@hege:
@eskild:
ipsec is unable to read the private key.
with ipsec listcerts you should see a line like
pubkey: RSA 4096 bits**, has private key**
If that's not the case, try the following commands
ipsec rereadall
ipsec restart (restart not reload!)
What's the output of ipsec listcerts ?
I had the same issue with pfSense 2.2 after creating a CA and a certificate (annoyingly, StrongSwan apparently does not and will not support wildcard certs). IPSec log when I connect:
charon: 05[IKE] no private key found for 'C=US, ST=Illinois, L=Naperville, O=ITS Inc, E=support@example.com, CN=router1.example.net'
ipsec listcerts output:
List of X.509 End Entity Certificates:
subject: "C=US, ST=Illinois, L=Naperville, O=ITS Inc, E=support@example.com, CN=router1.example.net"
issuer: "C=US, ST=Illinois, L=Naperville, O=ITS Inc, E=support@example.com, CN=router1-ca"
serial: 02
validity: not before Mar 17 23:10:33 2015, ok
not after Mar 14 23:10:33 2025, ok
pubkey: RSA 2048 bits
keyid: xxxx
subjkey: xxxx
xxxx
$ ipsec restart
Stopping strongSwan IPsec…
Starting strongSwan 5.2.1 IPsec [starter]…
no netkey IPsec stack detected
no KLIPS IPsec stack detected
no known IPsec stack detected, ignoring!
After those commands, I get "pubkey: RSA 2048 bits, has private key". Unfortunately despite that, I still get error 13801 from Windows when using the common name or IP address.