>
>> what is wrong? client side iked.conf:
>>
>> ikev2 'roadwarrior' active esp \
>>          from dynamic to any \
>>          peer 45.77.223.7 \
>>          srcid roadwarrior \
>>          dstid server1.domain \
>>          request address any \
>>          iface lo1
>>
>> # iked -dv
>> /etc/iked.conf: 43: invalid iface
>
> lo1 must exist:
> # ifconfig lo1 create
>
>
> To create it at a reboot:
> # touch /etc/hostname.lo1
>

OK Thomas thank you.

Questions about cert for roadwarrior and more? Why 192.168.1.79? i was
expecting 10.0.5.x please.

>From Road Warrior after deletetion of certs, exept local.pub and local.key:

# iked -dv
ikev2 "roadwarrior" active tunnel esp inet from 0.0.0.0 to 0.0.0.0/0 from
:: to ::/0 local any peer 45.77.223.7 ikesa enc aes-128-gcm enc
aes-256-gcm prf hmac-sha2-256 prf hmac-sha2-384 prf hmac-sha2-512 prf
hmac-sha1 group curve25519 group ecp521 group ecp384 group ecp256 group
modp4096 group modp3072 group modp2048 group modp1536 group modp1024 ikesa
enc aes-256 enc aes-192 enc aes-128 enc 3des prf hmac-sha2-256 prf
hmac-sha2-384 prf hmac-sha2-512 prf hmac-sha1 auth hmac-sha2-256 auth
hmac-sha2-384 auth hmac-sha2-512 auth hmac-sha1 group curve25519 group
ecp521 group ecp384 group ecp256 group modp4096 group modp3072 group
modp2048 group modp1536 group modp1024 childsa enc aes-128-gcm enc
aes-256-gcm group none esn noesn childsa enc aes-256 enc aes-192 enc
aes-128 auth hmac-sha2-256 auth hmac-sha2-384 auth hmac-sha2-512 auth
hmac-sha1 group none esn noesn srcid roadwarrior dstid agroena.org
lifetime 10800 bytes 4294967296 signature config address any iface lo0
ikev2_init_ike_sa: initiating "roadwarrior"
spi=0xc166e8f236679cc9: send IKE_SA_INIT req 0 peer 45.77.223.7:500 local
0.0.0.0:500, 518 bytes
spi=0xc166e8f236679cc9: recv IKE_SA_INIT res 0 peer 45.77.223.7:500 local
192.168.1.79:500, 255 bytes, policy 'roadwarrior'
spi=0xc166e8f236679cc9: ca_getreq: no valid local certificate found for
FQDN/roadwarrior
spi=0xc166e8f236679cc9: ca_getreq: using local public key of type RSA_KEY
spi=0xc166e8f236679cc9: send IKE_AUTH req 1 peer 45.77.223.7:4500 local
192.168.1.79:4500, 947 bytes, NAT-T
spi=0xc166e8f236679cc9: recv IKE_AUTH res 1 peer 45.77.223.7:4500 local
192.168.1.79:4500, 65 bytes, policy 'roadwarrior'
spi=0xc166e8f236679cc9: sa_free: authentication failed notification from peer
spi=0x128062d2440a20ca: recv IKE_SA_INIT res 0 peer 45.77.223.7:500 local
192.168.1.79:500, 255 bytes, policy 'roadwarrior'
spi=0x128062d2440a20ca: recv IKE_SA_INIT res 0 peer 45.77.223.7:500 local
192.168.1.79:500, 255 bytes, policy 'roadwarrior'
spi=0x128062d2440a20ca: recv IKE_SA_INIT res 0 peer 45.77.223.7:500 local
192.168.1.79:500, 255 bytes, policy 'roadwarrior'
spi=0x128062d2440a20ca: recv IKE_SA_INIT res 0 peer 45.77.223.7:500 local
192.168.1.79:500, 255 bytes, policy 'roadwarrior'
spi=0x128062d2440a20ca: recv IKE_SA_INIT res 0 peer 45.77.223.7:500 local
192.168.1.79:500, 255 bytes, policy 'roadwarrior'
ikev2_init_ike_sa: initiating "roadwarrior"
spi=0xaf891eb37dd8f4cc: send IKE_SA_INIT req 0 peer 45.77.223.7:500 local
0.0.0.0:500, 518 bytes
spi=0xaf891eb37dd8f4cc: recv IKE_SA_INIT res 0 peer 45.77.223.7:500 local
192.168.1.79:500, 255 bytes, policy 'roadwarrior'
spi=0xaf891eb37dd8f4cc: ca_getreq: no valid local certificate found for
FQDN/roadwarrior
spi=0xaf891eb37dd8f4cc: ca_getreq: using local public key of type RSA_KEY
spi=0xaf891eb37dd8f4cc: send IKE_AUTH req 1 peer 45.77.223.7:4500 local
192.168.1.79:4500, 947 bytes, NAT-T
spi=0xaf891eb37dd8f4cc: recv IKE_AUTH res 1 peer 45.77.223.7:4500 local
192.168.1.79:4500, 65 bytes, policy 'roadwarrior'
spi=0xaf891eb37dd8f4cc: sa_free: authentication failed notification from peer
spi=0x128062d2440a20ca: recv IKE_SA_INIT res 0 peer 45.77.223.7:500 local
192.168.1.79:500, 255 bytes, policy 'roadwarrior'
ikev2_init_ike_sa: initiating "roadwarrior"
spi=0x72a1368e235340b8: send IKE_SA_INIT req 0 peer 45.77.223.7:500 local
0.0.0.0:500, 518 bytes
spi=0x72a1368e235340b8: recv IKE_SA_INIT res 0 peer 45.77.223.7:500 local
192.168.1.79:500, 255 bytes, policy 'roadwarrior'
spi=0x72a1368e235340b8: ca_getreq: no valid local certificate found for
FQDN/roadwarrior
spi=0x72a1368e235340b8: ca_getreq: using local public key of type RSA_KEY
spi=0x72a1368e235340b8: send IKE_AUTH req 1 peer 45.77.223.7:4500 local
192.168.1.79:4500, 947 bytes, NAT-T
spi=0x72a1368e235340b8: recv IKE_AUTH res 1 peer 45.77.223.7:4500 local
192.168.1.79:4500, 65 bytes, policy 'roadwarrior'
spi=0x72a1368e235340b8: sa_free: authentication failed notification from peer

Reply via email to