<div dir="ltr">Thanks for your assistance. We are very novice in this, and any help is great.<div>Note that we are running a vpn server for iphone users, so we do not really have much control over what protocol they use.<br><div><br></div><div>This is how I set the configuration file:</div><div><div># libreswan /etc/ipsec.conf configuration file</div><div>config setup</div><div>  protostack=netkey</div><div>  # exclude networks used on server side by adding %v4:!a.b.c.0/24</div><div>  virtual_private=%v4:<a href="http://10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:25.0.0.0/8,%v4:!10.231.247.0/24,%v4:!10.231.246.0/24">10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:25.0.0.0/8,%v4:!10.231.247.0/24,%v4:!10.231.246.0/24</a></div><div>  # PSK clients can have the same ID if they send it based on IP address.</div><div>  uniqueids=no</div><div>  plutostderrlog=/var/log/libreswan</div><div><br></div><div><br></div><div>conn xauth-psk</div><div>    authby=secret</div><div>    pfs=no</div><div>    auto=add</div><div>    rekey=no</div><div>    left=%defaultroute</div><div>    leftsubnet=<a href="http://0.0.0.0/0">0.0.0.0/0</a></div><div>    rightaddresspool=10.231.247.10-10.231.247.254</div><div>    right=%any</div><div>    # make cisco clients happy</div><div>    cisco-unity=yes</div><div>    # address of your internal DNS server</div><div>    modecfgdns1=172.31.14.50</div><div>    leftxauthserver=yes</div><div>    rightxauthclient=yes</div><div>    leftmodecfgserver=yes</div><div>    rightmodecfgclient=yes</div><div>    modecfgpull=yes</div><div>    xauthby=file</div><div>    # xauthby=alwaysok MUST NOT be used with PSK</div><div>    # Can be played with below</div><div>    #dpddelay=30</div><div>    #dpdtimeout=120</div><div>    #dpdaction=clear</div><div>    # xauthfail=soft</div><div>    ike-frag=yes</div><div>    ikev2=never</div><div>    ike=aes128-sha2_256;modp2048</div><div>    esp=aes128-sha2_256;modp2048</div></div><div><br></div><div>And still - this is the result:</div><div><div>20:33:40.054888 IP (tos 0x20, ttl 43, id 2204, offset 0, flags [none], proto UDP (17), length 876)</div><div>    77.127.99.61.53217 > 172.31.14.50.500: [udp sum ok] isakmp 1.0 msgid 00000000 cookie 371f2a168537a939->0000000000000000: phase 1 I ident:</div><div>    (sa: doi=ipsec situation=identity</div><div>        (p: #1 protoid=isakmp transform=15</div><div>            (t: #1 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen value=0100)(type=auth value=fde9)(type=hash value=sha2-256)(type=group desc value=modp2048))</div><div>            (t: #2 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen value=0100)(type=auth value=fde9)(type=hash value=sha1)(type=group desc value=modp2048))</div><div>            (t: #3 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen value=0100)(type=auth value=fde9)(type=hash value=md5)(type=group desc value=modp2048))</div><div>            (t: #4 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen value=0100)(type=auth value=fde9)(type=hash value=sha2-512)(type=group desc value=modp2048))</div><div>            (t: #5 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen value=0100)(type=auth value=fde9)(type=hash value=sha2-256)(type=group desc value=modp1536))</div><div>            (t: #6 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen value=0100)(type=auth value=fde9)(type=hash value=sha1)(type=group desc value=modp1536))</div><div>            (t: #7 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen value=0100)(type=auth value=fde9)(type=hash value=md5)(type=group desc value=modp1536))</div><div>            (t: #8 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen value=0100)(type=auth value=fde9)(type=hash value=sha1)(type=group desc value=modp1024))</div><div>            (t: #9 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen value=0100)(type=auth value=fde9)(type=hash value=md5)(type=group desc value=modp1024))</div><div>            (t: #10 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen value=0080)(type=auth value=fde9)(type=hash value=sha1)(type=group desc value=modp1024))</div><div>            (t: #11 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen value=0080)(type=auth value=fde9)(type=hash value=md5)(type=group desc value=modp1024))</div><div>            (t: #12 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=3des)(type=auth value=fde9)(type=hash value=sha1)(type=group desc value=modp1024))</div><div>            (t: #13 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=3des)(type=auth value=fde9)(type=hash value=md5)(type=group desc value=modp1024))</div><div>            (t: #14 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=1des)(type=auth value=fde9)(type=hash value=sha1)(type=group desc value=modp1024))</div><div>            (t: #15 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=1des)(type=auth value=fde9)(type=hash value=md5)(type=group desc value=modp1024))))</div><div>    (vid: len=16 4a131c81070358455c5728f20e95452f)</div><div>    (vid: len=16 4df37928e9fc4fd1b3262170d515c662)</div><div>    (vid: len=16 8f8d83826d246b6fc7a8a6a428c11de8)</div><div>    (vid: len=16 439b59f8ba676c4c7737ae22eab8f582)</div><div>    (vid: len=16 4d1e0e136deafa34c4f3ea9f02ec7285)</div><div>    (vid: len=16 80d0bb3def54565ee84645d4c85ce3ee)</div><div>    (vid: len=16 9909b64eed937c6573de52ace952fa6b)</div><div>    (vid: len=16 7d9419a65310ca6f2c179d9215529d56)</div><div>    (vid: len=16 cd60464335df21f87cfdb2fc68b6a448)</div><div>    (vid: len=16 90cb80913ebb696e086381b5ec427b1f)</div><div>    (vid: len=8 09002689dfd6b712)</div><div>    (vid: len=16 12f5f28c457168a9702d9fe274cc0100)</div><div>    (vid: len=20 4048b7d56ebce88525e7de7f00d6c2d380000000)</div><div>    (vid: len=16 afcad71368a1f1c96b8696fc77570100)</div><div>20:33:40.055372 IP (tos 0x0, ttl 64, id 50803, offset 0, flags [DF], proto UDP (17), length 68)</div><div>    172.31.14.50.500 > 77.127.99.61.53217: [bad udp cksum 0x6b4f -> 0xd990!] isakmp 1.0 msgid 00000000 cookie 371f2a168537a939->951eb0f332f2cf1b: phase 1 R inf:</div><div>    (n: doi=ipsec proto=isakmp type=NO-PROPOSAL-CHOSEN)</div></div><div><br></div><div>Thanks,</div><div><br></div><div>Dynastic</div></div></div><div class="gmail_extra"><br><div class="gmail_quote">On Fri, Sep 15, 2017 at 4:55 PM, Paul Wouters <span dir="ltr"><<a href="mailto:paul@nohats.ca" target="_blank">paul@nohats.ca</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">On Fri, 15 Sep 2017, Dynastic Space wrote:<br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
In version 3.19 we used the following configuration:<br>
</blockquote>
<br>
</span><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
conn xauth-psk<br>
</blockquote>
<br>
[no ike= or esp=/phase2= lines]<span class=""><br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
I just upgraded to version 3.21, using this same configuration. the client is sending the following proposal:<br>
</blockquote>
<br></span>
3.21 has been updated to reflect RFC-8247<br>
<br>
<a href="https://tools.ietf.org/html/rfc8247" rel="noreferrer" target="_blank">https://tools.ietf.org/html/rf<wbr>c8247</a><br>
<br>
Even though it technically does not cover IKEv1 - only IKEv2 - we have<br>
also bumped some requirements in IKEv1. Most notably, since all IKEv1<br>
stacks support both modp1536 (DH5) and modp1024 (DH2), and the latter<br>
is pretty weak, we have kicked that one out of our default proposal<br>
list. Additional, the ESP RFC (7321bis) will be published in a few days<br>
as RFC-8221 and 3.21 also tries to comply there. This means mostly that<br>
MD5 is kicked out of the default proposal set.<br>
<br>
So with that in mind:<span class=""><br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
    (sa: doi=ipsec situation=identity<br>
        (p: #1 protoid=isakmp transform=15<br>
            (t: #1 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen<br>
value=0100)(type=auth value=fde9)(type=hash value=sha2-256)(type=group desc value=modp2048))<br>
</blockquote>
<br></span>
This is ike=aes128-sha2_256;modp2048 and should be accepted by us?<br>
Possibly we had not added modp2048 to the default group?<span class=""><br>
<br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
            (t: #2 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen<br>
value=0100)(type=auth value=fde9)(type=hash value=sha1)(type=group desc value=modp2048))<br>
</blockquote>
<br></span>
ike=aes128-sha1;modp2048  Same<span class=""><br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
            (t: #3 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen<br>
value=0100)(type=auth value=fde9)(type=hash value=md5)(type=group desc value=modp2048))<br>
</blockquote>
<br></span>
ike=aes128-md5;modp2048 md5, so rejected.<span class=""><br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
            (t: #4 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen<br>
value=0100)(type=auth value=fde9)(type=hash value=sha2-512)(type=group desc value=modp2048))<br>
</blockquote>
<br></span>
ike=aes128-sha2_512;modp1536 Should also be accepted?<span class=""><br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
            (t: #5 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen<br>
value=0100)(type=auth value=fde9)(type=hash value=sha2-256)(type=group desc value=modp1536))<br>
</blockquote>
<br></span>
ike=aes128-sha2_256;modp1536 Should also be accepted?<span class=""><br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
            (t: #6 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen<br>
value=0100)(type=auth value=fde9)(type=hash value=sha1)(type=group desc value=modp1536))<br>
</blockquote>
<br></span>
ike=aes128-sha1;modp1536 should also be accepted.<span class=""><br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
            (t: #7 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen<br>
value=0100)(type=auth value=fde9)(type=hash value=md5)(type=group desc value=modp1536))<br>
</blockquote>
<br></span>
ike=aes128-md5;modp1536 rejected for md5<span class=""><br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
            (t: #8 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen<br>
value=0100)(type=auth value=fde9)(type=hash value=sha1)(type=group desc value=modp1024))<br>
            (t: #9 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen<br>
value=0100)(type=auth value=fde9)(type=hash value=md5)(type=group desc value=modp1024))<br>
            (t: #10 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen<br>
value=0080)(type=auth value=fde9)(type=hash value=sha1)(type=group desc value=modp1024))<br>
            (t: #11 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=aes)(type=keylen<br>
value=0080)(type=auth value=fde9)(type=hash value=md5)(type=group desc value=modp1024))<br>
            (t: #12 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=3des)(type=auth<br>
value=fde9)(type=hash value=sha1)(type=group desc value=modp1024))<br>
            (t: #13 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=3des)(type=auth<br>
value=fde9)(type=hash value=md5)(type=group desc value=modp1024))<br>
            (t: #14 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=1des)(type=auth<br>
value=fde9)(type=hash value=sha1)(type=group desc value=modp1024))<br>
            (t: #15 id=ike (type=lifetype value=sec)(type=lifeduration value=0e10)(type=enc value=1des)(type=auth<br>
value=fde9)(type=hash value=md5)(type=group desc value=modp1024))))<br>
</blockquote>
<br></span>
All of these rejected because of modp1024 (DH2)<span class=""><br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
but the server is responding with <br>
    (n: doi=ipsec proto=isakmp type=NO-PROPOSAL-CHOSEN)<br>
</blockquote>
<br></span>
I'm not sure why you are seeing that. Can you try adding:<br>
<br>
        ike=aes128-sha2_256;modp2048<br>
        ike=aes128-sha2_256;modp2048<br>
<br>
Do you have all the same kind of clients? If not, you might need to make<br>
a more complicated proposal with multiple entries.<br>
<br>
Note that you might run into similar things for esp=/phase2alg= once<br>
you fixup this stage.<span class="HOEnZb"><font color="#888888"><br>
<br>
Paul<br>
</font></span></blockquote></div><br></div>