Hello.

I am trying to establish an ipsec connection in transport mode between two
hosts located in the same LAN, using PSK for authentication and ikev1 for
automatic keying. So far, my attempts have resulted in failure.

Host A ( 192.168.1.11 ) runs OpenBSD 6.1 and uses the following
configurations:

/etc/ipsec.conf
ike passive esp transport from 192.168.1.11 to 192.168.1.12 \
main auth hmac-sha1 enc aes group modp1024 \
quick auth hmac-sha1 enc aes group modp1024 \
psk "test"

/etc/rc.conf.local
isakmpd_flags=-K -T
ipsec=YES

Host B ( 192.168.1.12 ) runs Knoppix 7.7.1, Strongswan 5.5.0, and uses the
following configurations:

/etc/ipsec.conf
[...]
conn test
        left=192.168.1.12
        right=192.168.1.11
        authby=secret
        auto=start
        type=transport
        ike=aes-sha1-modp1024
        esp=aes-sha1-modp1024
        compress=no

/etc/ipsec.secrets
192.168.1.12 192.168.1.11 : PSK "test"

This shows up in /var/log/messages on Host A when establishing ipsec between
both hosts is attempted:
May 10 16:57:39 server isakmpd[37746]: isakmpd: starting
May 10 16:57:58 server isakmpd[4052]: attribute_unacceptable:
ENCRYPTION_ALGORIT HM: got AES_CBC, expected 3DES_CBC
May 10 16:57:58 server isakmpd[4052]: message_negotiate_sa: no compatible
propos al found
May 10 16:57:58 server isakmpd[4052]: dropped message from 192.168.1.12 port
500  due to notification type NO_PROPOSAL_CHOSEN

Notice that isakmpd is expecting 3DES, when I configured the connection to
use aes at both ends. More worrysome: When I configure the Host B to use
3DES for phase 1, isakmpd complains because it was offered PSK, but RSA_SIG
was expected! This leads me to believe that isakmpd is ignoring the
configuration parameters.

Any help is appreciated. 

Reply via email to