I recently started seeing some ipsec clients fail on newer versions of
MacOS and iOS. After MacOS 12.1, connecting to my head end now fails
with NO_PROPOSAL_CHOSEN using mod1024 in my ipsec.conf. I've also
tried, with no success:

main auth "hmac-sha2" enc "aes" group modp1024
quick auth "hmac-sha2" enc "aes" group modp1024

Has anyone gotten ipsec working between recent versions of Apple
devices? If so, could you share your proposals and/or configs?

Below are my configs -- thanks in advance for any help.

macbook-client:~$ uname -a
Darwin neptune.example.org 21.2.0 Darwin Kernel Version 21.2.0: Sun
Nov 28 20:28:54 PST 2021; root:xnu-8019.61.5~1/RELEASE_X86_64 x86_64

server# uname -a
OpenBSD lax 7.0 GENERIC#5 amd64

# tail -f /var/log/messages
Feb 18 11:11:31 server isakmpd[10385]: attribute_unacceptable:
ENCRYPTION_ALGORITHM: got AES_CBC, expected 3DES_CBC
Feb 18 11:11:31 server last message repeated 11 times
Feb 18 11:11:31 server isakmpd[10385]:
attribute_unacceptable:AUTHENTICATION_METHOD: got PRE_SHARED, expected
RSA_SIG
Feb 18 11:11:31 server isakmpd[10385]: attribute_unacceptable:
AUTHENTICATION_METHOD: got PRE_SHARED, expected RSA_SIG
Feb 18 11:11:31 server isakmpd[10385]: message_negotiate_sa: no
compatible proposal found
Feb 18 11:11:31 server isakmpd[10385]: dropped message from
100.64.10.10 port 63434 due to notification type NO_PROPOSAL_CHOSEN

# cat /etc/ipsec.conf
public_ip = "203.0.113.1"
ike passive esp tunnel proto udp from $public_ip to any \
  main group "modp1024" quick group "modp1024" \
  psk "THIS_IS_MY_IPSEC_PASSPHRASE"

# ipssecctl -vnf /etc/ipsec.conf
public_ip = "203.0.113.1"
C set [Phase 1]:Default=peer-default force
C set [peer-default]:Phase=1 force
C set [peer-default]:Authentication=THIS_IS_MY_IPSEC_PASSPHRASE force
C set [peer-default]:Configuration=phase1-peer-default force
C set [phase1-peer-default]:EXCHANGE_TYPE=ID_PROT force
C add 
[phase1-peer-default]:Transforms=phase1-transform-peer-default-PRE_SHARED-SHA-AES128-MODP_1024
force
C set 
[phase1-transform-peer-default-PRE_SHARED-SHA-AES128-MODP_1024]:AUTHENTICATION_METHOD=PRE_SHARED
force
C set 
[phase1-transform-peer-default-PRE_SHARED-SHA-AES128-MODP_1024]:HASH_ALGORITHM=SHA
force
C set 
[phase1-transform-peer-default-PRE_SHARED-SHA-AES128-MODP_1024]:ENCRYPTION_ALGORITHM=AES_CBC
force
C set 
[phase1-transform-peer-default-PRE_SHARED-SHA-AES128-MODP_1024]:KEY_LENGTH=128,128:256
force
C set 
[phase1-transform-peer-default-PRE_SHARED-SHA-AES128-MODP_1024]:GROUP_DESCRIPTION=MODP_1024
force
C set 
[phase1-transform-peer-default-PRE_SHARED-SHA-AES128-MODP_1024]:Life=LIFE_MAIN_MODE
force
C set [from-203.0.113.1=17-to-0.0.0.0/0=17]:Phase=2 force
C set [from-203.0.113.1=17-to-0.0.0.0/0=17]:ISAKMP-peer=peer-default force
C set 
[from-203.0.113.1=17-to-0.0.0.0/0=17]:Configuration=phase2-from-203.0.113.1=17-to-0.0.0.0/0=17
force
C set [from-203.0.113.1=17-to-0.0.0.0/0=17]:Local-ID=from-203.0.113.1=17 force
C set [from-203.0.113.1=17-to-0.0.0.0/0=17]:Remote-ID=to-0.0.0.0/0=17 force
C set [phase2-from-203.0.113.1=17-to-0.0.0.0/0=17]:EXCHANGE_TYPE=QUICK_MODE
force
C set 
[phase2-from-203.0.113.1=17-to-0.0.0.0/0=17]:Suites=phase2-suite-from-203.0.113.1=17-to-0.0.0.0/0=17
force
C set 
[phase2-suite-from-203.0.113.1=17-to-0.0.0.0/0=17]:Protocols=phase2-protocol-from-203.0.113.1=17-to-0.0.0.0/0=17
force
C set 
[phase2-protocol-from-203.0.113.1=17-to-0.0.0.0/0=17]:PROTOCOL_ID=IPSEC_ESP
force
C set 
[phase2-protocol-from-203.0.113.1=17-to-0.0.0.0/0=17]:Transforms=phase2-transform-from-203.0.113.1=17-to-0.0.0.0/0=17-AES128-SHA
C set 
[phase2-transform-from-203.0.113.1=17-to-0.0.0.0/0=17-AES128-SHA2_256-MODP_1024-TUNNEL]:TRANSFORM_ID=AES
force
C set 
[phase2-transform-from-203.0.113.1=17-to-0.0.0.0/0=17-AES128-SHA2_256-MODP_1024-TUNNEL]:KEY_LENGTH=128,128:256
force
C set 
[phase2-transform-from-203.0.113.1=17-to-0.0.0.0/0=17-AES128-SHA2_256-MODP_1024-TUNNEL]:ENCAPSULATION_MODE=TUNNEL
force
C set 
[phase2-transform-from-203.0.113.1=17-to-0.0.0.0/0=17-AES128-SHA2_256-MODP_1024-TUNNEL]:AUTHENTICATION_ALGORITHM=HMAC_SHA2_256
f
C set 
[phase2-transform-from-203.0.113.1=17-to-0.0.0.0/0=17-AES128-SHA2_256-MODP_1024-TUNNEL]:GROUP_DESCRIPTION=MODP_1024
force
C set 
[phase2-transform-from-203.0.113.1=17-to-0.0.0.0/0=17-AES128-SHA2_256-MODP_1024-TUNNEL]:Life=LIFE_QUICK_MODE
force
C set [from-203.0.113.1=17]:ID-type=IPV4_ADDR force
C set [from-203.0.113.1=17]:Address=203.0.113.1 force
C set [to-0.0.0.0/0=17]:ID-type=IPV4_ADDR_SUBNET force
C set [to-0.0.0.0/0=17]:Network=0.0.0.0 force
C set [to-0.0.0.0/0=17]:Netmask=0.0.0.0 force
C set [from-203.0.113.1=17]:Protocol=17 force
C set [to-0.0.0.0/0=17]:Protocol=17 force
C add [Phase 2]:Passive-Connections=from-203.0.113.1=17-to-0.0.0.0/0=17

Reply via email to