On 2024-07-05 17:14, J Doe wrote:
Hi list,
I have a basic VPN setup with iked with certificate authentication.
Periodically, something will attempt to authenticate against it that is
not me and I see the following in the logs:
Jul 5 10:55:47 server iked[15172]: spi=0x7680ddead2051f3c:
ikev2_send_auth_failed: authentication failed for
Just wanted to double-check: is the reason it says "authentication
failed for" without an identity because someone is specifically
attempting certificate authentication against my server and iked is
rejecting them ?
Thanks,
- J
Hi list,
It occurs to me that I did not include the configuration I have for iked
(iked.conf), which would probably be helpful ... I also didn't mention
the version of OpenBSD I was running as my server, which is 7.5.
I run a "road-warrior" configuration similar to what is displayed in the
OpenBSD FAQ[0]. Here is my configuration:
ikev2 "VPN" passive ipcomp tunnel esp \
from any to dynamic \
local egress peer any \
srcid server.home.arpa \
dstid client.home.arpa \
rsa \
config address 10.0.5.0/24 \
tag "ROADW"
As mentioned in my previous e-mail, sometimes connections will be made
to my VPN server that display the following:
Jul 5 10:55:47 server iked[15172]: spi=0x7680ddead2051f3c:
ikev2_send_auth_failed: authentication failed for
I am wondering if this is an indication of someone attempting to
authenticate using public key/certificate authentication and being
_rejected_ by iked ?
My hypothesis is that iked does not name an identity because this is
certificate based authentication vs. MSCHAPv2 for EAP authentication
which would provide an identity (ie: a username).
Is that correct ?
Thanks,
- J
Links:
[0] https://www.openbsd.org/faq/faq17.html#clientikev2