psk works from all shoppers however we’re making an attempt to maneuver as much as certificates, which work nice from linux and android however not but from both macOS or ios. if anybody can provide any perception or pointers that will be most welcome!
With leftid/leftca/rightid/rightca constraints, linux and android are positive, however when both ios16.7.11 or macos15.6.1 makes an attempt to attach with both pubkey/pubkey or pubkey/eap-tls the er-x logs no matching peer config discovered
.
With extra conns permitting %any for varied mixtures of leftid/leftca/rightid/rightca, ios falls previous any conn that defines leftid or rightid and settles on a conn that defines leftca and rightca, however there..
For pubkey/pubkey auth the er-x logs no trusted RSA public key discovered for
.
For pubkey/eap-tls auth the er-x logs no personal key discovered for 'CN=vpn2'
.
Working shoppers are utilizing pubkey/pubkey auth, and for them the er-x logs:
12[IKE] authentication of 'CN=v3.burdock' with RSA_EMSA_PKCS1_SHA2_384 profitable
12[IKE] authentication of 'CN=vpn2' (myself) with RSA_EMSA_PKCS1_SHA2_384 profitable
Working shoppers are opensuse tumbleweed strongswan6.0.1-3.1 and android14go strongswan2.5.6. CA and all keys, certs, and .p12 had been generated on rhel9 openssl genrsa/req/x509/pkcs12.
To setup macOS or ios i ready .mobileconfig, an instance is beneath the er-x logs..
The er-x v2.0.9-hotfix.7 is setup as ikev2 responder with no radius:
edgeOS set vpn ipsec settings:
set vpn ipsec allow-access-to-local-interface disable
set vpn ipsec auto-firewall-nat-exclude disable
set vpn ipsec include-ipsec-conf /config/user-data/strongciphers
set vpn ipsec include-ipsec-secrets /config/user-data/secrets and techniques
set vpn ipsec ipsec-interfaces interface eth0
set vpn ipsec nat-traversal allow
/config/user-data/strongciphers:
conn %default
left=
leftsubnet=
rightsourceip=
fragmentation=sure
keyexchange=ikev2
ike=!
esp=!
inactivity=345600
dpdaction=maintain
kind=tunnel
auto=add
conn ocp
leftcert=/config/user-data/vCN2.crt
leftid="CN=vpn2"
leftca="C=us/ST=minnesota/O=Issue of 4/CN=fo4"
rightca="C=us/ST=minnesota/O=Issue of 4/CN=fo4"
rightid="C=us, ST=minnesota, O=Issue of 4, CN=cp10s"
rightauth=pubkey
leftauth=pubkey
conn ob1
additionally=ocp
rightid="CN=v3.burdock"
conn ma0
additionally=ocp
rightid="CN=v0.andymac"
conn i8k
additionally=ocp
rightid="CN=v35.mgi8"
Extra conns to see what constraints are failing:
conn leftca+rightca+leftid
additionally=ocp
rightid=%any
conn leftca+rightca+rightid
additionally=leftca+rightca
rightid="CN=v35.mgi8"
conn leftca+leftid
additionally=leftca+rightca+leftid
rightca=%any
conn rightca+rightid
additionally=leftca+rightca+rightid
leftca=%any
conn leftca+rightca
proper=75.168.201.4
rightid=%any
rightca="C=us/ST=minnesota/O=Issue of 4/CN=fo4"
leftca="C=us/ST=minnesota/O=Issue of 4/CN=fo4"
leftid=%any
leftauth=pubkey
rightauth=pubkey
Extra conns to attempt eap-tls auth:
conn iet
additionally=i8k
rightauth=eap-tls
eap_identity=%identification
rightsendcert=at all times
leftsendcert=at all times
conn leftca+rightca+leftid+eap-tls
additionally=leftca+rightca+leftid
rightauth=eap-tls
eap_identity=%any
conn leftca+rightca+rightid+eap-tls
additionally=leftca+rightca+rightid
rightauth=eap-tls
eap_identity=%any
conn leftca+leftid+eap-tls
additionally=leftca+leftid
rightauth=eap-tls
eap_identity=%any
conn rightca+rightid+eap-tls
additionally=rightca+rightid
rightauth=eap-tls
eap_identity=%any
conn leftca+rightca+eap-tls
additionally=leftca+rightca
rightauth=eap-tls
eap_identity=%any
linux strongswan success:
2025-09-02Tue15:26:33.829442250 11[IKE] sending cert request for "C=us, ST=minnesota, O=Issue of 4, CN=fo4"
2025-09-02Tue15:26:33.932254294 12[IKE] acquired cert request for "C=us, ST=minnesota, O=Issue of 4, CN=fo4"
2025-09-02Tue15:26:33.941238479 12[IKE] acquired finish entity cert "CN=v3.burdock"
2025-09-02Tue15:26:33.951721700 12[CFG] chosen peer config 'ob1'
2025-09-02Tue15:26:33.962570545 12[CFG] searching for peer configs matching 209.23.153.218[CN=vpn2]...75.168.201.4[CN=v3.burdock]
2025-09-02Tue15:26:33.972918228 12[CFG] utilizing certificates "CN=v3.burdock"
2025-09-02Tue15:26:33.983016733 12[CFG] utilizing trusted ca certificates "C=us, ST=minnesota, O=Issue of 4, CN=fo4"
2025-09-02Tue15:26:33.993417055 12[CFG] checking certificates standing of "CN=v3.burdock"
2025-09-02Tue15:26:34.003503771 12[CFG] certificates standing is just not out there
2025-09-02Tue15:26:34.013905703 12[CFG] reached self-signed root ca with a path size of 0
2025-09-02Tue15:26:34.024131190 12[IKE] authentication of 'CN=v3.burdock' with RSA_EMSA_PKCS1_SHA2_384 profitable
2025-09-02Tue15:26:34.590868572 12[IKE] authentication of 'CN=vpn2' (myself) with RSA_EMSA_PKCS1_SHA2_384 profitable
2025-09-02Tue15:26:34.599865476 12[IKE] IKE_SA ob1[1] established between 209.23.153.218[CN=vpn2]...75.168.201.4[CN=v3.burdock]
2025-09-02Tue15:26:34.626143424 12[IKE] sending finish entity cert "CN=vpn2"
2025-09-02Tue15:26:34.643871279 12[CFG] assigning new lease to 'CN=v3.burdock'
2025-09-02Tue15:26:34.652668319 12[IKE] assigning digital IP 192.168.128.232 to see 'CN=v3.burdock'
2025-09-02Tue15:26:34.661558280 12[IKE] CHILD_SA ob1{1} established with SPIs c5f6d310_i c639e9c2_o and TS 192.168.128.0/21 === 192.168.128.232/32
macOS pubkey/pubkey fail with out extra conns:
2025-09-02Tue17:33:00.971136240 10[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
2025-09-02Tue17:33:01.582956854 10[IKE] sending cert request for "C=us, ST=minnesota, O=Issue of 4, CN=fo4"
2025-09-02Tue17:33:01.591894784 10[ENC] producing IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
2025-09-02Tue17:33:01.801170091 07[ENC] unknown attribute kind (25)
2025-09-02Tue17:33:01.810754323 07[ENC] parsed IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) IDr AUTH CPRQ(ADDR MASK DHCP DNS ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr N(MOBIKE_SUP) ]
2025-09-02Tue17:33:01.819981944 07[IKE] acquired finish entity cert "CN=v0.andymac"
2025-09-02Tue17:33:01.828913602 07[CFG] searching for peer configs matching 209.23.153.218[CN=vpn2]...216.161.16.228[CN=v0.andymac]
2025-09-02Tue17:33:01.837854638 07[CFG] no matching peer config discovered
macOS pubkey/eap-tls fail with out extra conns:
2025-09-02Tue17:33:52.938130654 13[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
2025-09-02Tue17:33:53.558368423 13[IKE] sending cert request for "C=us, ST=minnesota, O=Issue of 4, CN=fo4"
2025-09-02Tue17:33:53.568995315 13[ENC] producing IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
2025-09-02Tue17:33:53.597353294 14[ENC] unknown attribute kind (25)
2025-09-02Tue17:33:53.606563740 14[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr CPRQ(ADDR MASK DHCP DNS ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr N(MOBIKE_SUP) ]
2025-09-02Tue17:33:53.615827286 14[CFG] searching for peer configs matching 209.23.153.218[CN=vpn2]...216.161.16.228[CN=v0.andymac]
2025-09-02Tue17:33:53.624648306 14[CFG] no matching peer config discovered
ios pubkey/pubkey fail with extra conns:
2025-09-02Tue14:56:09.977252160 15[IKE] sending cert request for "C=us, ST=minnesota, O=Issue of 4, CN=fo4"
2025-09-02Tue14:56:10.255344044 14[IKE] acquired finish entity cert "CN=v35.mgi8"
2025-09-02Tue14:56:10.264680500 14[CFG] searching for peer configs matching 209.23.153.218[CN=vpn2]...75.168.201.4[CN=v35.mgi8]
2025-09-02Tue14:56:10.274140569 14[CFG] chosen peer config 'leftca+rightca'
2025-09-02Tue14:56:10.283629794 14[IKE] no trusted RSA public key discovered for 'CN=v35.mgi8'
ios pubkey/eap-tls fail with extra conns:
2025-09-02Tue14:59:42.466288610 04[IKE] sending cert request for "C=us, ST=minnesota, O=Issue of 4, CN=fo4"
2025-09-02Tue14:59:42.542169258 11[CFG] searching for peer configs matching 209.23.153.218[CN=vpn2]...75.168.201.4[CN=v35.mgi8]
2025-09-02Tue14:59:42.551241540 11[CFG] chosen peer config 'leftca+rightca'
2025-09-02Tue14:59:42.561625241 11[IKE] peer requested EAP, config inacceptable
2025-09-02Tue14:59:42.572299465 11[CFG] switching to see config 'leftca+rightca+eap-tls'
2025-09-02Tue14:59:42.611799700 11[IKE] no personal key discovered for 'CN=vpn2'
.mobileconfig:
PayloadDisplayName v35.mgi8 fo4 vpn
PayloadIdentifier vpn.fo4.profile.v35.mgi8
PayloadType Configuration
PayloadUUID 1359f5c7-de90-4bf8-ab46-cf9c135aa2bb
PayloadVersion 1
PayloadContent
PayloadCertificateFileName fo4.ca.crt
PayloadContent ...
PayloadDescription fo4 CA
PayloadDisplayName fo4 CA
PayloadIdentifier vpn.fo4.ca.v35.mgi8
PayloadType com.apple.safety.root
PayloadUUID 7f9b98a2-c485-4b5b-be64-b44e3ca9e7f8
PayloadVersion 1
PayloadCertificateFileName mgi8.p12
PayloadContent ...
PayloadDescription mgi8 Shopper Id(Cert+Key)
PayloadDisplayName v35.mgi8
PayloadIdentifier vpn.fo4.clientidentity.v35.mgi8
PayloadType com.apple.safety.pkcs12
PayloadUUID ae52c04c-17fa-41b4-8973-8aaac7ec5877
PayloadVersion 1
IKEv2
AuthenticationMethod Certificates
ExtendedAuthEnabled 0
LocalIdentifier CN=v35.mgi8
RemoteIdentifier CN=vpn1
RemoteAddress 209.23.153.217
PayloadCertificateUUID ae52c04c-17fa-41b4-8973-8aaac7ec5877
OnDemandEnabled 0
UserDefinedName v35kk.vpn1
PayloadDescription v35kk.vpn1
PayloadDisplayName v35kk.vpn1
PayloadIdentifier vpn.fo4.v35kk.vpn1.mgi8
PayloadType com.apple.vpn.managed
PayloadUUID be1f0300-4296-4a57-99a8-7d04c95395ec
PayloadVersion 1
VPNType IKEv2
IKEv2
AuthenticationMethod Certificates
ExtendedAuthEnabled 1
LocalIdentifier CN=v35.mgi8
RemoteIdentifier CN=vpn1
RemoteAddress 209.23.153.217
PayloadCertificateUUID ae52c04c-17fa-41b4-8973-8aaac7ec5877
OnDemandEnabled 0
UserDefinedName v35et.vpn1
PayloadDescription v35et.vpn1
PayloadDisplayName v35et.vpn1
PayloadIdentifier vpn.fo4.v35et.vpn1.mgi8
PayloadType com.apple.vpn.managed
PayloadUUID e87a04d2-88e4-41af-8567-e21d8f18042e
PayloadVersion 1
VPNType IKEv2
IKEv2
AuthenticationMethod Certificates
ExtendedAuthEnabled 0
LocalIdentifier CN=v35.mgi8
RemoteIdentifier CN=vpn2
RemoteAddress 209.23.153.218
PayloadCertificateUUID ae52c04c-17fa-41b4-8973-8aaac7ec5877
OnDemandEnabled 0
UserDefinedName v35kk.vpn2
PayloadDescription v35kk.vpn2
PayloadDisplayName v35kk.vpn2
PayloadIdentifier vpn.fo4.v35kk.vpn2.mgi8
PayloadType com.apple.vpn.managed
PayloadUUID 97b53a13-c6a5-4d1a-ae01-29acbc7d5c7e
PayloadVersion 1
VPNType IKEv2
IKEv2
AuthenticationMethod Certificates
ExtendedAuthEnabled 1
LocalIdentifier CN=v35.mgi8
RemoteIdentifier CN=vpn2
RemoteAddress 209.23.153.218
PayloadCertificateUUID ae52c04c-17fa-41b4-8973-8aaac7ec5877
OnDemandEnabled 0
UserDefinedName v35et.vpn2
PayloadDescription v35et.vpn2
PayloadDisplayName v35et.vpn2
PayloadIdentifier vpn.fo4.v35et.vpn2.mgi8
PayloadType com.apple.vpn.managed
PayloadUUID 5cc916f3-bdd6-4ba0-91c6-1ce76da1f567
PayloadVersion 1
VPNType IKEv2