Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    StrongSwan user authentication failed on Android

    Scheduled Pinned Locked Moved IPsec
    24 Posts 4 Posters 4.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • AlanesiA
      Alanesi
      last edited by

      Hello Everyone,

      I have a working VPN using IPSec.
      I'm using this method >> https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/configuring-an-ipsec-remote-access-mobile-vpn-using-ikev2-with-eap-mschapv2.html#set-up-mobile-ipsec-for-ikev2-eap-mschapv2

      Its working fine with Windows but its showing authentication failed error on Andriod.

      Kindly I need your help with this.

      Here is the error log from StrongSwan:

      Aug 5 13:52:43 00[DMN] +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      Aug 5 13:52:43 00[DMN] Starting IKE service (strongSwan 5.8.4, Android 9 - PPR1.180610.011.N950FXXSCDTF1/2020-07-01, SM-N950F - samsung/greatltexx/samsung, Linux 4.4.111-16983991, aarch64)
      Aug 5 13:52:43 00[LIB] loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls x509
      Aug 5 13:52:43 00[JOB] spawning 16 worker threads
      Aug 5 13:52:43 05[IKE] initiating IKE_SA android[34] to x.x.x.x
      Aug 5 13:52:43 05[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
      Aug 5 13:52:43 05[NET] sending packet: from 192.168.1.4[54531] to x.x.x.x[500] (716 bytes)
      Aug 5 13:52:43 06[NET] received packet: from x.x.x.x[500] to 192.168.1.4[54531] (305 bytes)
      Aug 5 13:52:43 06[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
      Aug 5 13:52:43 06[CFG] selected proposal: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
      Aug 5 13:52:43 06[IKE] local host is behind NAT, sending keep alives
      Aug 5 13:52:43 06[IKE] received cert request for "CN=internal-ca, C=SA, L=Riyadh, O=International"
      Aug 5 13:52:43 06[IKE] sending cert request for "CN=internal-ca, C=SA, L=Riyadh, O=International"
      Aug 5 13:52:43 06[IKE] establishing CHILD_SA android{34}
      Aug 5 13:52:43 06[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
      Aug 5 13:52:43 06[NET] sending packet: from 192.168.1.4[52935] to x.x.x.x[4500] (480 bytes)
      Aug 5 13:52:43 09[NET] received packet: from x.x.x.x[4500] to 192.168.1.4[52935] (80 bytes)
      Aug 5 13:52:43 09[ENC] parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
      Aug 5 13:52:43 09[IKE] received AUTHENTICATION_FAILED notify error

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        That doesn't look like it is getting to the user authentication step. There is some other mismatch in your IKE/P1 settings.

        Is that log from strongSwan on pfSense, or from the android client?

        Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        AlanesiA 1 Reply Last reply Reply Quote 0
        • AlanesiA
          Alanesi
          last edited by

          This post is deleted!
          1 Reply Last reply Reply Quote 0
          • AlanesiA
            Alanesi @jimp
            last edited by

            @jimp

            Hi jimp,

            Thank you very much for your reply.

            The log is from strongSwan on the android client. I don't have strongSwan on pfSense

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate
              last edited by

              pfSense uses strongSwan for IPsec. If you are connecting Android strongSwan to pfSense, check the logs on pfSense.

              If you are not using pfSense at all, then you should post on a forum specific to your device, or to strongSwan, since this is a forum for pfSense issues.

              Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              AlanesiA 1 Reply Last reply Reply Quote 0
              • AlanesiA
                Alanesi @jimp
                last edited by Alanesi

                @jimp I am using pfSense. The VPN is already running between two sites and its also running on remote Windows PC's using the same CA. but its not working on Android.
                Here is the log from pfSense:

                Aug 8 14:48:17 charon 07[CFG] vici client 530980 disconnected
                Aug 8 14:48:22 charon 09[CFG] vici client 530981 connected
                Aug 8 14:48:22 charon 10[CFG] vici client 530981 registered for: list-sa
                Aug 8 14:48:22 charon 10[CFG] vici client 530981 requests: list-sas
                Aug 8 14:48:22 charon 09[CFG] vici client 530981 disconnected
                Aug 8 14:48:28 charon 06[CFG] vici client 530982 connected
                Aug 8 14:48:28 charon 16[CFG] vici client 530982 registered for: list-sa
                Aug 8 14:48:28 charon 16[CFG] vici client 530982 requests: list-sas
                Aug 8 14:48:28 charon 16[CFG] vici client 530982 disconnected
                Aug 8 14:48:33 charon 14[CFG] vici client 530983 connected
                Aug 8 14:48:33 charon 11[CFG] vici client 530983 registered for: list-sa
                Aug 8 14:48:33 charon 08[CFG] vici client 530983 requests: list-sas
                Aug 8 14:48:33 charon 11[CFG] vici client 530983 disconnected
                Aug 8 14:48:38 charon 06[CFG] vici client 530984 connected
                Aug 8 14:48:38 charon 12[CFG] vici client 530984 registered for: list-sa
                Aug 8 14:48:38 charon 12[CFG] vici client 530984 requests: list-sas
                Aug 8 14:48:38 charon 16[CFG] vici client 530984 disconnected
                Aug 8 14:48:40 charon 15[CFG] vici client 530985 connected
                Aug 8 14:48:40 charon 14[CFG] vici client 530985 registered for: list-sa
                Aug 8 14:48:40 charon 14[CFG] vici client 530985 requests: list-sas
                Aug 8 14:48:40 charon 11[CFG] vici client 530985 disconnected
                Aug 8 14:48:44 charon 08[CFG] vici client 530986 connected
                Aug 8 14:48:44 charon 15[CFG] vici client 530986 registered for: list-sa
                Aug 8 14:48:44 charon 15[CFG] vici client 530986 requests: list-sas
                Aug 8 14:48:44 charon 09[CFG] vici client 530986 disconnected
                Aug 8 14:48:45 charon 12[NET] <con1000|2427> received packet: from y.y.y.y[500] to x.x.x.x[500] (140 bytes)
                Aug 8 14:48:45 charon 12[ENC] <con1000|2427> parsed INFORMATIONAL_V1 request 741761387 [ HASH N(DPD) ]
                Aug 8 14:48:45 charon 12[IKE] <con1000|2427> queueing ISAKMP_DPD task
                Aug 8 14:48:45 charon 12[IKE] <con1000|2427> activating new tasks
                Aug 8 14:48:45 charon 12[IKE] <con1000|2427> activating ISAKMP_DPD task
                Aug 8 14:48:45 charon 12[ENC] <con1000|2427> generating INFORMATIONAL_V1 request 388047210 [ HASH N(DPD_ACK) ]
                Aug 8 14:48:45 charon 12[NET] <con1000|2427> sending packet: from x.x.x.x[500] to y.y.y.y[500] (140 bytes)
                Aug 8 14:48:45 charon 12[IKE] <con1000|2427> activating new tasks
                Aug 8 14:48:45 charon 12[IKE] <con1000|2427> nothing to initiate
                Aug 8 14:48:46 charon 12[CFG] vici client 530987 connected
                Aug 8 14:48:46 charon 16[CFG] vici client 530987 registered for: list-sa
                Aug 8 14:48:46 charon 06[CFG] vici client 530987 requests: list-sas
                Aug 8 14:48:46 charon 16[CFG] vici client 530987 disconnected
                Aug 8 14:48:48 charon 13[CFG] vici client 530988 connected
                Aug 8 14:48:48 charon 07[CFG] vici client 530988 registered for: list-sa
                Aug 8 14:48:48 charon 07[CFG] vici client 530988 requests: list-sas
                Aug 8 14:48:48 charon 14[CFG] vici client 530988 disconnected
                Aug 8 14:48:50 charon 11[CFG] vici client 530989 connected
                Aug 8 14:48:50 charon 07[CFG] vici client 530989 registered for: list-sa
                Aug 8 14:48:50 charon 07[CFG] vici client 530989 requests: list-sas
                Aug 8 14:48:50 charon 07[CFG] vici client 530989 disconnected
                Aug 8 14:48:56 charon 10[CFG] vici client 530990 connected
                Aug 8 14:48:56 charon 05[CFG] vici client 530990 registered for: list-sa
                Aug 8 14:48:56 charon 15[CFG] vici client 530990 requests: list-sas
                Aug 8 14:48:56 charon 15[CFG] vici client 530990 disconnected

                K 1 Reply Last reply Reply Quote 0
                • K
                  Konstanti @Alanesi
                  last edited by

                  @Alanesi

                  Hi
                  This log shows that there is an exchange of DPD packets between two hosts, and that you visited the page
                  /status/ipsec .

                  there is no more information here

                  AlanesiA 1 Reply Last reply Reply Quote 0
                  • AlanesiA
                    Alanesi @Konstanti
                    last edited by

                    Thanks @Konstanti
                    I got this after I refreched the page

                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 6e:11:58:71:ad:6d:27:6f:f9๐Ÿ†Ž93:30:c2:47:dd:f7:40:4e:e4:7f
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid d3:94:8a:4c:62:13:2a:19:2e:cc:af:72:8a:7d:36:d7:9a:1c:dc:67
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid c8:95:13:68:01:97:28:0a:2c:55:c3:fc:d3:90:f5:3a:05:3b:c9:fb
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for "CN=internal-ca, C=SA, L=Riyadh, O=International"
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid bd:ff:8d:1d:59:4d:83:2b:a7:da:e3:87:6e:63:68:1c:13๐Ÿ‡ฉ๐Ÿ‡ชa6:c0
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 14:8d:b3:54:ed:9b:2f:13:08:7c:c3:8b:4b:c1:5b:96:8a:c5:53:78
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid ee:e5:9f:1e:2a:a5:44:c3:cb:25:43:a6:9a:5b:d4:6a:25:bc:bb:8e
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid c4:52:72:20:a9:58:c0:6e:9d:4b:f2:0b:21:12:3c:eb:3a:0b:6b:6f
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid f8:f6:fa:6b:26:1b:cc:64:62:12:46:30:d1:c5:99:15:cd:01:1f:cb
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 95:a3:72:ff:cd:41:d7:e9:fd:dd:3f:39:ac:27:0b:24:78:1e:d6:54
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 3e:b7:48:eb:57:13:1d:b9:02:47:3d:5c:8d:b4:38:1e:1b:69:f0:ef
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid a8:e3:02:96:70:a6:8b:57:eb:ec:ef:cc:29:4e:91:74:9a:d4:92:38
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 62:af:b7:5c:2a:a7:0d:ad:0d:3d:8d:cf:fb:10:9e:65:c6:16:c3:0b
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid c2:4e:45:22:d1:c3:2f:86:80:f7:4d:38:48:4b:74:e5:71๐Ÿ’ฟ17:cf
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 22:60:a7:83:31:ee:a4:c8:11:65:c3:b9:da:51:85:74:42:39:06:c5
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid c4:9c:12:7e:4b:e9:e5:5e:f4:64:77:26:2c:b6:d9:c9:34:2b:7c:38
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid a7:e9:c8:0c:8c:4b:56:d6:37:fa:9e:0d:6c:69:58:1d:32:4e:91:c0
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid dd:00:92:e0:16:8e:ba:57:c2:67:d6:7d:0a:0a:4e:57:b6:cb:c6:c8
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 3d:9f:4e:e4:17:1d:e9:cc:8c:cb:6b:ee:84:03:c2๐Ÿ’ฟd7:bc:0b:9f
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 27:04:fa:e0:a6:32:eb:18:4b:51:e4:c6:39:e1:35:10:6b:b5:ff:61
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 3a:28:44:64:9f:20:e8:b1:05:bf:e9:d7:f5:66:33:61:51:ae:eb:51
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 9c:a9:8d:00:af:74:0d:dd:81:80:d2:13:45:a5:8b:8f:2e:94:38:d6
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid ab:30:d3:af:4b:d8:f1:6b:58:69:ee:45:69:29:da:84:b8:73:94:88
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid e0:8c:9b:db:25:49:b3:f1:7c:86:d6:b2:42:87:0b:d0:6b:a0:d9:e4
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid c4:30:28:c5:d3:e3:08:0c:10:44:8b:2c:77:ba:24:53:97:60:bb:f9
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 69:c4:27:db:59:69:68:18:47:e2:52:17:0a:e0:e5:7f:ab:9d:ef:0f
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 28:a4:ba:ee:61:3e:0a:b8:15:83:95:65:4e:4f:cc:13:c1:70:e3:e3
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid fd:da:14:c4:9f:30:de:21:bd:1e:42:39:fc๐Ÿ†Ž63:23:49:e0:f1:84
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid b3:86:36:7d:bc:e5:f8:4e:e2:8c:15:37:81:b2:1d:f5:3d:2c:15:cd
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 7b:6d:b8:b0:b5:e5:85:0d:10:61:51:f0:3d:b0:f4:ff:40:8d:9e:a4
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 80:fc:a2:0c:56:d9:5b:d9:71:c1:35:ed:24:60:13:6f:78:46:a9:2a
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 4f:9c:7d:21:79:9c:ad:0e:d8:b9:0c:57:9f:1a:02:99:e7:90:f3:87
                    Aug 8 14:59:23 charon 16[IKE] <2431> received cert request for unknown ca with keyid 8d:f0:0a:ad:7c:3f:4c:f3:42:75:e2:ec:19:bd:f3:28:e2:24:69:22
                    Aug 8 14:59:23 charon 16[IKE] <2431> received 136 cert requests for an unknown ca
                    Aug 8 14:59:23 charon 16[CFG] <2431> looking for peer configs matching x.x.x.x[%any]...y.y.y.y[user@domain.com]
                    Aug 8 14:59:23 charon 16[CFG] <2431> candidate "bypasslan", match: 1/1/24 (me/other/ike)
                    Aug 8 14:59:23 charon 16[CFG] <2431> candidate "con-mobile", match: 1/1/1052 (me/other/ike)
                    Aug 8 14:59:23 charon 16[CFG] <2431> ignore candidate 'con-mobile' without matching IKE proposal
                    Aug 8 14:59:23 charon 16[CFG] <bypasslan|2431> selected peer config 'bypasslan'
                    Aug 8 14:59:23 charon 16[IKE] <bypasslan|2431> peer requested EAP, config unacceptable
                    Aug 8 14:59:23 charon 16[CFG] <bypasslan|2431> no alternative config found
                    Aug 8 14:59:23 charon 16[IKE] <bypasslan|2431> processing INTERNAL_IP4_ADDRESS attribute
                    Aug 8 14:59:23 charon 16[IKE] <bypasslan|2431> processing INTERNAL_IP6_ADDRESS attribute
                    Aug 8 14:59:23 charon 16[IKE] <bypasslan|2431> processing INTERNAL_IP4_DNS attribute
                    Aug 8 14:59:23 charon 16[IKE] <bypasslan|2431> processing INTERNAL_IP6_DNS attribute
                    Aug 8 14:59:23 charon 16[IKE] <bypasslan|2431> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
                    Aug 8 14:59:23 charon 16[IKE] <bypasslan|2431> peer supports MOBIKE
                    Aug 8 14:59:23 charon 16[ENC] <bypasslan|2431> generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
                    Aug 8 14:59:23 charon 16[NET] <bypasslan|2431> sending packet: from x.x.x.x[4500] to y.y.y.y[40450] (80 bytes)
                    Aug 8 14:59:23 charon 16[IKE] <bypasslan|2431> IKE_SA bypasslan[2431] state change: CONNECTING => DESTROYING

                    K 1 Reply Last reply Reply Quote 0
                    • K
                      Konstanti @Alanesi
                      last edited by Konstanti

                      @Alanesi said in StrongSwan user authentication failed on Android:

                      ignore candidate 'con-mobile' without matching IKE proposal

                      Check the phase-1 settings on both sides of the tunnel . If the Windows client is working perfectly , it is possible that an error occurred in the Android client settings.

                      P.S. I would recommend selecting the CA certificate manually in the client settings

                      AlanesiA 1 Reply Last reply Reply Quote 0
                      • AlanesiA
                        Alanesi @Konstanti
                        last edited by

                        @Konstanti

                        I did the manual selection for the CA. I'll see what else I can change.

                        K 1 Reply Last reply Reply Quote 0
                        • K
                          Konstanti @Alanesi
                          last edited by Konstanti

                          @Alanesi

                          The user [user@domain.com] created ?

                          ee489418-a117-4c8b-91bd-dedd41766346-image.png

                          Aug 8 14:59:23 charon 16[CFG] <2431> looking for peer configs matching x.x.x.x[%any]...y.y.y.y[user@domain.com]
                          Aug 8 14:59:23 charon 16[CFG] <2431> ignore candidate 'con-mobile' without matching IKE proposal

                          AlanesiA 1 Reply Last reply Reply Quote 0
                          • AlanesiA
                            Alanesi @Konstanti
                            last edited by

                            @Konstanti

                            Yes, and its working on windows

                            K 1 Reply Last reply Reply Quote 0
                            • K
                              Konstanti @Alanesi
                              last edited by Konstanti

                              @Alanesi
                              Then you need to check the settings of the Android client
                              There may be an error in the username/password field

                              AlanesiA 1 Reply Last reply Reply Quote 0
                              • AlanesiA
                                Alanesi @Konstanti
                                last edited by

                                @Konstanti
                                Unfortunately still the same issue but with different log
                                This is from pfSense:

                                Aug 8 17:01:25 charon 16[CFG] <2464> looking for IKEv2 configs for x.x.x.x...y.y.y.y
                                Aug 8 17:01:25 charon 16[CFG] <2464> candidate: %any...%any, prio 24
                                Aug 8 17:01:25 charon 16[CFG] <2464> candidate: x.x.x.x...%any, prio 1052
                                Aug 8 17:01:25 charon 16[IKE] <2464> no matching proposal found, trying alternative config
                                Aug 8 17:01:25 charon 16[CFG] <2464> selecting proposal:
                                Aug 8 17:01:25 charon 16[CFG] <2464> proposal matches
                                Aug 8 17:01:25 charon 16[CFG] <2464> received proposals: IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_SHA1_96/AES_XCBC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_6144/MODP_8192/MODP_2048, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/CHACHA20_POLY1305/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_6144/MODP_8192/MODP_2048
                                Aug 8 17:01:25 charon 16[CFG] <2464> configured proposals: IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_6144/MODP_8192/MODP_2048, IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/CURVE_25519/MODP_3072/MODP_4096/MODP_6144/MODP_8192/MODP_2048
                                Aug 8 17:01:25 charon 16[CFG] <2464> selected proposal: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
                                Aug 8 17:01:25 charon 16[CFG] <2464> received supported signature hash algorithms: sha256 sha384 sha512 identity
                                Aug 8 17:01:25 charon 16[IKE] <2464> remote host is behind NAT
                                Aug 8 17:01:25 charon 16[CFG] <2464> sending supported signature hash algorithms: sha256 sha384 sha512 identity
                                Aug 8 17:01:25 charon 16[IKE] <2464> sending cert request for "CN=internal-ca, C=SA, L=Riyadh, O=International"
                                Aug 8 17:01:25 charon 16[ENC] <2464> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
                                Aug 8 17:01:25 charon 16[NET] <2464> sending packet: from x.x.x.x[500] to y.y.y.y[40538] (305 bytes)
                                Aug 8 17:01:25 charon 16[NET] <2464> received packet: from y.y.y.y[51903] to x.x.x.x[4500] (448 bytes)
                                Aug 8 17:01:25 charon 16[ENC] <2464> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
                                Aug 8 17:01:25 charon 16[CFG] <2464> looking for peer configs matching x.x.x.x[%any]...y.y.y.y[user@domain.com]
                                Aug 8 17:01:25 charon 16[CFG] <2464> candidate "bypasslan", match: 1/1/24 (me/other/ike)
                                Aug 8 17:01:25 charon 16[CFG] <2464> candidate "con-mobile", match: 1/1/1052 (me/other/ike)
                                Aug 8 17:01:25 charon 16[CFG] <2464> ignore candidate 'con-mobile' without matching IKE proposal
                                Aug 8 17:01:25 charon 16[CFG] <bypasslan|2464> selected peer config 'bypasslan'
                                Aug 8 17:01:25 charon 16[IKE] <bypasslan|2464> peer requested EAP, config unacceptable
                                Aug 8 17:01:25 charon 16[CFG] <bypasslan|2464> no alternative config found
                                Aug 8 17:01:25 charon 16[IKE] <bypasslan|2464> processing INTERNAL_IP4_ADDRESS attribute
                                Aug 8 17:01:25 charon 16[IKE] <bypasslan|2464> processing INTERNAL_IP6_ADDRESS attribute
                                Aug 8 17:01:25 charon 16[IKE] <bypasslan|2464> processing INTERNAL_IP4_DNS attribute
                                Aug 8 17:01:25 charon 16[IKE] <bypasslan|2464> processing INTERNAL_IP6_DNS attribute
                                Aug 8 17:01:25 charon 16[IKE] <bypasslan|2464> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
                                Aug 8 17:01:25 charon 16[IKE] <bypasslan|2464> peer supports MOBIKE
                                Aug 8 17:01:25 charon 16[ENC] <bypasslan|2464> generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
                                Aug 8 17:01:25 charon 16[NET] <bypasslan|2464> sending packet: from x.x.x.x[4500] to y.y.y.y[51903] (80 bytes)
                                Aug 8 17:01:25 charon 16[IKE] <bypasslan|2464> IKE_SA bypasslan[2464] state change: CONNECTING => DESTROYING

                                1 Reply Last reply Reply Quote 0
                                • A
                                  Alitai
                                  last edited by

                                  do you have set dns sec on your android?

                                  AlanesiA 1 Reply Last reply Reply Quote 0
                                  • AlanesiA
                                    Alanesi @Alitai
                                    last edited by

                                    @Alitai

                                    No, but to wich server?

                                    1 Reply Last reply Reply Quote 0
                                    • A
                                      Alitai
                                      last edited by

                                      okay, did you set the user identity under advance settings on the strongswan app?

                                      AlanesiA 1 Reply Last reply Reply Quote 0
                                      • AlanesiA
                                        Alanesi @Alitai
                                        last edited by

                                        @Alitai
                                        Yes its the same username.

                                        1 Reply Last reply Reply Quote 0
                                        • A
                                          Alitai
                                          last edited by

                                          okay, on the android part there is not much more to todo.
                                          Normally this is the easy part.

                                          Now, I think it's time for pictures from your pfsense and android. but don't forget to deleted the sensitive Infos.

                                          AlanesiA 1 Reply Last reply Reply Quote 0
                                          • AlanesiA
                                            Alanesi @Alitai
                                            last edited by Alanesi

                                            @Alitai
                                            This the P1 on pfSense.

                                            2020-08-12_9-25-04.png
                                            2020-08-12_9-25-53.png

                                            This Mobile Client
                                            2020-08-12_9-25-53.png

                                            For the Pre-Shared Keys the secret type is EAP.

                                            This P2

                                            P2.png

                                            This on the Andriod

                                            Screenshot_20200812-093931_strongSwan VPN Client.jpg

                                            K 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.