Hello. I am trying to establish an ipsec connection in transport mode between two hosts located in the same LAN, using PSK for authentication and ikev1 for automatic keying. So far, my attempts have resulted in failure.
Host A ( 192.168.1.11 ) runs OpenBSD 6.1 and uses the following configurations: /etc/ipsec.conf ike passive esp transport from 192.168.1.11 to 192.168.1.12 \ main auth hmac-sha1 enc aes group modp1024 \ quick auth hmac-sha1 enc aes group modp1024 \ psk "test" /etc/rc.conf.local isakmpd_flags=-K -T ipsec=YES Host B ( 192.168.1.12 ) runs Knoppix 7.7.1, Strongswan 5.5.0, and uses the following configurations: /etc/ipsec.conf [...] conn test left=192.168.1.12 right=192.168.1.11 authby=secret auto=start type=transport ike=aes-sha1-modp1024 esp=aes-sha1-modp1024 compress=no /etc/ipsec.secrets 192.168.1.12 192.168.1.11 : PSK "test" This shows up in /var/log/messages on Host A when establishing ipsec between both hosts is attempted: May 10 16:57:39 server isakmpd[37746]: isakmpd: starting May 10 16:57:58 server isakmpd[4052]: attribute_unacceptable: ENCRYPTION_ALGORIT HM: got AES_CBC, expected 3DES_CBC May 10 16:57:58 server isakmpd[4052]: message_negotiate_sa: no compatible propos al found May 10 16:57:58 server isakmpd[4052]: dropped message from 192.168.1.12 port 500 due to notification type NO_PROPOSAL_CHOSEN Notice that isakmpd is expecting 3DES, when I configured the connection to use aes at both ends. More worrysome: When I configure the Host B to use 3DES for phase 1, isakmpd complains because it was offered PSK, but RSA_SIG was expected! This leads me to believe that isakmpd is ignoring the configuration parameters. Any help is appreciated.