search for: modp1024

Displaying 14 results from an estimated 14 matches for "modp1024".

2016 Apr 01
2
Libreswan PEM format
...pr 01 17:33:44 carneab4.memset.net pluto[15986]: packet from *** :1024: initial Main Mode message received on ****:500 but no connection has been authorized with policy RSASIG+IKEV1_ALLOW The errors are so vague. Not sure what the problem is now My conf conn tunnel #phase2alg=aes256-sha1;modp1024 keyexchange=ike #ike=aes256-sha1;modp1024 left=192.168.1.122 leftnexthop=81.129.247.152 # My ISP assigned external ip adresss (I am testing at home) leftrsasigkey=0sAQPs3gZ6GBRJSoy/6RxrL/cMv0JnYEKR/SYmXUCVlkBFNi2D7VJsa17ffvmBUjLLD6/T72M31JvlPhkSzK/YSPpoh8hNtSB4IDlD2WGks+hYlnQ...
2016 Apr 01
2
Libreswan PEM format
...****:500 but no >> connection has been authorized with policy RSASIG+IKEV1_ALLOW >> >> The errors are so vague. >> Not sure what the problem is now >> >> >> >> My conf >> >> >> >> conn tunnel >> #phase2alg=aes256-sha1;modp1024 >> keyexchange=ike >> #ike=aes256-sha1;modp1024 >> left=192.168.1.122 >> leftnexthop=81.129.247.152 # My ISP assigned external ip adresss >> (I am testing at home) >> >> leftrsasigkey=0sAQPs3gZ6GBRJSoy/6RxrL/cMv0JnYEKR/SYmXUCVlkBFNi2D7VJs...
2004 Sep 04
0
Ipsec and kernel 2.6.8
...te 192.168.1.1 { exchange_mode main; my_identifier asn1dn; peers_identifier asn1dn; certificate_type x509 "Memphis.public" "Memphis.private"; peers_certfile "Zeus.public"; proposal{ encryption_algorithm 3des; hash_algorithm sha1; authentication_method rsasig; dh_group modp1024; #I don''t understand this option } } sainfo anonymous { pfs_group modp1024; #I don''t understand this option lifetime time 2 min; encryption_algorithm 3des; authentication_algorithm hmac_md5; compression_algorithm deflate; } _______________________________________________ LARTC...
2016 Apr 01
0
Libreswan PEM format
...* > :1024: initial Main Mode message received on ****:500 but no > connection has been authorized with policy RSASIG+IKEV1_ALLOW > > The errors are so vague. > Not sure what the problem is now > > > > My conf > > > > conn tunnel > #phase2alg=aes256-sha1;modp1024 > keyexchange=ike > #ike=aes256-sha1;modp1024 > left=192.168.1.122 > leftnexthop=81.129.247.152 # My ISP assigned external ip adresss > (I am testing at home) > > leftrsasigkey=0sAQPs3gZ6GBRJSoy/6RxrL/cMv0JnYEKR/SYmXUCVlkBFNi2D7VJsa17ffvmBUjLLD6/T72M31JvlPhkS...
2016 Apr 01
0
Libreswan PEM format
...policy RSASIG+IKEV1_ALLOW > >> > >> The errors are so vague. > >> Not sure what the problem is now > >> > >> > >> > >> My conf > >> > >> > >> > >> conn tunnel > >> #phase2alg=aes256-sha1;modp1024 > >> keyexchange=ike > >> #ike=aes256-sha1;modp1024 > >> left=192.168.1.122 > >> leftnexthop=81.129.247.152 # My ISP assigned external ip adresss > >> (I am testing at home) > >> > >> > leftrsasigkey=0sAQPs3gZ6GBRJ...
2007 Nov 15
2
IPSEC help
Hi, I am new to ipsec and trying to connect my bsd server with win 2000. I have succeeded to tunnel using pre-shared key. But regarding certificate , I failed to get success. The following are configuration : racoon.conf path certificate "/usr/local/openssl/certs" ; # "log" specifies logging level. It is followed by either "notify",
2004 Jan 13
3
IPSEC btwn stable and Linksys BEFVP41 stopped working.
...register for ESP 2004-01-13 13:36:39: DEBUG: pfkey.c:371:pfkey_init(): call pfkey_send_register for IPCOMP 2004-01-13 13:36:39: DEBUG: cftoken.l:549:yycf_set_buffer(): reading config file /usr/local/etc/racoon/racoon.conf 2004-01-13 13:36:39: DEBUG: algorithm.c:614:alg_oakley_dhdef(): hmac(modp1024) 2004-01-13 13:36:39: DEBUG: pfkey.c:2310:pk_checkalg(): compression algorithm can not be checked because sadb message doesn't support it. 2004-01-13 13:36:39: DEBUG: grabmyaddr.c:204:grab_myaddrs(): my interface: 64.1.164.95 (fxp0) 2004-01-13 13:36:39: DEBUG: grabmyaddr.c:204:grab_mya...
2006 Jul 20
2
GRE over IPsec Cisco<-> Linux
...ne plutodebug=none interfaces=%defaultroute uniqueids=yes # Add connections here conn GDC1 authby=secret auto=start left=%defaultroute leftsourceip=192.168.1.97 leftid=@rx1000test leftsubnet=192.168.1.96/28 ike=aes128-md5-modp1024 esp=aes128-md5 right=160.96.97.248 rightsubnet=192.168.1.0/28 rightsourceip=192.168.1.1 type=tunnel pfs=yes keyingtries=0 #Disable Opportunistic Encryption include /etc/ipsec.d/examples/no_oe.conf The IPsec works fine except for the...
2016 Apr 01
5
Libreswan PEM format
Sorry but I have looked for over two days. Trying every command I could find. There is obviously a misunderstanding somewhere. After generating a key pair with ipsec newhostkey --configdir /etc/ipsec.d --output /etc/ipsec.d/my.secrets I exported to a file with ipsec showhostkey --ipseckey > file The man pages says ipsec showhostkey outputs in ipsec.conf(5) format, Ie ***.server.net.
2004 Nov 15
1
IPSec tunnel
...psk.txt"; remote 192.168.0.254 { exchange_mode main; lifetime time 8 hour; # sec,min,hour proposal { encryption_algorithm 3des; hash_algorithm sha1; authentication_method pre_shared_key; dh_group modp1024; } } sainfo address 192.168.10.0/24 any address 192.168.20.0/24 any { encryption_algorithm 3des ; authentication_algorithm hmac_sha1; compression_algorithm deflate ; } --- The configuration for Host B is similar but the other way round.. Thanks in advance,...
2004 Nov 24
0
(no subject)
...peers_identifier user_fqdn "REMOVED"; verify_identifier on; proposal_check obey; proposal { encryption_algorithm 3des; hash_algorithm sha1; authentication_method pre_shared_key; dh_group modp1024; } } sainfo anonymous { lifetime time 12 hour; encryption_algorithm 3des; authentication_algorithm hmac_md5; compression_algorithm deflate; } now here’s my problem. if I try to ipsec in from the big bad world, sometimes the router responds on...
2004 Nov 24
1
A haunting problem
...peers_identifier user_fqdn "REMOVED"; verify_identifier on; proposal_check obey; proposal { encryption_algorithm 3des; hash_algorithm sha1; authentication_method pre_shared_key; dh_group modp1024; } } sainfo anonymous { lifetime time 12 hour; encryption_algorithm 3des; authentication_algorithm hmac_md5; compression_algorithm deflate; } now here''s my problem. if I try to ipsec in from the big bad world, sometimes the router re...
2004 Apr 27
2
IPsec works, but racoon/IKE does not
...20040408a 2004-04-27 20:52:14: INFO: main.c:174:main(): @(#)internal version 20001216 sakane@kame.net 2004-04-27 20:52:14: INFO: main.c:175:main(): @(#)This product linked OpenSSL 0.9.7c-p1 30 Sep 2003 (http://www.openssl.org/) 2004-04-27 20:52:14: DEBUG: algorithm.c:614:alg_oakley_dhdef(): hmac(modp1024) 2004-04-27 20:52:14: DEBUG: pfkey.c:2379:pk_checkalg(): compression algorithm can not be checked because sadb message doesn't suppo rt it. 2004-04-27 20:52:14: INFO: isakmp.c:1368:isakmp_open(): 10.0.0.1[500] used as isakmp port (fd=5) 2004-04-27 20:52:14: DEBUG: pfkey.c:197:pfkey_handler():...
2004 Jul 26
1
Cisco IOS and racoon
...7-26 16:23:15: DEBUG2: cfparse.y:1320:expand_isakmpspec(): 1024-bit MODP group(2) 2004-07-26 16:23:15: DEBUG2: cfparse.y:1320:expand_isakmpspec(): pre-shared key(1) 2004-07-26 16:23:15: DEBUG2: cfparse.y:1327:expand_isakmpspec(): 2004-07-26 16:23:15: DEBUG: algorithm.c:614:alg_oakley_dhdef(): hmac(modp1024) 2004-07-26 16:23:15: DEBUG2: cftoken.l:207:yylex(): begin <21>sainfo 2004-07-26 16:23:15: DEBUG2: cftoken.l:208:yylex(): <21> 2004-07-26 16:23:15: DEBUG2: cftoken.l:216:yylex(): <23> 2004-07-26 16:23:15: DEBUG2: cftoken.l:390:yylex(): <23> 2004-07-26 16:23:15: DEBUG2: cftok...