2.2 Beta IPSEC GUI My Certificate does not configure strongswan Cert/Key

  • Hi, PFsense experts,

    I tried to connect windows7 buildin IKEV2 IPsec Client and Android StronSwan Client to "mobileIPsec".
    Unfortunately there is an issue with this Beta 2.2.

    • GUI page VPN- IPsec- Edit Phase 1entry:(Mobile Client),  section Phase 1 proposal (Authentication) field "My Certificate" does not configure strongswan Cert+Key at strongswan.

    • server certfile missing at /ipsec.d/certs

    • server keyfile missing at /ipsec.d/private

    • ipsec.secrets files empty! please add reference to server Keyfile " : RSA keyfile"

    • ipsec.conf missing reference to server cert file "leftcert = certfile"

    Could some expert open ticket or fix listed GUI configurations, ??

    ( build from 23.10.2014 Release 2.2 Beta (AMD64) was in use)

    after manual configuration I got Mobile Client IPSec working with IKEV2!

    Successfully tested :

    • Windows7 build in VPN client connected by IKEV2  (mutualRSA)
    • Android StrongSwan Client (mutual RSA)

    Just some other possible GUI improvements:

    If "Key Exchange Version = V2" is selected:

    • within IKEV2 is no support for  PSK: -> you could remove  PSK based methods from list of "Authentication Methods"
    • within IKEV2 is no support for aggressive mode -> "Negotiation mode" can be omitted in GUI

    No need to fix to special proposals in Phase1 and pase2 algorithms:
    at least with IKEV2 there is much better proposal negotiation. I removed proposal entries 
    ike = aes256-sha1-modp1024!
    esp = aes256-sha1!
    in ipsec.conf to avoid proposal alignment issues. Strongswan accept then what client offers, if supported.   
    Consider not all different clients might support all proposals, so better not fix to any special proposal if not needed…
    ->I recommend adding some "accept peer proposals" functionality in GUI for PH1 and PH2, if selected remove proposal. This might be helpful for beginners as easy setup!

    Martin W

  • I just tested this and it work correctly certificates are put in the proper config and files.

    Is this an upgraded configuration of sorts?

  • It was from older apha snapshot converted +edited Setup!
    Certs+key have been imported in cert manager!

    I did retest on other box with upgrade from 2.1.5 nano to 2.2beta and same issue after upgrade. Certs+keys not configured, tunnel broken.
    Only difference there, it was an IKEv1, mutal RSA, IPsec main mode, tunnel!

    On other box I will retest with new  config starting from defaults …

  • Retest with new config, starting from default was also failed!

    Steps done:

    • set to factory default
    • assign Interfaces, wan (dhcp eth), lan eth
    • create internal root ca with GUI
    • create Server Cert from localCa  with GUI
    • create mobile ipsec, all setting default, Xauth section: select internal database, Group Authentication None
    • add pase1: all Default, but Authetication set to mutual RSA, main  mode, Identifier local and remote set to ASN1, select ServerCert and local CA
    • add pase 2 : all Default

    enable IPSEC VPN, log's show loaded configuration con1 loaded.

    If I check /var/etc/ipsec/  I can see missing configuration:

    ipsec.d/private/    -> empty no private key!
    ipsec.d/certs/  -> empty no cert stored
    ipsec.secrets    -> file exist but empty  " : RSA Keyfile" should be in to point to key

    -> Bug seem to be present also in  legacy config,  IKEv1+ main mode + mutualRSA so it seem to be not related to IKEV2 as originally suspected.

    Any ideas what might be wrong?

    Is there someone with Cert based "mutual RSA" + "IKE main mode" working 2.2 IPSec ???

    (tested on todays snapshot 2.2Beta on AMD64)

Log in to reply