[Swan] L2TP/IPsec with certificates: INVALID_KEY_INFORMATION
Sergio Belkin
sebelk at gmail.com
Sun May 1 00:34:02 UTC 2016
2016-04-30 13:30 GMT-03:00 Paul Wouters <paul at nohats.ca>:
> vhost:%no,%priv
I've followed your suggestion, and now I get:
000 "windows": oriented; my_ip=unset; their_ip=unset;
mycert=hope.belkin.home
000 "windows": xauth us:none, xauth them:none, my_username=[any];
their_username=[any]
000 "windows": modecfg info: us:none, them:none, modecfg policy:push,
dns1:unset, dns2:unset, domain:unset, banner:unset;
000 "windows": labeled_ipsec:no;
000 "windows": policy_label:unset;
000 "windows": CAs: 'DC=ar, DC=com, DC=vfc, CN=vfc-MS00009-CA'...'%any'
000 "windows": ike_life: 3600s; ipsec_life: 28800s; replay_window: 32;
rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0;
000 "windows": retransmit-interval: 500ms; retransmit-timeout: 60s;
000 "windows": sha2_truncbug:no; initial_contact:no; cisco_unity:no;
fake_strongswan:no; send_vendorid:no;
000 "windows": policy:
RSASIG+ENCRYPT+DONT_REKEY+UP+IKEV1_ALLOW+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO;
000 "windows": conn_prio: 32,32; interface: wlp7s0; metric: 0; mtu:
unset; sa_prio:auto; nflog-group: unset; mark: unset;
000 "windows": newest ISAKMP SA: #1; newest IPsec SA: #2;
000 "windows": IKE algorithm newest: 3DES_CBC_192-SHA1-MODP1024
000 "windows": ESP algorithm newest: AES_128-HMAC_SHA1; pfsgroup=<N/A>
000
000 Total IPsec connections: loaded 3, active 1
000
000 State Information: DDoS cookies not required, Accepting new IKE
connections
000 IKE SAs: total(1), half-open(0), open(0), authenticated(1), anonymous(0)
000 IPsec SAs: total(1), authenticated
Thanks in advanec!
--
--
Sergio Belkin
LPIC-2 Certified - http://www.lpi.org
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.libreswan.org/pipermail/swan/attachments/20160430/831559fd/attachment.html>
More information about the Swan
mailing list