I'm trying to get an ipsec tunnel working between two OpenBSD 4.0
hosts. I'm running isakmpd on both with the -K option. Yet, on the VPN
server, I'm seeing:
  215415.359192 Mesg 70 DATA: 
  215415.359314 Negt 40 ike_phase_1_recv_ID: FQDN:
  215415.359428 Negt 40 73637275 622e7468 65777269 7474656e 776f7264 2e636f6d 
  215415.359628 Plcy 30 keynote_cert_obtain: failed to open 
"/etc/isakmpd/keynote//[FQDN]/credentials"
  215415.360314 Default rsa_sig_decode_hash: RSA_public_decrypt () failed
  215415.360407 Default dropped message from [CLIENT IP] port 4500 due to 
notification type INVALID_ID_INFORMATION
  215415.360506 Timr 10 timer_add_event: event exchange_free_aux(0x84d61000) 
added last, expiration in 120s

I doubt it matters but the client is connecting to a VPN server behind
a firewall.

The ipsec.conf on the client:
  ike esp from 192.168.0.0/24 to 192.168.1.0/24 peer [VPN SERVER IP] \
    srcid [CLIENT FQDN] dstid [VPN SERVER FQDN]
  ike esp from [CLIENT IP] to [VPN SERVER IP] \
    srcid [CLIENT FQDN] dstid [VPN SERVER FQDN]

The ipsec.conf on the VPN server:
  ike passive from 192.168.1.0/24 to 192.168.0.0/24 peer [CLIENT IP] \
    srcid [VPN SERVER FQDN] dstid [CLIENT FQDN]
  ike passive from [VPN SERVER IP] to [CLIENT IP] \
    srcid [VPN SERVER FQDN] dstid [CLIENT FQDN]

Considering the lack of "psk <string>", I'd expect authentication to
happen with public key authentication, not keynote credentials.

Any ideas?

-- 
albert chin ([EMAIL PROTECTED])

Reply via email to