• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

StrongSwan user authentication failed on Android

IPsec
4
24
4.0k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A
    Alanesi
    last edited by Aug 5, 2020, 11:10 AM

    Hello Everyone,

    I have a working VPN using IPSec.
    I'm using this method >> https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/configuring-an-ipsec-remote-access-mobile-vpn-using-ikev2-with-eap-mschapv2.html#set-up-mobile-ipsec-for-ikev2-eap-mschapv2

    Its working fine with Windows but its showing authentication failed error on Andriod.

    Kindly I need your help with this.

    Here is the error log from StrongSwan:

    Aug 5 13:52:43 00[DMN] +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    Aug 5 13:52:43 00[DMN] Starting IKE service (strongSwan 5.8.4, Android 9 - PPR1.180610.011.N950FXXSCDTF1/2020-07-01, SM-N950F - samsung/greatltexx/samsung, Linux 4.4.111-16983991, aarch64)
    Aug 5 13:52:43 00[LIB] loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls x509
    Aug 5 13:52:43 00[JOB] spawning 16 worker threads
    Aug 5 13:52:43 05[IKE] initiating IKE_SA android[34] to x.x.x.x
    Aug 5 13:52:43 05[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
    Aug 5 13:52:43 05[NET] sending packet: from 192.168.1.4[54531] to x.x.x.x[500] (716 bytes)
    Aug 5 13:52:43 06[NET] received packet: from x.x.x.x[500] to 192.168.1.4[54531] (305 bytes)
    Aug 5 13:52:43 06[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
    Aug 5 13:52:43 06[CFG] selected proposal: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
    Aug 5 13:52:43 06[IKE] local host is behind NAT, sending keep alives
    Aug 5 13:52:43 06[IKE] received cert request for "CN=internal-ca, C=SA, L=Riyadh, O=International"
    Aug 5 13:52:43 06[IKE] sending cert request for "CN=internal-ca, C=SA, L=Riyadh, O=International"
    Aug 5 13:52:43 06[IKE] establishing CHILD_SA android{34}
    Aug 5 13:52:43 06[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
    Aug 5 13:52:43 06[NET] sending packet: from 192.168.1.4[52935] to x.x.x.x[4500] (480 bytes)
    Aug 5 13:52:43 09[NET] received packet: from x.x.x.x[4500] to 192.168.1.4[52935] (80 bytes)
    Aug 5 13:52:43 09[ENC] parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
    Aug 5 13:52:43 09[IKE] received AUTHENTICATION_FAILED notify error

    1 Reply Last reply Reply Quote 0
    • J
      jimp Rebel Alliance Developer Netgate
      last edited by Aug 7, 2020, 1:04 PM

      That doesn't look like it is getting to the user authentication step. There is some other mismatch in your IKE/P1 settings.

      Is that log from strongSwan on pfSense, or from the android client?

      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      A 1 Reply Last reply Aug 7, 2020, 3:40 PM Reply Quote 0
      • A
        Alanesi
        last edited by Aug 7, 2020, 3:33 PM

        This post is deleted!
        1 Reply Last reply Reply Quote 0
        • A
          Alanesi @jimp
          last edited by Aug 7, 2020, 3:40 PM

          @jimp

          Hi jimp,

          Thank you very much for your reply.

          The log is from strongSwan on the android client. I don't have strongSwan on pfSense

          1 Reply Last reply Reply Quote 0
          • J
            jimp Rebel Alliance Developer Netgate
            last edited by Aug 7, 2020, 3:45 PM

            pfSense uses strongSwan for IPsec. If you are connecting Android strongSwan to pfSense, check the logs on pfSense.

            If you are not using pfSense at all, then you should post on a forum specific to your device, or to strongSwan, since this is a forum for pfSense issues.

            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            A 1 Reply Last reply Aug 8, 2020, 11:51 AM Reply Quote 0
            • A
              Alanesi @jimp
              last edited by Alanesi Aug 8, 2020, 11:57 AM Aug 8, 2020, 11:51 AM

              @jimp I am using pfSense. The VPN is already running between two sites and its also running on remote Windows PC's using the same CA. but its not working on Android.
              Here is the log from pfSense:

              Aug 8 14:48:17 charon 07[CFG] vici client 530980 disconnected
              Aug 8 14:48:22 charon 09[CFG] vici client 530981 connected
              Aug 8 14:48:22 charon 10[CFG] vici client 530981 registered for: list-sa
              Aug 8 14:48:22 charon 10[CFG] vici client 530981 requests: list-sas
              Aug 8 14:48:22 charon 09[CFG] vici client 530981 disconnected
              Aug 8 14:48:28 charon 06[CFG] vici client 530982 connected
              Aug 8 14:48:28 charon 16[CFG] vici client 530982 registered for: list-sa
              Aug 8 14:48:28 charon 16[CFG] vici client 530982 requests: list-sas
              Aug 8 14:48:28 charon 16[CFG] vici client 530982 disconnected
              Aug 8 14:48:33 charon 14[CFG] vici client 530983 connected
              Aug 8 14:48:33 charon 11[CFG] vici client 530983 registered for: list-sa
              Aug 8 14:48:33 charon 08[CFG] vici client 530983 requests: list-sas
              Aug 8 14:48:33 charon 11[CFG] vici client 530983 disconnected
              Aug 8 14:48:38 charon 06[CFG] vici client 530984 connected
              Aug 8 14:48:38 charon 12[CFG] vici client 530984 registered for: list-sa
              Aug 8 14:48:38 charon 12[CFG] vici client 530984 requests: list-sas
              Aug 8 14:48:38 charon 16[CFG] vici client 530984 disconnected
              Aug 8 14:48:40 charon 15[CFG] vici client 530985 connected
              Aug 8 14:48:40 charon 14[CFG] vici client 530985 registered for: list-sa
              Aug 8 14:48:40 charon 14[CFG] vici client 530985 requests: list-sas
              Aug 8 14:48:40 charon 11[CFG] vici client 530985 disconnected
              Aug 8 14:48:44 charon 08[CFG] vici client 530986 connected
              Aug 8 14:48:44 charon 15[CFG] vici client 530986 registered for: list-sa
              Aug 8 14:48:44 charon 15[CFG] vici client 530986 requests: list-sas
              Aug 8 14:48:44 charon 09[CFG] vici client 530986 disconnected
              Aug 8 14:48:45 charon 12[NET] <con1000|2427> received packet: from y.y.y.y[500] to x.x.x.x[500] (140 bytes)
              Aug 8 14:48:45 charon 12[ENC] <con1000|2427> parsed INFORMATIONAL_V1 request 741761387 [ HASH N(DPD) ]
              Aug 8 14:48:45 charon 12[IKE] <con1000|2427> queueing ISAKMP_DPD task
              Aug 8 14:48:45 charon 12[IKE] <con1000|2427> activating new tasks
              Aug 8 14:48:45 charon 12[IKE] <con1000|2427> activating ISAKMP_DPD task
              Aug 8 14:48:45 charon 12[ENC] <con1000|2427> generating INFORMATIONAL_V1 request 388047210 [ HASH N(DPD_ACK) ]
              Aug 8 14:48:45 charon 12[NET] <con1000|2427> sending packet: from x.x.x.x[500] to y.y.y.y[500] (140 bytes)
              Aug 8 14:48:45 charon 12[IKE] <con1000|2427> activating new tasks
              Aug 8 14:48:45 charon 12[IKE] <con1000|2427> nothing to initiate
              Aug 8 14:48:46 charon 12[CFG] vici client 530987 connected
              Aug 8 14:48:46 charon 16[CFG] vici client 530987 registered for: list-sa
              Aug 8 14:48:46 charon 06[CFG] vici client 530987 requests: list-sas
              Aug 8 14:48:46 charon 16[CFG] vici client 530987 disconnected
              Aug 8 14:48:48 charon 13[CFG] vici client 530988 connected
              Aug 8 14:48:48 charon 07[CFG] vici client 530988 registered for: list-sa
              Aug 8 14:48:48 charon 07[CFG] vici client 530988 requests: list-sas
              Aug 8 14:48:48 charon 14[CFG] vici client 530988 disconnected
              Aug 8 14:48:50 charon 11[CFG] vici client 530989 connected
              Aug 8 14:48:50 charon 07[CFG] vici client 530989 registered for: list-sa
              Aug 8 14:48:50 charon 07[CFG] vici client 530989 requests: list-sas
              Aug 8 14:48:50 charon 07[CFG] vici client 530989 disconnected
              Aug 8 14:48:56 charon 10[CFG] vici client 530990 connected
              Aug 8 14:48:56 charon 05[CFG] vici client 530990 registered for: list-sa
              Aug 8 14:48:56 charon 15[CFG] vici client 530990 requests: list-sas
              Aug 8 14:48:56 charon 15[CFG] vici client 530990 disconnected

              K 1 Reply Last reply Aug 8, 2020, 12:00 PM Reply Quote 0
              • K
                Konstanti @Alanesi
                last edited by Aug 8, 2020, 12:00 PM

                @Alanesi

                Hi
                This log shows that there is an exchange of DPD packets between two hosts, and that you visited the page
                /status/ipsec .

                there is no more information here

                A 1 Reply Last reply Aug 8, 2020, 12:04 PM Reply Quote 0
                • A
                  Alanesi @Konstanti
                  last edited by Aug 8, 2020, 12:04 PM

                  Thanks @Konstanti
                  I got this after I refreched the page

                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 6e:11:58:71:ad:6d:27:6f:f9🆎93:30:c2:47:dd:f7:40:4e:e4:7f
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid d3:94:8a:4c:62:13:2a:19:2e:cc:af:72:8a:7d:36:d7:9a:1c:dc:67
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid c8:95:13:68:01:97:28:0a:2c:55:c3:fc:d3:90:f5:3a:05:3b:c9:fb
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for "CN=internal-ca, C=SA, L=Riyadh, O=International"
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid bd:ff:8d:1d:59:4d:83:2b:a7:da:e3:87:6e:63:68:1c:13🇩🇪a6:c0
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 14:8d:b3:54:ed:9b:2f:13:08:7c:c3:8b:4b:c1:5b:96:8a:c5:53:78
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid ee:e5:9f:1e:2a:a5:44:c3:cb:25:43:a6:9a:5b:d4:6a:25:bc:bb:8e
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid c4:52:72:20:a9:58:c0:6e:9d:4b:f2:0b:21:12:3c:eb:3a:0b:6b:6f
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid f8:f6:fa:6b:26:1b:cc:64:62:12:46:30:d1:c5:99:15:cd:01:1f:cb
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 95:a3:72:ff:cd:41:d7:e9:fd:dd:3f:39:ac:27:0b:24:78:1e:d6:54
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 3e:b7:48:eb:57:13:1d:b9:02:47:3d:5c:8d:b4:38:1e:1b:69:f0:ef
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid a8:e3:02:96:70:a6:8b:57:eb:ec:ef:cc:29:4e:91:74:9a:d4:92:38
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 62:af:b7:5c:2a:a7:0d:ad:0d:3d:8d:cf:fb:10:9e:65:c6:16:c3:0b
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid c2:4e:45:22:d1:c3:2f:86:80:f7:4d:38:48:4b:74:e5:71💿17:cf
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 22:60:a7:83:31:ee:a4:c8:11:65:c3:b9:da:51:85:74:42:39:06:c5
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid c4:9c:12:7e:4b:e9:e5:5e:f4:64:77:26:2c:b6:d9:c9:34:2b:7c:38
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid a7:e9:c8:0c:8c:4b:56:d6:37:fa:9e:0d:6c:69:58:1d:32:4e:91:c0
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid dd:00:92:e0:16:8e:ba:57:c2:67:d6:7d:0a:0a:4e:57:b6:cb:c6:c8
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 3d:9f:4e:e4:17:1d:e9:cc:8c:cb:6b:ee:84:03:c2💿d7:bc:0b:9f
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 27:04:fa:e0:a6:32:eb:18:4b:51:e4:c6:39:e1:35:10:6b:b5:ff:61
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 3a:28:44:64:9f:20:e8:b1:05:bf:e9:d7:f5:66:33:61:51:ae:eb:51
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 9c:a9:8d:00:af:74:0d:dd:81:80:d2:13:45:a5:8b:8f:2e:94:38:d6
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid ab:30:d3:af:4b:d8:f1:6b:58:69:ee:45:69:29:da:84:b8:73:94:88
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid e0:8c:9b:db:25:49:b3:f1:7c:86:d6:b2:42:87:0b:d0:6b:a0:d9:e4
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid c4:30:28:c5:d3:e3:08:0c:10:44:8b:2c:77:ba:24:53:97:60:bb:f9
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 69:c4:27:db:59:69:68:18:47:e2:52:17:0a:e0:e5:7f:ab:9d:ef:0f
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 28:a4:ba:ee:61:3e:0a:b8:15:83:95:65:4e:4f:cc:13:c1:70:e3:e3
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid fd:da:14:c4:9f:30:de:21:bd:1e:42:39:fc🆎63:23:49:e0:f1:84
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid b3:86:36:7d:bc:e5:f8:4e:e2:8c:15:37:81:b2:1d:f5:3d:2c:15:cd
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 7b:6d:b8:b0:b5:e5:85:0d:10:61:51:f0:3d:b0:f4:ff:40:8d:9e:a4
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 80:fc:a2:0c:56:d9:5b:d9:71:c1:35:ed:24:60:13:6f:78:46:a9:2a
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 4f:9c:7d:21:79:9c:ad:0e:d8:b9:0c:57:9f:1a:02:99:e7:90:f3:87
                  Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 8d:f0:0a:ad:7c:3f:4c:f3:42:75:e2:ec:19:bd:f3:28:e2:24:69:22
                  Aug 8 14:59:23 charon 16[IKE] <2431> received 136 cert requests for an unknown ca
                  Aug 8 14:59:23 charon 16[CFG] <2431> looking for peer configs matching x.x.x.x[%any]...y.y.y.y[user@domain.com]
                  Aug 8 14:59:23 charon 16[CFG] <2431> candidate "bypasslan", match: 1/1/24 (me/other/ike)
                  Aug 8 14:59:23 charon 16[CFG] <2431> candidate "con-mobile", match: 1/1/1052 (me/other/ike)
                  Aug 8 14:59:23 charon 16[CFG] <2431> ignore candidate 'con-mobile' without matching IKE proposal
                  Aug 8 14:59:23 charon 16[CFG] <bypasslan|2431> selected peer config 'bypasslan'
                  Aug 8 14:59:23 charon 16[IKE] <bypasslan|2431> peer requested EAP, config unacceptable
                  Aug 8 14:59:23 charon 16[CFG] <bypasslan|2431> no alternative config found
                  Aug 8 14:59:23 charon 16[IKE] <bypasslan|2431> processing INTERNAL_IP4_ADDRESS attribute
                  Aug 8 14:59:23 charon 16[IKE] <bypasslan|2431> processing INTERNAL_IP6_ADDRESS attribute
                  Aug 8 14:59:23 charon 16[IKE] <bypasslan|2431> processing INTERNAL_IP4_DNS attribute
                  Aug 8 14:59:23 charon 16[IKE] <bypasslan|2431> processing INTERNAL_IP6_DNS attribute
                  Aug 8 14:59:23 charon 16[IKE] <bypasslan|2431> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
                  Aug 8 14:59:23 charon 16[IKE] <bypasslan|2431> peer supports MOBIKE
                  Aug 8 14:59:23 charon 16[ENC] <bypasslan|2431> generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
                  Aug 8 14:59:23 charon 16[NET] <bypasslan|2431> sending packet: from x.x.x.x[4500] to y.y.y.y[40450] (80 bytes)
                  Aug 8 14:59:23 charon 16[IKE] <bypasslan|2431> IKE_SA bypasslan[2431] state change: CONNECTING => DESTROYING

                  K 1 Reply Last reply Aug 8, 2020, 12:12 PM Reply Quote 0
                  • K
                    Konstanti @Alanesi
                    last edited by Konstanti Aug 8, 2020, 12:16 PM Aug 8, 2020, 12:12 PM

                    @Alanesi said in StrongSwan user authentication failed on Android:

                    ignore candidate 'con-mobile' without matching IKE proposal

                    Check the phase-1 settings on both sides of the tunnel . If the Windows client is working perfectly , it is possible that an error occurred in the Android client settings.

                    P.S. I would recommend selecting the CA certificate manually in the client settings

                    A 1 Reply Last reply Aug 8, 2020, 12:19 PM Reply Quote 0
                    • A
                      Alanesi @Konstanti
                      last edited by Aug 8, 2020, 12:19 PM

                      @Konstanti

                      I did the manual selection for the CA. I'll see what else I can change.

                      K 1 Reply Last reply Aug 8, 2020, 12:26 PM Reply Quote 0
                      • K
                        Konstanti @Alanesi
                        last edited by Konstanti Aug 8, 2020, 12:28 PM Aug 8, 2020, 12:26 PM

                        @Alanesi

                        The user [user@domain.com] created ?

                        🔒 Log in to view

                        Aug 8 14:59:23 charon 16[CFG] <2431> looking for peer configs matching x.x.x.x[%any]...y.y.y.y[user@domain.com]
                        Aug 8 14:59:23 charon 16[CFG] <2431> ignore candidate 'con-mobile' without matching IKE proposal

                        A 1 Reply Last reply Aug 8, 2020, 12:29 PM Reply Quote 0
                        • A
                          Alanesi @Konstanti
                          last edited by Aug 8, 2020, 12:29 PM

                          @Konstanti

                          Yes, and its working on windows

                          K 1 Reply Last reply Aug 8, 2020, 12:30 PM Reply Quote 0
                          • K
                            Konstanti @Alanesi
                            last edited by Konstanti Aug 8, 2020, 12:31 PM Aug 8, 2020, 12:30 PM

                            @Alanesi
                            Then you need to check the settings of the Android client
                            There may be an error in the username/password field

                            A 1 Reply Last reply Aug 8, 2020, 2:07 PM Reply Quote 0
                            • A
                              Alanesi @Konstanti
                              last edited by Aug 8, 2020, 2:07 PM

                              @Konstanti
                              Unfortunately still the same issue but with different log
                              This is from pfSense:

                              Aug 8 17:01:25 charon 16[CFG] <2464> looking for IKEv2 configs for x.x.x.x...y.y.y.y
                              Aug 8 17:01:25 charon 16[CFG] <2464> candidate: %any...%any, prio 24
                              Aug 8 17:01:25 charon 16[CFG] <2464> candidate: x.x.x.x...%any, prio 1052
                              Aug 8 17:01:25 charon 16[IKE] <2464> no matching proposal found, trying alternative config
                              Aug 8 17:01:25 charon 16[CFG] <2464> selecting proposal:
                              Aug 8 17:01:25 charon 16[CFG] <2464> proposal matches
                              Aug 8 17:01:25 charon 16[CFG] <2464> received proposals: IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_SHA1_96/AES_XCBC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_6144/MODP_8192/MODP_2048, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/CHACHA20_POLY1305/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_6144/MODP_8192/MODP_2048
                              Aug 8 17:01:25 charon 16[CFG] <2464> configured proposals: IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_6144/MODP_8192/MODP_2048, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_6144/MODP_8192/MODP_2048
                              Aug 8 17:01:25 charon 16[CFG] <2464> selected proposal: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
                              Aug 8 17:01:25 charon 16[CFG] <2464> received supported signature hash algorithms: sha256 sha384 sha512 identity
                              Aug 8 17:01:25 charon 16[IKE] <2464> remote host is behind NAT
                              Aug 8 17:01:25 charon 16[CFG] <2464> sending supported signature hash algorithms: sha256 sha384 sha512 identity
                              Aug 8 17:01:25 charon 16[IKE] <2464> sending cert request for "CN=internal-ca, C=SA, L=Riyadh, O=International"
                              Aug 8 17:01:25 charon 16[ENC] <2464> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
                              Aug 8 17:01:25 charon 16[NET] <2464> sending packet: from x.x.x.x[500] to y.y.y.y[40538] (305 bytes)
                              Aug 8 17:01:25 charon 16[NET] <2464> received packet: from y.y.y.y[51903] to x.x.x.x[4500] (448 bytes)
                              Aug 8 17:01:25 charon 16[ENC] <2464> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
                              Aug 8 17:01:25 charon 16[CFG] <2464> looking for peer configs matching x.x.x.x[%any]...y.y.y.y[user@domain.com]
                              Aug 8 17:01:25 charon 16[CFG] <2464> candidate "bypasslan", match: 1/1/24 (me/other/ike)
                              Aug 8 17:01:25 charon 16[CFG] <2464> candidate "con-mobile", match: 1/1/1052 (me/other/ike)
                              Aug 8 17:01:25 charon 16[CFG] <2464> ignore candidate 'con-mobile' without matching IKE proposal
                              Aug 8 17:01:25 charon 16[CFG] <bypasslan|2464> selected peer config 'bypasslan'
                              Aug 8 17:01:25 charon 16[IKE] <bypasslan|2464> peer requested EAP, config unacceptable
                              Aug 8 17:01:25 charon 16[CFG] <bypasslan|2464> no alternative config found
                              Aug 8 17:01:25 charon 16[IKE] <bypasslan|2464> processing INTERNAL_IP4_ADDRESS attribute
                              Aug 8 17:01:25 charon 16[IKE] <bypasslan|2464> processing INTERNAL_IP6_ADDRESS attribute
                              Aug 8 17:01:25 charon 16[IKE] <bypasslan|2464> processing INTERNAL_IP4_DNS attribute
                              Aug 8 17:01:25 charon 16[IKE] <bypasslan|2464> processing INTERNAL_IP6_DNS attribute
                              Aug 8 17:01:25 charon 16[IKE] <bypasslan|2464> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
                              Aug 8 17:01:25 charon 16[IKE] <bypasslan|2464> peer supports MOBIKE
                              Aug 8 17:01:25 charon 16[ENC] <bypasslan|2464> generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
                              Aug 8 17:01:25 charon 16[NET] <bypasslan|2464> sending packet: from x.x.x.x[4500] to y.y.y.y[51903] (80 bytes)
                              Aug 8 17:01:25 charon 16[IKE] <bypasslan|2464> IKE_SA bypasslan[2464] state change: CONNECTING => DESTROYING

                              1 Reply Last reply Reply Quote 0
                              • A
                                Alitai
                                last edited by Aug 8, 2020, 11:50 PM

                                do you have set dns sec on your android?

                                A 1 Reply Last reply Aug 9, 2020, 9:09 AM Reply Quote 0
                                • A
                                  Alanesi @Alitai
                                  last edited by Aug 9, 2020, 9:09 AM

                                  @Alitai

                                  No, but to wich server?

                                  1 Reply Last reply Reply Quote 0
                                  • A
                                    Alitai
                                    last edited by Aug 9, 2020, 12:04 PM

                                    okay, did you set the user identity under advance settings on the strongswan app?

                                    A 1 Reply Last reply Aug 9, 2020, 1:46 PM Reply Quote 0
                                    • A
                                      Alanesi @Alitai
                                      last edited by Aug 9, 2020, 1:46 PM

                                      @Alitai
                                      Yes its the same username.

                                      1 Reply Last reply Reply Quote 0
                                      • A
                                        Alitai
                                        last edited by Aug 9, 2020, 2:35 PM

                                        okay, on the android part there is not much more to todo.
                                        Normally this is the easy part.

                                        Now, I think it's time for pictures from your pfsense and android. but don't forget to deleted the sensitive Infos.

                                        A 1 Reply Last reply Aug 12, 2020, 7:06 AM Reply Quote 0
                                        • A
                                          Alanesi @Alitai
                                          last edited by Alanesi Aug 12, 2020, 7:25 AM Aug 12, 2020, 7:06 AM

                                          @Alitai
                                          This the P1 on pfSense.

                                          🔒 Log in to view
                                          🔒 Log in to view

                                          This Mobile Client
                                          🔒 Log in to view

                                          For the Pre-Shared Keys the secret type is EAP.

                                          This P2

                                          🔒 Log in to view

                                          This on the Andriod

                                          🔒 Log in to view

                                          K 1 Reply Last reply Aug 12, 2020, 8:47 AM Reply Quote 0
                                          1 out of 24
                                          • First post
                                            1/24
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.