I try to establish a VPN with isakmpd (OpenBSD 3.6) using certificates issued
from a SubCA. When I use certificates which were issued directly from the
RootCA the tunnel works correctly! Changing the certificates in
/etc/isakmpd/certs and /etc/isakmpd/ca (with adjusted policy-file) make
problems in the ike_phase_1 resp. with the received id information. I get
these messages:

145552.710039 Exch 90 exchange_validate: checking for required AUTH
145552.710054 Misc 30 ipsec_responder: phase 1 exchange 2 step 4
145552.710090 Negt 40 ike_phase_1_recv_ID: DER_ASN1_DN:
145552.710119 Negt 40 3081a631 0b300906 03550406 13024445 310f300d 06035504
08130642 61796572
145552.710214 Negt 40 6e742d43 65727431 20301e06 092a8648 86f70d01 09011611
68616e73 2e6d6569
145552.710228 Negt 40 65724077 65622e64 65
145552.710241 Default rsa_sig_decode_hash: cert_get (1) failed
145552.710265 Default dropped message from 192.168.42.241 port 500 due to
notification type INVALID_ID_INFORMATION
145552.710305 Timr 10 timer_add_event: event exchange_free_aux(0x3c130c00)
added last, expiration in 120s
145552.710326 Cryp 60 hash_get: requested algorithm 1

It seems (for me) that the isakmpd don't know the right certification path. I
also tried to add the certificate from the SubCa in the (Root)Ca certificate
(in /etc/isakmpd/ca) etc. but without any success. Thanx for any information
regarding that problem

Reply via email to