I imported certificates to Android and Astaro ASG but I keep getting errors in logs. I thought that it might be a problem with external certificates so I tried to use certs generated by ASG. I had problem with exporting user certificate. First of all Android doesn't accept chained PKCS#12. I followed a guide to unchain the PKCS#12, but apparently there was password mismatch between the one I declared in ASG for exported user-account certificate and during the process of unpacking PKCS#12 with openssl. Seems like an Astaro bug to me. I created another certificate and that one didn't have password problem. I tested following three pairs of certificates:
1. Original certs (DN type)
2. Built-in ASG user certificates (e-mail type)
3. Self-generated in ASG user certificates (IP type)
Second pair couldn't be tested, because as I mentioned above it wasn't possible to export user certificate to Android Smartphone.
The communication looks as follows:
Android -> Wi-Fi Router -> ADSL connection (Internet) -> Astaro ASG
192.168.1.104 -> (Internal IP 192.168.1.1, External IP 83.20.75.202) -> 170.170.170.170 (Astaro ASG)
Android is behind NAT set up on Wi-Fi router. ASG has external public IP in completely different network.
Logs for first pair of certificates are pasted below:
2011:02:14-12:20:20 asg pluto[1047]: packet from 83.20.75.202:500: received Vendor ID payload [RFC 3947]
2011:02:14-12:20:20 asg pluto[1047]: packet from 83.20.75.202:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
2011:02:14-12:20:20 asg pluto[1047]: packet from 83.20.75.202:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
2011:02:14-12:20:20 asg pluto[1047]: packet from 83.20.75.202:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
2011:02:14-12:20:20 asg pluto[1047]: packet from 83.20.75.202:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
2011:02:14-12:20:20 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: responding to Main Mode from unknown peer 83.20.75.202
2011:02:14-12:20:20 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: NAT-Traversal: Result using RFC 3947: peer is NATed
2011:02:14-12:20:20 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: Peer ID is ID_IPV4_ADDR: '192.168.1.104'
2011:02:14-12:20:20 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: crl not found
2011:02:14-12:20:20 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: certificate status unknown
2011:02:14-12:20:20 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: no public key known for '192.168.1.104'
2011:02:14-12:20:20 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: sending encrypted notification INVALID_KEY_INFORMATION to 83.20.75.202:500
2011:02:14-12:20:30 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: Peer ID is ID_IPV4_ADDR: '192.168.1.104'
2011:02:14-12:20:30 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: crl not found
2011:02:14-12:20:30 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: certificate status unknown
2011:02:14-12:20:30 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: no public key known for '192.168.1.104'
2011:02:14-12:20:30 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: sending encrypted notification INVALID_KEY_INFORMATION to 83.20.75.202:500
2011:02:14-12:20:40 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: Peer ID is ID_IPV4_ADDR: '192.168.1.104'
2011:02:14-12:20:40 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: crl not found
2011:02:14-12:20:40 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: certificate status unknown
2011:02:14-12:20:40 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: no public key known for '192.168.1.104'
2011:02:14-12:20:40 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: sending encrypted notification INVALID_KEY_INFORMATION to 83.20.75.202:500
2011:02:14-12:20:50 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: Peer ID is ID_IPV4_ADDR: '192.168.1.104'
2011:02:14-12:20:50 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: crl not found
2011:02:14-12:20:50 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: certificate status unknown
2011:02:14-12:20:50 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: no public key known for '192.168.1.104'
2011:02:14-12:20:50 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: sending encrypted notification INVALID_KEY_INFORMATION to 83.20.75.202:500
2011:02:14-12:21:30 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202 #5: max number of retransmissions (2) reached STATE_MAIN_R2
2011:02:14-12:21:30 asg pluto[1047]: "D_REF_KQynzieBcy"[1] 83.20.75.202: deleting connection "D_REF_KQynzieBcy" instance with peer 83.20.75.202 {isakmp=#0/ipsec=#0}
The questions is, is it possible to have Remote VPN IPSec/L2TP (with Certs!) working with Android at all?
This thread was automatically locked due to age.