Hi Paul, this config is not supposed to send the cert DN as id correct?
conn me---you authby=rsasig ike=aes128-sha1-modp1536 phase2alg=aes128-sha1;modp1536 dpdaction=clear dpddelay=30 dpdtimeout=300 left=%defaultroute leftcert=me.pem right=X.X.X.X rightsubnet=Y.Y.Y.Y/24 rightid="C=AT, ST=Vienna, L=Vienna, O=Company, OU=IT, CN=you" auto=add ipsec auto --up me---you 104 "me---you" #3: STATE_MAIN_I1: initiate 003 "me---you" #3: received Vendor ID payload [RFC 3947] method set to=109 003 "me---you" #3: received Vendor ID payload [Dead Peer Detection] 106 "me---you" #3: STATE_MAIN_I2: sent MI2, expecting MR2 003 "me---you" #3: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): i am NATed 108 "me---you" #3: STATE_MAIN_I3: sent MI3, expecting MR3 004 "me---you" #3: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_128 prf=oakley_sha group=modp1536} 117 "me---you" #4: STATE_QUICK_I1: initiate 004 "me---you" #4: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x08bf5b3b <0x0616cd17 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=none DPD=enabled} But: Jun 28 19:42:06 me pluto[1573]: "me---you" #3: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): i am NATed Jun 28 19:42:06 me pluto[1573]: | ***emit ISAKMP Identification Payload (IPsec DOI): Jun 28 19:42:06 me pluto[1573]: | next payload type: ISAKMP_NEXT_CERT Jun 28 19:42:06 me pluto[1573]: | ID type: ID_DER_ASN1_DN Jun 28 19:42:06 me pluto[1573]: | Protocol ID: 0 Jun 28 19:42:06 me pluto[1573]: | port: 0 Jun 28 19:42:06 me pluto[1573]: | emitting 95 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) dpkg --list openswan Desired=Unknown/Install/Remove/Purge/Hold | Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend |/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad) ||/ Name Version Description +++-=====================================================-=====================================================-========================================================================================================================== ii openswan 1:2.6.27+dfsg-1 Internet Key Exchange daemon At least according to the manpage we should send the IP as identification... Harald On Mon, Jun 28, 2010 at 01:05:56PM -0400, Paul Wouters wrote: > On Mon, 28 Jun 2010, Rene Mayrhofer wrote: > > >On Monday 28 June 2010 07:51:07 Harald Jenny wrote: > >>Sorry Paul but I don't think the currect behaviour is correct - there is no > >>indication for the user why *id is ignored and this is not good :-(. > >I would tend to agree with that... > > On 2.6, it should have a leftid=%fromcert > > This change was made because in 2.4 it ALWAYS took the id from cert, and you > could > not override it. Now it takes the id from leftid= but you have to tell it to > pick > it up from the cert. > > But imho, this has nothing to do with this "bug". If you have a conn with a > broken > leftcert= pointing to a non-existing file, it can't work. It cannot grab the > id from > the cert since the cert is not there. I still dont understand how that could > ever "work" > on 2.4. > > I am getting increasingly frustrated with this. It needs a much better > explanation of > how it can "work". And "work" should be more then "loads the conn that has no > chance of > ever working" > > Paul -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org