charon: 04[IKE] sending cert request for "C=CH, 
O=Work, CN=Work strongSwan CA"
Apr 15 13:30:25 spycatcher charon: 04[ENC] generating ID_PROT response 0 [ KE 
No CERTREQ NAT-D NAT-D ]
Apr 15 13:30:25 spycatcher charon: 04[NET] sending packet: from 
194.82.xxx.xxx[500] to 149.254.xxx.xxx[887] (309 bytes)
Apr 15 13:30:26 spycatcher charon: 03[NET] received packet: from 
149.254.xxx.xxx[37144] to 194.82.xxx.xxx[4500] (1260 bytes)
Apr 15 13:30:26 spycatcher charon: 03[ENC] parsed ID_PROT request 0 [ ID CERT 
SIG CERTREQ ]
Apr 15 13:30:26 spycatcher charon: 03[IKE] ignoring certificate request without 
data
Apr 15 13:30:26 spycatcher charon: 03[IKE] received end entity cert "C=CH, 
O=Work, CN=aed-nexus4"
Apr 15 13:30:26 spycatcher charon: 03[CFG] looking for XAuthInitRSA peer 
configs matching 194.82.xxx.xxx...149.254.xxx.xxx[C=CH, O=strongSwa
n, CN=aed-nexus4]
Apr 15 13:30:26 spycatcher charon: 03[CFG] selected peer config "ipad"
Apr 15 13:30:26 spycatcher charon: 03[CFG]   using certificate "C=CH, O=Work, 
CN=aed-nexus4"
Apr 15 13:30:26 spycatcher charon: 03[CFG]   using trusted ca certificate 
"C=CH, O=Work, CN=Work strongSwan CA"
Apr 15 13:30:26 spycatcher charon: 03[CFG] checking certificate status of 
"C=CH, O=Work, CN=aed-nexus4"
Apr 15 13:30:26 spycatcher charon: 03[CFG] certificate status is not available
Apr 15 13:30:26 spycatcher charon: 03[CFG]   reached self-signed root ca with a 
path length of 0
Apr 15 13:30:26 spycatcher charon: 03[IKE] authentication of 'C=CH, O=Work, 
CN=aed-nexus4' with RSA successful
Apr 15 13:30:26 spycatcher charon: 03[IKE] authentication of 'C=CH, O=Work, 
CN=vpn1.Work' (myself) successful
Apr 15 13:30:26 spycatcher charon: 03[IKE] sending end entity cert "C=CH, 
O=Work, CN=vpn1.Work"
Apr 15 13:30:26 spycatcher charon: 03[ENC] generating ID_PROT response 0 [ ID 
CERT SIG ]
Apr 15 13:30:26 spycatcher charon: 03[NET] sending packet: from 
194.82.xxx.xxx[4500] to 149.254.xxx.xxx[37144] (1244 bytes)
Apr 15 13:30:26 spycatcher charon: 03[ENC] generating TRANSACTION request 
1708039773 [ HASH CPRQ(X_USER X_PWD) ]
Apr 15 13:30:26 spycatcher charon: 03[NET] sending packet: from 
194.82.xxx.xxx[4500] to 149.254.xxx.xxx[37144] (76 bytes)
Apr 15 13:30:26 spycatcher charon: 02[NET] received packet: from 
149.254.xxx.xxx[37144] to 194.82.xxx.xxx[4500] (108 bytes)
Apr 15 13:30:26 spycatcher charon: 02[ENC] parsed INFORMATIONAL_V1 request 
2643138295 [ HASH N(INITIAL_CONTACT) ]
Apr 15 13:30:26 spycatcher charon: 01[NET] received packet: from 
149.254.xxx.xxx[37144] to 194.82.xxx.xxx[4500] (108 bytes)
Apr 15 13:30:26 spycatcher charon: 01[ENC] parsed TRANSACTION response 
1708039773 [ HASH CPRP(X_USER X_PWD) ]
Apr 15 13:30:29 spycatcher charon: 01[IKE] XAuth pam_authenticate for 'dawsona' 
failed: Authentication failure
Apr 15 13:30:29 spycatcher charon: 01[IKE] XAuth authentication of 'dawsona' 
failed
Apr 15 13:30:29 spycatcher charon: 01[ENC] generating TRANSACTION request 
761923766 [ HASH CPS(X_STATUS) ]
Apr 15 13:30:29 spycatcher charon: 01[NET] sending packet: from 
194.82.xxx.xxx[4500] to 149.254.xxx.xxx[37144] (76 bytes)
Apr 15 13:30:32 spycatcher charon: 12[NET] received packet: from 
149.254.xxx.xxx[37144] to 194.82.xxx.xxx[4500] (92 bytes)
Apr 15 13:30:32 spycatcher charon: 12[ENC] parsed TRANSACTION response 
761923766 [ HASH CPA(X_STATUS) ]
Apr 15 13:30:32 spycatcher charon: 12[IKE] destroying IKE_SA after failed XAuth 
authentication

And from /var/log/auth.log


After downgrading to 

strongswan 5.1.0-3~bpo70+1

xauth-pam authentication works again.

I'm using pam_winbind, but no changes have been made to pam_winbind and all 
tests with wbinfo report success.

After downgrading 

/var/log/syslog shows

Apr 15 15:34:07 spycatcher charon: 10[NET] received packet: from 
149.254.xxx.xxx[865] to 194.82.xxx.xxx[500] (476 bytes)
Apr 15 15:34:07 spycatcher charon: 10[ENC] parsed ID_PROT request 0 [ SA V V V 
V V V V V ]
Apr 15 15:34:07 spycatcher charon: 10[IKE] received NAT-T (RFC 3947) vendor ID
Apr 15 15:34:07 spycatcher charon: 10[IKE] received 
draft-ietf-ipsec-nat-t-ike-02 vendor ID
Apr 15 15:34:07 spycatcher charon: 10[IKE] received 
draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Apr 15 15:34:07 spycatcher charon: 10[IKE] received 
draft-ietf-ipsec-nat-t-ike-00 vendor ID
Apr 15 15:34:07 spycatcher charon: 10[IKE] received XAuth vendor ID
Apr 15 15:34:07 spycatcher charon: 10[IKE] received Cisco Unity vendor ID
Apr 15 15:34:07 spycatcher charon: 10[IKE] received FRAGMENTATION vendor ID
Apr 15 15:34:07 spycatcher charon: 10[IKE] received DPD vendor ID
Apr 15 15:34:07 spycatcher charon: 10[IKE] 149.254.xxx.xxx is initiating a Main 
Mode IKE_SA
Apr 15 15:34:07 spycatcher charon: 10[ENC] generating ID_PROT response 0 [ SA V 
V V ]
Apr 15 15:34:07 spycatcher charon: 10[NET] sending packet: from 
194.82.xxx.xxx[500] to 149.254.xxx.xxx[865] (136 bytes)
Apr 15 15:34:07 spycatcher charon: 11[NET] received packet: from 
149.254.xxx.xxx[865] to 194.82.xxx.xxx[500] (228 bytes)
Apr 15 15:34:07 spycatcher charon: 11[ENC] parsed ID_PROT request 0 [ KE No 
NAT-D NAT-D ]
Apr 15 15:34:07 spycatcher charon: 11[IKE] remote host is behind NAT
Apr 15 15:34:07 spycatcher charon: 11[IKE] sending cert request for "C=CH, 
O=Work, CN=Work strongSwan CA"
Apr 15 15:34:07 spycatcher charon: 11[ENC] generating ID_PROT response 0 [ KE 
No CERTREQ NAT-D NAT-D ]
Apr 15 15:34:07 spycatcher charon: 11[NET] sending packet: from 
194.82.xxx.xxx[500] to 149.254.xxx.xxx[865] (309 bytes)
Apr 15 15:34:08 spycatcher charon: 01[NET] received packet: from 
149.254.xxx.xxx[61698] to 194.82.xxx.xxx[4500] (1260 bytes)
Apr 15 15:34:08 spycatcher charon: 01[ENC] parsed ID_PROT request 0 [ ID CERT 
SIG CERTREQ ]
Apr 15 15:34:08 spycatcher charon: 01[IKE] ignoring certificate request without 
data
Apr 15 15:34:08 spycatcher charon: 01[IKE] received end entity cert "C=CH, 
O=Work, CN=aed-nexus4"
Apr 15 15:34:08 spycatcher charon: 01[CFG] looking for XAuthInitRSA peer 
configs matching 194.82.xxx.xxx...149.254.xxx.xxx[C=CH, O=Work, CN=aed-nexus4]
Apr 15 15:34:08 spycatcher charon: 01[CFG] selected peer config "ipad"
Apr 15 15:34:08 spycatcher charon: 01[CFG]   using certificate "C=CH, O=Work, 
CN=aed-nexus4"
Apr 15 15:34:08 spycatcher charon: 01[CFG]   using trusted ca certificate 
"C=CH, O=Work, CN=Work strongSwan CA"
Apr 15 15:34:08 spycatcher charon: 01[CFG] checking certificate status of 
"C=CH, O=Work, CN=aed-nexus4"
Apr 15 15:34:08 spycatcher charon: 01[CFG] certificate status is not available
Apr 15 15:34:08 spycatcher charon: 01[CFG]   reached self-signed root ca with a 
path length of 0
Apr 15 15:34:08 spycatcher charon: 01[IKE] authentication of 'C=CH, O=Work, 
CN=aed-nexus4' with RSA successful
Apr 15 15:34:08 spycatcher charon: 01[IKE] authentication of 'C=CH, O=Work, 
CN=vpn1.Work' (myself) successful
Apr 15 15:34:08 spycatcher charon: 01[IKE] sending end entity cert "C=CH, 
O=Work, CN=vpn1.Work"
Apr 15 15:34:08 spycatcher charon: 01[ENC] generating ID_PROT response 0 [ ID 
CERT SIG ]
Apr 15 15:34:08 spycatcher charon: 01[NET] sending packet: from 
194.82.xxx.xxx[4500] to 149.254.xxx.xxx[61698] (1244 bytes)
Apr 15 15:34:08 spycatcher charon: 01[ENC] generating TRANSACTION request 
858908818 [ HASH CP ]
Apr 15 15:34:08 spycatcher charon: 01[NET] sending packet: from 
194.82.xxx.xxx[4500] to 149.254.xxx.xxx[61698] (76 bytes)
Apr 15 15:34:08 spycatcher charon: 04[NET] received packet: from 
149.254.xxx.xxx[61698] to 194.82.xxx.xxx[4500] (108 bytes)
Apr 15 15:34:08 spycatcher charon: 04[ENC] parsed INFORMATIONAL_V1 request 
4246005032 [ HASH N(INITIAL_CONTACT) ]
Apr 15 15:34:08 spycatcher charon: 13[NET] received packet: from 
149.254.xxx.xxx[61698] to 194.82.xxx.xxx[4500] (108 bytes)
Apr 15 15:34:08 spycatcher charon: 13[ENC] parsed TRANSACTION response 
858908818 [ HASH CP ]
Apr 15 15:34:09 spycatcher charon: 13[IKE] PAM authentication of 'dawsona' 
successful
Apr 15 15:34:09 spycatcher charon: 13[IKE] XAuth authentication of 'dawsona' 
successful
Apr 15 15:34:09 spycatcher charon: 13[IKE] deleting duplicate IKE_SA for peer 
'dawsona' due to uniqueness policy
Apr 15 15:34:09 spycatcher charon: 13[IKE] deleting IKE_SA ipad[2] between 
194.82.xxx.xxx[C=CH, O=Work, CN=vpn1.Work]...149.254.xxx.xxx[C=CH, O=Work, 
CN=aed-nexus4]
Apr 15 15:34:09 spycatcher charon: 13[IKE] sending DELETE for IKE_SA ipad[2]
Apr 15 15:34:09 spycatcher charon: 13[ENC] generating INFORMATIONAL_V1 request 
3401085219 [ HASH D ]
Apr 15 15:34:09 spycatcher charon: 13[NET] sending packet: from 
194.82.xxx.xxx[4500] to 149.254.xxx.xxx[61698] (92 bytes)
Apr 15 15:34:09 spycatcher charon: 13[CFG] lease 10.128.13.1 by 'dawsona' went 
offline
Apr 15 15:34:09 spycatcher charon: 13[ENC] generating TRANSACTION request 
703485922 [ HASH CP ]
Apr 15 15:34:09 spycatcher charon: 13[NET] sending packet: from 
194.82.xxx.xxx[4500] to 149.254.xxx.xxx[61698] (76 bytes)
Apr 15 15:34:09 spycatcher charon: 15[NET] received packet: from 
149.254.xxx.xxx[61698] to 194.82.xxx.xxx[4500] (92 bytes)
Apr 15 15:34:09 spycatcher charon: 15[ENC] parsed TRANSACTION response 
703485922 [ HASH CP ]
Apr 15 15:34:09 spycatcher charon: 15[IKE] IKE_SA ipad[3] established between 
194.82.xxx.xxx[C=CH, O=Work, CN=vpn1.Work]...149.254.xxx.xxx[C=CH, O=Work, 
CN=aed-nexus4]
Apr 15 15:34:09 spycatcher charon: 12[NET] received packet: from 
149.254.xxx.xxx[61698] to 194.82.xxx.xxx[4500] (124 bytes)
Apr 15 15:34:09 spycatcher charon: 12[ENC] parsed TRANSACTION request 
3056136644 [ HASH CP ]
Apr 15 15:34:09 spycatcher charon: 12[IKE] peer requested virtual IP %any
Apr 15 15:34:09 spycatcher charon: 12[CFG] reassigning offline lease to 
'dawsona'
Apr 15 15:34:09 spycatcher charon: 12[IKE] assigning virtual IP 10.128.13.1 to 
peer 'dawsona'
Apr 15 15:34:09 spycatcher charon: 12[ENC] generating TRANSACTION response 
3056136644 [ HASH CP ]
Apr 15 15:34:09 spycatcher charon: 12[NET] sending packet: from 
194.82.xxx.xxx[4500] to 149.254.xxx.xxx[61698] (92 bytes)
Apr 15 15:34:10 spycatcher charon: 05[NET] received packet: from 
149.254.xxx.xxx[61698] to 194.82.xxx.xxx[4500] (364 bytes)
Apr 15 15:34:10 spycatcher charon: 05[ENC] parsed QUICK_MODE request 4260544190 
[ HASH SA No ID ID ]
Apr 15 15:34:10 spycatcher charon: 05[IKE] received 28800s lifetime, configured 
0s
Apr 15 15:34:10 spycatcher charon: 05[IKE] detected rekeying of CHILD_SA ipad{2}
Apr 15 15:34:10 spycatcher charon: 05[ENC] generating QUICK_MODE response 
4260544190 [ HASH SA No ID ID ]
Apr 15 15:34:10 spycatcher charon: 05[NET] sending packet: from 
194.82.xxx.xxx[4500] to 149.254.xxx.xxx[61698] (172 bytes)
Apr 15 15:34:10 spycatcher charon: 16[NET] received packet: from 
149.254.xxx.xxx[61698] to 194.82.xxx.xxx[4500] (76 bytes)
Apr 15 15:34:10 spycatcher charon: 16[ENC] parsed QUICK_MODE request 4260544190 
[ HASH ]
Apr 15 15:34:10 spycatcher charon: 16[IKE] CHILD_SA ipad{2} established with 
SPIs c06c1e4f_i 098919a1_o and TS 0.0.0.0/0 === 10.128.13.1/32

And 

/var/log/auth.log shows

Apr 15 15:33:41 spycatcher charon: 16[IKE] 149.254.xxx.xxx is initiating a Main 
Mode IKE_SA
Apr 15 15:33:42 spycatcher charon: pam_unix(login:auth): authentication 
failure; logname= uid=0 euid=0 tty= ruser= rhost=  user=dawsona
Apr 15 15:33:42 spycatcher charon: pam_winbind(login:auth): Verify user 
'dawsona'
Apr 15 15:33:42 spycatcher charon: pam_winbind(login:auth): PAM config: 
krb5_ccache_type 'FILE'
Apr 15 15:33:42 spycatcher charon: pam_winbind(login:auth): user 'dawsona' 
granted access
Apr 15 15:33:42 spycatcher charon: pam_winbind(login:auth): Returned user was 
'dawsona'
Apr 15 15:33:44 spycatcher charon: 01[IKE] IKE_SA ipad[2] established between 
194.82.xxx.xxx[C=CH, O=Work, CN=vpn1.Work]...149.254.xxx.xxx[C=CH, O=Work, 
CN=aed-nexus4]
Apr 15 15:33:46 spycatcher charon: 05[IKE] CHILD_SA ipad{2} established with 
SPIs cd46bc6c_i 080588bf_o and TS 0.0.0.0/0 === 10.128.13.1/32 
Apr 15 15:34:07 spycatcher charon: 10[IKE] 149.254.xxx.xxx is initiating a Main 
Mode IKE_SA
Apr 15 15:34:08 spycatcher charon: pam_unix(login:auth): authentication 
failure; logname= uid=0 euid=0 tty= ruser= rhost=  user=dawsona
Apr 15 15:34:08 spycatcher charon: pam_winbind(login:auth): Verify user 
'dawsona'
Apr 15 15:34:08 spycatcher charon: pam_winbind(login:auth): PAM config: 
krb5_ccache_type 'FILE'
Apr 15 15:34:09 spycatcher charon: pam_winbind(login:auth): user 'dawsona' 
granted access
Apr 15 15:34:09 spycatcher charon: pam_winbind(login:auth): Returned user was 
'dawsona'
Apr 15 15:34:09 spycatcher charon: 13[IKE] deleting IKE_SA ipad[2] between 
194.82.xxx.xxx[C=CH, O=Work, CN=vpn1.Work]...149.254.xxx.xxx[C=CH, O=Work, 
CN=aed-nexus4]
Apr 15 15:34:09 spycatcher charon: 15[IKE] IKE_SA ipad[3] established between 
194.82.xxx.xxx[C=CH, O=Work, CN=vpn1.Work]...149.254.xxx.xxx[C=CH, O=Work, 
CN=aed-nexus4]
Apr 15 15:34:10 spycatcher charon: 16[IKE] CHILD_SA ipad{2} established with 
SPIs c06c1e4f_i 098919a1_o and TS 0.0.0.0/0 === 10.128.13.1/32





-- System Information:
Debian Release: 7.4
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-4-686-pae (SMP w/1 CPU core)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to