Hi Paul,

this config is not supposed to send the cert DN as id correct?

conn me---you
        authby=rsasig
        ike=aes128-sha1-modp1536
        phase2alg=aes128-sha1;modp1536
        dpdaction=clear
        dpddelay=30
        dpdtimeout=300
        left=%defaultroute
        leftcert=me.pem
        right=X.X.X.X
        rightsubnet=Y.Y.Y.Y/24
        rightid="C=AT, ST=Vienna, L=Vienna, O=Company, OU=IT, CN=you"
        auto=add

ipsec auto --up me---you
104 "me---you" #3: STATE_MAIN_I1: initiate
003 "me---you" #3: received Vendor ID payload [RFC 3947] method set to=109
003 "me---you" #3: received Vendor ID payload [Dead Peer Detection]
106 "me---you" #3: STATE_MAIN_I2: sent MI2, expecting MR2
003 "me---you" #3: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): i am 
NATed
108 "me---you" #3: STATE_MAIN_I3: sent MI3, expecting MR3
004 "me---you" #3: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_RSA_SIG 
cipher=aes_128 prf=oakley_sha group=modp1536}
117 "me---you" #4: STATE_QUICK_I1: initiate
004 "me---you" #4: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode 
{ESP=>0x08bf5b3b <0x0616cd17 xfrm=AES_128-HMAC_SHA1 NATOA=none NATD=none 
DPD=enabled}

But:

Jun 28 19:42:06 me pluto[1573]: "me---you" #3: NAT-Traversal: Result using RFC 
3947 (NAT-Traversal): i am NATed
Jun 28 19:42:06 me pluto[1573]: | ***emit ISAKMP Identification Payload (IPsec 
DOI):
Jun 28 19:42:06 me pluto[1573]: |    next payload type: ISAKMP_NEXT_CERT
Jun 28 19:42:06 me pluto[1573]: |    ID type: ID_DER_ASN1_DN
Jun 28 19:42:06 me pluto[1573]: |    Protocol ID: 0
Jun 28 19:42:06 me pluto[1573]: |    port: 0
Jun 28 19:42:06 me pluto[1573]: | emitting 95 raw bytes of my identity into 
ISAKMP Identification Payload (IPsec DOI)

dpkg --list openswan
Desired=Unknown/Install/Remove/Purge/Hold
| Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend
|/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad)
||/ Name                                                  Version               
                                Description
+++-=====================================================-=====================================================-==========================================================================================================================
ii  openswan                                              1:2.6.27+dfsg-1       
                                Internet Key Exchange daemon

At least according to the manpage we should send the IP as identification...

Harald


On Mon, Jun 28, 2010 at 01:05:56PM -0400, Paul Wouters wrote:
> On Mon, 28 Jun 2010, Rene Mayrhofer wrote:
> 
> >On Monday 28 June 2010 07:51:07 Harald Jenny wrote:
> >>Sorry Paul but I don't think the currect behaviour is correct - there is no
> >>indication for the user why *id is ignored and this is not good :-(.
> >I would tend to agree with that...
> 
> On 2.6, it should have a leftid=%fromcert
> 
> This change was made because in 2.4 it ALWAYS took the id from cert, and you 
> could
> not override it. Now it takes the id from leftid= but you have to tell it to 
> pick
> it up from the cert.
> 
> But imho, this has nothing to do with this "bug". If you have a conn with a 
> broken
> leftcert= pointing to a non-existing file, it can't work. It cannot grab the 
> id from
> the cert since the cert is not there. I still dont understand how that could 
> ever "work"
> on 2.4.
> 
> I am getting increasingly frustrated with this. It needs a much better 
> explanation of
> how it can "work". And "work" should be more then "loads the conn that has no 
> chance of
> ever working"
> 
> Paul



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to