Displaying 14 results from an estimated 14 matches for "modp1024".
2016 Apr 01
2
Libreswan PEM format
...pr 01 17:33:44 carneab4.memset.net pluto[15986]: packet from ***
:1024: initial Main Mode message received on ****:500 but no
connection has been authorized with policy RSASIG+IKEV1_ALLOW
The errors are so vague.
Not sure what the problem is now
My conf
conn tunnel
#phase2alg=aes256-sha1;modp1024
keyexchange=ike
#ike=aes256-sha1;modp1024
left=192.168.1.122
leftnexthop=81.129.247.152 # My ISP assigned external ip adresss
(I am testing at home)
leftrsasigkey=0sAQPs3gZ6GBRJSoy/6RxrL/cMv0JnYEKR/SYmXUCVlkBFNi2D7VJsa17ffvmBUjLLD6/T72M31JvlPhkSzK/YSPpoh8hNtSB4IDlD2WGks+hYlnQ...
2016 Apr 01
2
Libreswan PEM format
...****:500 but no
>> connection has been authorized with policy RSASIG+IKEV1_ALLOW
>>
>> The errors are so vague.
>> Not sure what the problem is now
>>
>>
>>
>> My conf
>>
>>
>>
>> conn tunnel
>> #phase2alg=aes256-sha1;modp1024
>> keyexchange=ike
>> #ike=aes256-sha1;modp1024
>> left=192.168.1.122
>> leftnexthop=81.129.247.152 # My ISP assigned external ip adresss
>> (I am testing at home)
>>
>> leftrsasigkey=0sAQPs3gZ6GBRJSoy/6RxrL/cMv0JnYEKR/SYmXUCVlkBFNi2D7VJs...
2004 Sep 04
0
Ipsec and kernel 2.6.8
...te 192.168.1.1
{
exchange_mode main;
my_identifier asn1dn;
peers_identifier asn1dn;
certificate_type x509 "Memphis.public" "Memphis.private";
peers_certfile "Zeus.public";
proposal{
encryption_algorithm 3des;
hash_algorithm sha1;
authentication_method rsasig;
dh_group modp1024; #I don''t understand this option
}
}
sainfo anonymous
{
pfs_group modp1024; #I don''t understand this option
lifetime time 2 min;
encryption_algorithm 3des;
authentication_algorithm hmac_md5;
compression_algorithm deflate;
}
_______________________________________________
LARTC...
2016 Apr 01
0
Libreswan PEM format
...*
> :1024: initial Main Mode message received on ****:500 but no
> connection has been authorized with policy RSASIG+IKEV1_ALLOW
>
> The errors are so vague.
> Not sure what the problem is now
>
>
>
> My conf
>
>
>
> conn tunnel
> #phase2alg=aes256-sha1;modp1024
> keyexchange=ike
> #ike=aes256-sha1;modp1024
> left=192.168.1.122
> leftnexthop=81.129.247.152 # My ISP assigned external ip adresss
> (I am testing at home)
>
> leftrsasigkey=0sAQPs3gZ6GBRJSoy/6RxrL/cMv0JnYEKR/SYmXUCVlkBFNi2D7VJsa17ffvmBUjLLD6/T72M31JvlPhkS...
2016 Apr 01
0
Libreswan PEM format
...policy RSASIG+IKEV1_ALLOW
> >>
> >> The errors are so vague.
> >> Not sure what the problem is now
> >>
> >>
> >>
> >> My conf
> >>
> >>
> >>
> >> conn tunnel
> >> #phase2alg=aes256-sha1;modp1024
> >> keyexchange=ike
> >> #ike=aes256-sha1;modp1024
> >> left=192.168.1.122
> >> leftnexthop=81.129.247.152 # My ISP assigned external ip adresss
> >> (I am testing at home)
> >>
> >>
> leftrsasigkey=0sAQPs3gZ6GBRJ...
2007 Nov 15
2
IPSEC help
Hi,
I am new to ipsec and trying to connect my bsd server with win 2000. I have succeeded to tunnel using pre-shared key. But regarding certificate , I failed to get success.
The following are configuration :
racoon.conf
path certificate "/usr/local/openssl/certs" ;
# "log" specifies logging level. It is followed by either "notify",
2004 Jan 13
3
IPSEC btwn stable and Linksys BEFVP41 stopped working.
...register for ESP
2004-01-13 13:36:39: DEBUG: pfkey.c:371:pfkey_init(): call pfkey_send_register for IPCOMP
2004-01-13 13:36:39: DEBUG: cftoken.l:549:yycf_set_buffer(): reading config file /usr/local/etc/racoon/racoon.conf
2004-01-13 13:36:39: DEBUG: algorithm.c:614:alg_oakley_dhdef(): hmac(modp1024)
2004-01-13 13:36:39: DEBUG: pfkey.c:2310:pk_checkalg(): compression algorithm can not be checked because sadb message doesn't support it.
2004-01-13 13:36:39: DEBUG: grabmyaddr.c:204:grab_myaddrs(): my interface: 64.1.164.95 (fxp0)
2004-01-13 13:36:39: DEBUG: grabmyaddr.c:204:grab_mya...
2006 Jul 20
2
GRE over IPsec Cisco<-> Linux
...ne
plutodebug=none
interfaces=%defaultroute
uniqueids=yes
# Add connections here
conn GDC1
authby=secret
auto=start
left=%defaultroute
leftsourceip=192.168.1.97
leftid=@rx1000test
leftsubnet=192.168.1.96/28
ike=aes128-md5-modp1024
esp=aes128-md5
right=160.96.97.248
rightsubnet=192.168.1.0/28
rightsourceip=192.168.1.1
type=tunnel
pfs=yes
keyingtries=0
#Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf
The IPsec works fine except for the...
2016 Apr 01
5
Libreswan PEM format
Sorry but I have looked for over two days. Trying every command I could find.
There is obviously a misunderstanding somewhere.
After generating a key pair with
ipsec newhostkey --configdir /etc/ipsec.d --output /etc/ipsec.d/my.secrets
I exported to a file with
ipsec showhostkey --ipseckey > file
The man pages says
ipsec showhostkey outputs in ipsec.conf(5) format,
Ie
***.server.net.
2004 Nov 15
1
IPSec tunnel
...psk.txt";
remote 192.168.0.254
{
exchange_mode main;
lifetime time 8 hour; # sec,min,hour
proposal {
encryption_algorithm 3des;
hash_algorithm sha1;
authentication_method pre_shared_key;
dh_group modp1024;
}
}
sainfo address 192.168.10.0/24 any address 192.168.20.0/24 any
{
encryption_algorithm 3des ;
authentication_algorithm hmac_sha1;
compression_algorithm deflate ;
}
---
The configuration for Host B is similar but the other way round..
Thanks in advance,...
2004 Nov 24
0
(no subject)
...peers_identifier user_fqdn "REMOVED";
verify_identifier on;
proposal_check obey;
proposal {
encryption_algorithm 3des;
hash_algorithm sha1;
authentication_method pre_shared_key;
dh_group modp1024;
}
}
sainfo anonymous
{
lifetime time 12 hour;
encryption_algorithm 3des;
authentication_algorithm hmac_md5;
compression_algorithm deflate;
}
now heres my problem.
if I try to ipsec in from the big bad world, sometimes the router responds on...
2004 Nov 24
1
A haunting problem
...peers_identifier user_fqdn "REMOVED";
verify_identifier on;
proposal_check obey;
proposal {
encryption_algorithm 3des;
hash_algorithm sha1;
authentication_method pre_shared_key;
dh_group modp1024;
}
}
sainfo anonymous
{
lifetime time 12 hour;
encryption_algorithm 3des;
authentication_algorithm hmac_md5;
compression_algorithm deflate;
}
now here''s my problem.
if I try to ipsec in from the big bad world, sometimes the router re...
2004 Apr 27
2
IPsec works, but racoon/IKE does not
...20040408a
2004-04-27 20:52:14: INFO: main.c:174:main(): @(#)internal version
20001216 sakane@kame.net
2004-04-27 20:52:14: INFO: main.c:175:main(): @(#)This product linked
OpenSSL 0.9.7c-p1 30 Sep 2003 (http://www.openssl.org/)
2004-04-27 20:52:14: DEBUG: algorithm.c:614:alg_oakley_dhdef():
hmac(modp1024)
2004-04-27 20:52:14: DEBUG: pfkey.c:2379:pk_checkalg(): compression
algorithm can not be checked because sadb message doesn't suppo
rt it.
2004-04-27 20:52:14: INFO: isakmp.c:1368:isakmp_open(): 10.0.0.1[500]
used as isakmp port (fd=5)
2004-04-27 20:52:14: DEBUG: pfkey.c:197:pfkey_handler():...
2004 Jul 26
1
Cisco IOS and racoon
...7-26 16:23:15: DEBUG2: cfparse.y:1320:expand_isakmpspec():
1024-bit MODP group(2)
2004-07-26 16:23:15: DEBUG2: cfparse.y:1320:expand_isakmpspec():
pre-shared key(1)
2004-07-26 16:23:15: DEBUG2: cfparse.y:1327:expand_isakmpspec():
2004-07-26 16:23:15: DEBUG: algorithm.c:614:alg_oakley_dhdef():
hmac(modp1024)
2004-07-26 16:23:15: DEBUG2: cftoken.l:207:yylex(): begin <21>sainfo
2004-07-26 16:23:15: DEBUG2: cftoken.l:208:yylex(): <21>
2004-07-26 16:23:15: DEBUG2: cftoken.l:216:yylex(): <23>
2004-07-26 16:23:15: DEBUG2: cftoken.l:390:yylex(): <23>
2004-07-26 16:23:15: DEBUG2: cftok...