When is it planned we can test ROS v7 ?It is planned in ROS v7
touchéWhen it's ready
I do not consider that answer by Mikrotik staff as respectful. I do not think it is funny to reply in this way to paying customers.When it's ready
by mrz » Thu Oct 16, 2014 11:23 amAs it was mentioned earlier in this topic
ROS v7.
More than one year later...As it was mentioned earlier in this topic
ROS v7.
I work in Healthcare, with more than 250 companies including all of the insurance companies, and 13 hospitals.. Not a single one uses IKEv2. Not even testing it. As far as healthcare and insurance is concerned, IPSec with PFS is still the standard.IkeV2 is the new standard in almost all communications between organisations. We NEEEEEEEEEEEEEEEEED it.
In Germany Healthcare is the most insecureplace. Everytime i work with healtcare i need to throw security out of the window. F.e we need to have local admins on Terminalservers and Clients, IExplorer not higher than 8 with a lot of securitysettings disabled, because of the Healthcaresoftware that works so badly on secured systems (Or the developer does not know to configure it). We even have Windows XP Machines, because drivers are only running on XP for medical machines. In Healthcare in Germany there is no concern about security as long there is no lawbreaking. So we still send sensitive information mostly by fax, as IP/Mail etc aren't secure. Fax over VOIP ? No Problem as long as it is fax.I work in Healthcare, with more than 250 companies including all of the insurance companies, and 13 hospitals.. Not a single one uses IKEv2. Not even testing it. As far as healthcare and insurance is concerned, IPSec with PFS is still the standard.IkeV2 is the new standard in almost all communications between organisations. We NEEEEEEEEEEEEEEEEED it.
+1000Please provide the ETA for ROS v7. IKEv2 is critically needed.
That is certainly encouraging, I'll have to test that out.What's new in 6.38rc24 (2016-Nov-03 13:01):
!) ipsec - added IKEv1 xauth user authentication with RADIUS "/ip ipsec user settings set radius=yes" (cli only);
!) ipsec - added IKEv2 experimental support with pre-shared-key and rsa-signature authentication methods (cli only);
Can U help with cli setup? I don't have enough knowledge to make it work's...That is certainly encouraging, I'll have to test that out.
I'm here... Can I have test cli config for test?Hello, where is everybody? There were so many requests that ikev2 is essential. Any feedback?
I'm happy. It works for site2site.Hello, where is everybody? There were so many requests that ikev2 is essential. Any feedback?
/ip ipsec proposal
add auth-algorithms=sha256,sha1 enc-algorithms=aes-256-cbc,aes-128-cbc,3des \
name=VPN pfs-group=none
/ip ipsec peer
add address=10.1.0.1/32 dpd-interval=disable-dpd enc-algorithm=\
aes-256,aes-128,3des exchange-mode=ike2 hash-algorithm=sha256 \
nat-traversal=no secret=TEST
/ip ipsec policy
add dst-address=192.168.170.0/24 proposal=VPN sa-dst-address=10.1.0.1 \
sa-src-address=10.0.0.1 src-address=192.168.160.0/24 tunnel=yes
/ip ipsec proposal
add auth-algorithms=sha256,sha1 enc-algorithms=aes-256-cbc,aes-128-cbc,3des \
name=VPN pfs-group=none
/ip ipsec peer
add address=10.0.0.1/32 dpd-interval=disable-dpd enc-algorithm=\
aes-256,aes-128,3des exchange-mode=ike2 hash-algorithm=sha256 \
nat-traversal=no passive=yes secret=TEST
/ip ipsec policy
add dst-address=192.168.160.0/24 proposal=VPN sa-dst-address=10.0.0.1 \
sa-src-address=10.1.0.1 src-address=192.168.170.0/24 tunnel=yes
Nov/10/2016 17:02:51 ipsec,debug,packet ===
Nov/10/2016 17:02:51 ipsec,debug initiate new phase 1 negotiation: 10.0.0.1[500]<=>10.1.0.1[500]
Nov/10/2016 17:02:51 ipsec,debug begin Base mode.
Nov/10/2016 17:02:51 ipsec,debug,packet new cookie:
Nov/10/2016 17:02:51 ipsec,debug,packet 5e8fc30a7e4f5c87
Nov/10/2016 17:02:51 ipsec,debug,packet use ID type of IPv4_address
Nov/10/2016 17:02:51 ipsec,debug,packet add payload of len 132, next type 5
Nov/10/2016 17:02:51 ipsec,debug,packet add payload of len 8, next type 10
Nov/10/2016 17:02:51 ipsec,debug,packet add payload of len 24, next type 13
Nov/10/2016 17:02:51 ipsec,debug,packet add payload of len 16, next type 13
Nov/10/2016 17:02:51 ipsec,debug,packet add payload of len 16, next type 0
Nov/10/2016 17:02:51 ipsec,debug,packet 244 bytes from 10.0.0.1[500] to 10.1.0.1[500]
Nov/10/2016 17:02:51 ipsec,debug,packet sockname 10.0.0.1[500]
Nov/10/2016 17:02:51 ipsec,debug,packet send packet from 10.0.0.1[500]
Nov/10/2016 17:02:51 ipsec,debug,packet send packet to 10.1.0.1[500]
Nov/10/2016 17:02:51 ipsec,debug,packet src4 10.0.0.1[500]
Nov/10/2016 17:02:51 ipsec,debug,packet dst4 10.1.0.1[500]
Nov/10/2016 17:02:51 ipsec,debug,packet 1 times of 244 bytes message will be sent to 10.1.0.1[500]
Nov/10/2016 17:02:51 ipsec,debug,packet 5e8fc30a 7e4f5c87 00000000 00000000 01100100 00000000 000000f4 05000088
Nov/10/2016 17:02:51 ipsec,debug,packet 00000001 00000001 0000007c 01010003 03000028 01010000 800b0001 000c0004
Nov/10/2016 17:02:51 ipsec,debug,packet 00015180 80010007 800e0100 80030001 80020004 80040002 03000028 02010000
Nov/10/2016 17:02:51 ipsec,debug,packet 800b0001 000c0004 00015180 80010007 800e0080 80030001 80020004 80040002
Nov/10/2016 17:02:51 ipsec,debug,packet 00000024 03010000 800b0001 000c0004 00015180 80010005 80030001 80020004
Nov/10/2016 17:02:51 ipsec,debug,packet 80040002 0a00000c 011101f4 0a000001 0d00001c ae6efbcf e7be99bb 23e20de7
Nov/10/2016 17:02:51 ipsec,debug,packet 5510f1cf d88d743e 0c00fd33 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100
Nov/10/2016 17:02:51 ipsec,debug,packet 00000014 afcad713 68a1f1c9 6b8696fc 77570100
Nov/10/2016 17:02:51 ipsec,debug sent phase1 packet 10.0.0.1[500]<=>10.1.0.1[500] 5e8fc30a7e4f5c87:0000000000000000
Nov/10/2016 17:03:01 ipsec,debug,packet 244 bytes from 10.0.0.1[500] to 10.1.0.1[500]
Nov/10/2016 17:03:01 ipsec,debug,packet sockname 10.0.0.1[500]
Nov/10/2016 17:03:01 ipsec,debug,packet send packet from 10.0.0.1[500]
Nov/10/2016 17:03:01 ipsec,debug,packet send packet to 10.1.0.1[500]
Nov/10/2016 17:03:01 ipsec,debug,packet src4 10.0.0.1[500]
Nov/10/2016 17:03:01 ipsec,debug,packet dst4 10.1.0.1[500]
Nov/10/2016 17:03:01 ipsec,debug,packet 1 times of 244 bytes message will be sent to 10.1.0.1[500]
Nov/10/2016 17:03:01 ipsec,debug,packet 5e8fc30a 7e4f5c87 00000000 00000000 01100100 00000000 000000f4 05000088
Nov/10/2016 17:03:01 ipsec,debug,packet 00000001 00000001 0000007c 01010003 03000028 01010000 800b0001 000c0004
Nov/10/2016 17:03:01 ipsec,debug,packet 00015180 80010007 800e0100 80030001 80020004 80040002 03000028 02010000
Nov/10/2016 17:03:01 ipsec,debug,packet 800b0001 000c0004 00015180 80010007 800e0080 80030001 80020004 80040002
Nov/10/2016 17:03:01 ipsec,debug,packet 00000024 03010000 800b0001 000c0004 00015180 80010005 80030001 80020004
Nov/10/2016 17:03:01 ipsec,debug,packet 80040002 0a00000c 011101f4 0a000001 0d00001c ae6efbcf e7be99bb 23e20de7
Nov/10/2016 17:03:01 ipsec,debug,packet 5510f1cf d88d743e 0c00fd33 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100
Nov/10/2016 17:03:01 ipsec,debug,packet 00000014 afcad713 68a1f1c9 6b8696fc 77570100
Nov/10/2016 17:03:01 ipsec,debug resent phase1 packet 10.0.0.1[500]<=>10.1.0.1[500] 5e8fc30a7e4f5c87:0000000000000000
Nov/10/2016 17:03:11 ipsec,debug,packet 244 bytes from 10.0.0.1[500] to 10.1.0.1[500]
Nov/10/2016 17:03:11 ipsec,debug,packet sockname 10.0.0.1[500]
Nov/10/2016 17:03:11 ipsec,debug,packet send packet from 10.0.0.1[500]
Nov/10/2016 17:03:11 ipsec,debug,packet send packet to 10.1.0.1[500]
Nov/10/2016 17:03:11 ipsec,debug,packet src4 10.0.0.1[500]
Nov/10/2016 17:03:11 ipsec,debug,packet dst4 10.1.0.1[500]
Nov/10/2016 17:03:11 ipsec,debug,packet 1 times of 244 bytes message will be sent to 10.1.0.1[500]
Nov/10/2016 17:03:11 ipsec,debug,packet 5e8fc30a 7e4f5c87 00000000 00000000 01100100 00000000 000000f4 05000088
Nov/10/2016 17:03:11 ipsec,debug,packet 00000001 00000001 0000007c 01010003 03000028 01010000 800b0001 000c0004
Nov/10/2016 17:03:11 ipsec,debug,packet 00015180 80010007 800e0100 80030001 80020004 80040002 03000028 02010000
Nov/10/2016 17:03:11 ipsec,debug,packet 800b0001 000c0004 00015180 80010007 800e0080 80030001 80020004 80040002
Nov/10/2016 17:03:11 ipsec,debug,packet 00000024 03010000 800b0001 000c0004 00015180 80010005 80030001 80020004
Nov/10/2016 17:03:11 ipsec,debug,packet 80040002 0a00000c 011101f4 0a000001 0d00001c ae6efbcf e7be99bb 23e20de7
Nov/10/2016 17:03:11 ipsec,debug,packet 5510f1cf d88d743e 0c00fd33 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100
Nov/10/2016 17:03:11 ipsec,debug,packet 00000014 afcad713 68a1f1c9 6b8696fc 77570100
Nov/10/2016 17:03:11 ipsec,debug resent phase1 packet 10.0.0.1[500]<=>10.1.0.1[500] 5e8fc30a7e4f5c87:0000000000000000
Nov/10/2016 17:02:51 ipsec,debug ==========
Nov/10/2016 17:02:51 ipsec,debug 244 bytes message received from 10.0.0.1[500] to 10.1.0.1[500]
Nov/10/2016 17:02:51 ipsec,debug,packet 5e8fc30a 7e4f5c87 00000000 00000000 01100100 00000000 000000f4 05000088
Nov/10/2016 17:02:51 ipsec,debug,packet 00000001 00000001 0000007c 01010003 03000028 01010000 800b0001 000c0004
Nov/10/2016 17:02:51 ipsec,debug,packet 00015180 80010007 800e0100 80030001 80020004 80040002 03000028 02010000
Nov/10/2016 17:02:51 ipsec,debug,packet 800b0001 000c0004 00015180 80010007 800e0080 80030001 80020004 80040002
Nov/10/2016 17:02:51 ipsec,debug,packet 00000024 03010000 800b0001 000c0004 00015180 80010005 80030001 80020004
Nov/10/2016 17:02:51 ipsec,debug,packet 80040002 0a00000c 011101f4 0a000001 0d00001c ae6efbcf e7be99bb 23e20de7
Nov/10/2016 17:02:51 ipsec,debug,packet 5510f1cf d88d743e 0c00fd33 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100
Nov/10/2016 17:02:51 ipsec,debug,packet 00000014 afcad713 68a1f1c9 6b8696fc 77570100
Nov/10/2016 17:02:51 ipsec,debug no IKEv1 peer config for 10.0.0.1
Nov/10/2016 17:03:01 ipsec,debug ==========
Nov/10/2016 17:03:01 ipsec,debug 244 bytes message received from 10.0.0.1[500] to 10.1.0.1[500]
Nov/10/2016 17:03:01 ipsec,debug,packet 5e8fc30a 7e4f5c87 00000000 00000000 01100100 00000000 000000f4 05000088
Nov/10/2016 17:03:01 ipsec,debug,packet 00000001 00000001 0000007c 01010003 03000028 01010000 800b0001 000c0004
Nov/10/2016 17:03:01 ipsec,debug,packet 00015180 80010007 800e0100 80030001 80020004 80040002 03000028 02010000
Nov/10/2016 17:03:01 ipsec,debug,packet 800b0001 000c0004 00015180 80010007 800e0080 80030001 80020004 80040002
Nov/10/2016 17:03:01 ipsec,debug,packet 00000024 03010000 800b0001 000c0004 00015180 80010005 80030001 80020004
Nov/10/2016 17:03:01 ipsec,debug,packet 80040002 0a00000c 011101f4 0a000001 0d00001c ae6efbcf e7be99bb 23e20de7
Nov/10/2016 17:03:01 ipsec,debug,packet 5510f1cf d88d743e 0c00fd33 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100
Nov/10/2016 17:03:01 ipsec,debug,packet 00000014 afcad713 68a1f1c9 6b8696fc 77570100
Nov/10/2016 17:03:01 ipsec,debug no IKEv1 peer config for 10.0.0.1
Nov/10/2016 17:03:11 ipsec,debug ==========
Nov/10/2016 17:03:11 ipsec,debug 244 bytes message received from 10.0.0.1[500] to 10.1.0.1[500]
Nov/10/2016 17:03:11 ipsec,debug,packet 5e8fc30a 7e4f5c87 00000000 00000000 01100100 00000000 000000f4 05000088
Nov/10/2016 17:03:11 ipsec,debug,packet 00000001 00000001 0000007c 01010003 03000028 01010000 800b0001 000c0004
Nov/10/2016 17:03:11 ipsec,debug,packet 00015180 80010007 800e0100 80030001 80020004 80040002 03000028 02010000
Nov/10/2016 17:03:11 ipsec,debug,packet 800b0001 000c0004 00015180 80010007 800e0080 80030001 80020004 80040002
Nov/10/2016 17:03:11 ipsec,debug,packet 00000024 03010000 800b0001 000c0004 00015180 80010005 80030001 80020004
Nov/10/2016 17:03:11 ipsec,debug,packet 80040002 0a00000c 011101f4 0a000001 0d00001c ae6efbcf e7be99bb 23e20de7
Nov/10/2016 17:03:11 ipsec,debug,packet 5510f1cf d88d743e 0c00fd33 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100
Nov/10/2016 17:03:11 ipsec,debug,packet 00000014 afcad713 68a1f1c9 6b8696fc 77570100
Nov/10/2016 17:03:11 ipsec,debug no IKEv1 peer config for 10.0.0.1
Nov/10/2016 17:03:21 ipsec,debug ==========
Nov/10/2016 17:03:21 ipsec,debug 244 bytes message received from 10.0.0.1[500] to 10.1.0.1[500]
Nov/10/2016 17:03:21 ipsec,debug,packet 5e8fc30a 7e4f5c87 00000000 00000000 01100100 00000000 000000f4 05000088
Nov/10/2016 17:03:21 ipsec,debug,packet 00000001 00000001 0000007c 01010003 03000028 01010000 800b0001 000c0004
Nov/10/2016 17:03:21 ipsec,debug,packet 00015180 80010007 800e0100 80030001 80020004 80040002 03000028 02010000
Nov/10/2016 17:03:21 ipsec,debug,packet 800b0001 000c0004 00015180 80010007 800e0080 80030001 80020004 80040002
Nov/10/2016 17:03:21 ipsec,debug,packet 00000024 03010000 800b0001 000c0004 00015180 80010005 80030001 80020004
Nov/10/2016 17:03:21 ipsec,debug,packet 80040002 0a00000c 011101f4 0a000001 0d00001c ae6efbcf e7be99bb 23e20de7
Nov/10/2016 17:03:21 ipsec,debug,packet 5510f1cf d88d743e 0c00fd33 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100
Nov/10/2016 17:03:21 ipsec,debug,packet 00000014 afcad713 68a1f1c9 6b8696fc 77570100
Nov/10/2016 17:03:21 ipsec,debug no IKEv1 peer config for 10.0.0.1
Yes! Now it works!!!Please try rc29. If it doesn't work send supout files and logs to support.
/ip ipsec peer print
Flags: X - disabled, D - dynamic
0 address=76.27.xxx.xxx/32 passive=no auth-method=pre-shared-key secret="****" generate-policy=no policy-template-group=default exchange-mode=ike2 send-initial-contact=no
nat-traversal=no hash-algorithm=sha1 enc-algorithm=aes-128 dh-group=modp2048 lifetime=1d dpd-interval=2m dpd-maximum-failures=5
/ip ipsec policy print
Flags: T - template, X - disabled, D - dynamic, I - inactive, * - default
0 TX* group=default src-address=0.0.0.0/0 dst-address=0.0.0.0/0 protocol=all level=require proposal=default template=yes
1 T group=Group1 src-address=192.168.2.0/24 dst-address=192.168.1.0/24 protocol=all level=unique proposal=default template=yes
2 T group=Group1 src-address=192.168.1.0/24 dst-address=192.168.2.0/24 protocol=all level=unique proposal=default template=yes
/ip ipsec proposal print
Flags: X - disabled, * - default
0 * name="default" auth-algorithms=sha1 enc-algorithms=aes-128-cbc lifetime=30m pfs-group=none
/ip ipsec remote-peers print
0 local-address=71.61.xxx.xxx remote-address=76.27.xxx.xxx state=established side=responder established=16m18s
13:31:20 ipsec,debug payload seen: SA
13:31:20 ipsec,debug payload seen: NONCE
13:31:20 ipsec,debug payload seen: TS_I
13:31:20 ipsec,debug payload seen: TS_R
13:31:20 ipsec,debug create child: respond
13:31:20 ipsec,debug processing payload: NONCE
13:31:20 ipsec,debug processing payloads: NOTIFY
13:31:20 ipsec,debug none payloads found!
13:31:20 ipsec,debug processing payloads: NOTIFY
13:31:20 ipsec,debug none payloads found!
13:31:20 ipsec,debug peer wants tunnel mode
13:31:20 ipsec,debug processing payload: CONFIG
13:31:20 ipsec,debug payload not found!
13:31:20 ipsec,debug processing payload: TS_I
13:31:20 ipsec,debug 192.168.1.56:514 ipproto:17
13:31:20 ipsec,debug 192.168.1.0/24/24 ipproto:0
13:31:20 ipsec,debug processing payload: TS_R
13:31:20 ipsec,debug 192.168.2.129:514 ipproto:17
13:31:20 ipsec,debug 192.168.2.0/24/24 ipproto:0
13:31:20 ipsec,debug processing payload: SA
13:31:20 ipsec,debug IKE Protocol: ESP
13:31:20 ipsec,debug proposal #1
13:31:20 ipsec,debug enc: aes128-cbc
13:31:20 ipsec,debug auth: sha1
13:31:20 ipsec,debug esn: off
13:31:20 ipsec,debug searching for policy
13:31:20 ipsec,debug policy not found
13:31:20 ipsec,error no policy found/generated
Currently, it is only available in the latest RC builds, and only via CLI (command line / terminal).In my RB951G the IKEv2 option does not appear in IPsec exchange Mode.
Is there plans to include EAP soon?16:11:29 ipsec,debug payload seen: ID_I
16:11:29 ipsec,debug payload seen: NOTIFY
16:11:29 ipsec,debug payload seen: NOTIFY
16:11:29 ipsec,debug payload seen: ID_R
16:11:29 ipsec,debug payload seen: CONFIG
16:11:29 ipsec,debug payload seen: NOTIFY
16:11:29 ipsec,debug payload seen: NOTIFY
16:11:29 ipsec,debug payload seen: SA
16:11:29 ipsec,debug payload seen: TS_I
16:11:29 ipsec,debug payload seen: TS_R
16:11:29 ipsec,debug ike auth: respond
16:11:29 ipsec,error payload missing: AUTH
16:11:29 ipsec,error EAP not supported
16:11:29 ipsec,debug reply notify: AUTHENTICATION_FAILED
So I have managed to get ikev2 Phase1 connection made between routeros and a UBNT ERL3.
However, I cannot seem to get the policy working.
Here is my config:
Here is what I see in my log:Code: Select all/ip ipsec peer print Flags: X - disabled, D - dynamic 0 address=76.27.xxx.xxx/32 passive=no auth-method=pre-shared-key secret="****" generate-policy=no policy-template-group=default exchange-mode=ike2 send-initial-contact=no nat-traversal=no hash-algorithm=sha1 enc-algorithm=aes-128 dh-group=modp2048 lifetime=1d dpd-interval=2m dpd-maximum-failures=5 /ip ipsec policy print Flags: T - template, X - disabled, D - dynamic, I - inactive, * - default 0 TX* group=default src-address=0.0.0.0/0 dst-address=0.0.0.0/0 protocol=all level=require proposal=default template=yes 1 T group=Group1 src-address=192.168.2.0/24 dst-address=192.168.1.0/24 protocol=all level=unique proposal=default template=yes 2 T group=Group1 src-address=192.168.1.0/24 dst-address=192.168.2.0/24 protocol=all level=unique proposal=default template=yes /ip ipsec proposal print Flags: X - disabled, * - default 0 * name="default" auth-algorithms=sha1 enc-algorithms=aes-128-cbc lifetime=30m pfs-group=none /ip ipsec remote-peers print 0 local-address=71.61.xxx.xxx remote-address=76.27.xxx.xxx state=established side=responder established=16m18s
Is that subnet line supposed to have "/24/24" in it? Is this an RC bug?Code: Select all13:31:20 ipsec,debug payload seen: SA 13:31:20 ipsec,debug payload seen: NONCE 13:31:20 ipsec,debug payload seen: TS_I 13:31:20 ipsec,debug payload seen: TS_R 13:31:20 ipsec,debug create child: respond 13:31:20 ipsec,debug processing payload: NONCE 13:31:20 ipsec,debug processing payloads: NOTIFY 13:31:20 ipsec,debug none payloads found! 13:31:20 ipsec,debug processing payloads: NOTIFY 13:31:20 ipsec,debug none payloads found! 13:31:20 ipsec,debug peer wants tunnel mode 13:31:20 ipsec,debug processing payload: CONFIG 13:31:20 ipsec,debug payload not found! 13:31:20 ipsec,debug processing payload: TS_I 13:31:20 ipsec,debug 192.168.1.56:514 ipproto:17 13:31:20 ipsec,debug 192.168.1.0/24/24 ipproto:0 13:31:20 ipsec,debug processing payload: TS_R 13:31:20 ipsec,debug 192.168.2.129:514 ipproto:17 13:31:20 ipsec,debug 192.168.2.0/24/24 ipproto:0 13:31:20 ipsec,debug processing payload: SA 13:31:20 ipsec,debug IKE Protocol: ESP 13:31:20 ipsec,debug proposal #1 13:31:20 ipsec,debug enc: aes128-cbc 13:31:20 ipsec,debug auth: sha1 13:31:20 ipsec,debug esn: off 13:31:20 ipsec,debug searching for policy 13:31:20 ipsec,debug policy not found 13:31:20 ipsec,error no policy found/generated
Guys, it's working fine with Windows 10 and client certificate.
But not working with iOS or MacOS :/
Is there plans to include EAP soon?16:11:29 ipsec,debug payload seen: ID_I
16:11:29 ipsec,debug payload seen: NOTIFY
16:11:29 ipsec,debug payload seen: NOTIFY
16:11:29 ipsec,debug payload seen: ID_R
16:11:29 ipsec,debug payload seen: CONFIG
16:11:29 ipsec,debug payload seen: NOTIFY
16:11:29 ipsec,debug payload seen: NOTIFY
16:11:29 ipsec,debug payload seen: SA
16:11:29 ipsec,debug payload seen: TS_I
16:11:29 ipsec,debug payload seen: TS_R
16:11:29 ipsec,debug ike auth: respond
16:11:29 ipsec,error payload missing: AUTH
16:11:29 ipsec,error EAP not supported
16:11:29 ipsec,debug reply notify: AUTHENTICATION_FAILED
Thanks!
Ok, got it working with iOS with certificates (enc 3des, auth sha1, esn off), but I'm getting extremely slow speeds? ICMP pings look fine, but Speedtest gives me 0.1 MBit/s or lower speed Access to local recources is with the same slow speed... Something is generally messed up.. Can you point me how to troubleshoot this?Currently it works wit Macs with psk and should work wit certificates without eap. In the future it will be possible to use EAP with RADIUS server.
Any IKEv2 examples Yet for connecting to Azure?
/ip ipsec proposal
add enc-algorithms=aes-256-cbc,aes-128-cbc,3des lifetime=1h name=Azure \
pfs-group=none
/ip ipsec peer
add address={AZURE_IP/32} dpd-interval=disable-dpd enc-algorithm=\
aes-256,3des exchange-mode=ike2 local-address={LOCAL_IP} \
nat-traversal=no secret={SECRET}
/ip ipsec policy
add dst-address={AZURE_SUBNET} proposal=Azure sa-dst-address={AZURE_IP} \
sa-src-address={LOCAL_IP} src-address={LOCAL_SUBNET} tunnel=yes
Same problem here. Latest RC version can't connect with Azure.After uppgrading to v6.38rc35 I cannot connect to Azure anymore.
Stopped working yesterday, and after upgrading from 6.38rc31 I cannot connect to Azure anymore with ikev2
[...]
/ip pool add name=rw-pool ranges=192.168.77.2-192.168.77.254
/ip ipsec policy
set 0 level=unique dst-address=192.168.77.0/24
/ip ipsec mode-conf
add name=cfg1 send-dns=yes address-pool=rw-pool address-prefix=32
/ip ipsec peer
add auth-method=pre-shared-key passive=yes secret=your_secret policy-template-group=default exchange-mode=ike2 nat-traversal=yes mode-config=cfg1 generate-policy=port-strict enc-algorithm=aes-128 dh-group=modp1024
Something wrong with this, should it be system-dns=yesI got it working with Pre-Shared key with my iPhone using this config:
But it's very very slow! I think I have MTU problem, but I don't know how to fix it for UDP traffic....anyone?Code: Select all/ip pool add name=rw-pool ranges=192.168.77.2-192.168.77.254 /ip ipsec policy set 0 level=unique dst-address=192.168.77.0/24 /ip ipsec mode-conf add name=cfg1 send-dns=yes address-pool=rw-pool address-prefix=32 /ip ipsec peer add auth-method=pre-shared-key passive=yes secret=your_secret policy-template-group=default exchange-mode=ike2 nat-traversal=yes mode-config=cfg1 generate-policy=port-strict enc-algorithm=aes-128 dh-group=modp1024
Can I have a copy of your ios mobileconfig?You're right, it's system-dns=yes
I use XML mobileconfig file, read here:
https://wiki.strongswan.org/projects/st ... Ev2Profile
I asked this in the 6.38rc thread, but maybe here is better. I will admit that I've not kept up with how quickly the IKEv2 support has moved in these RCs. Well done to MikroTik's developers for doing this so fast!
My question is whether or not it is possible to create an IKEv2 configuration on RouterOS which will support iOS road-warriors using username/password authentication. I'm guessing that this is EAP and XAuth (with RADIUS), but I haven't found the correct incantation of commands to get it to work. I'm left staring at ipsec debugging logs which say "EAP neeeds certificate if EAP-only is not used" and "reply notify: AUTHENTICATION_FAILED" (no RADIUS packet is emitted?). I'm also puzzled by what auth settings iOS is using in some of its proposals that the debug logs show "auth: unknown".
Any clues would be gratefully received — we've got several end users who would love to test this. Is this something 6.38rc can do yet, or is it "coming soon"?
Just use the "EAP authentication (base template)" and then replace the parts for "Pre-shared key (PSK) authentication".Can I have a copy of your ios mobileconfig?You're right, it's system-dns=yes
I use XML mobileconfig file, read here:
https://wiki.strongswan.org/projects/st ... Ev2Profile
Is RFC 7383 implemented in RouterOS yet?"Support for the new IKEv2 Fragmentation mechanism as defined by RFC 7383 has been added, which avoids IP fragmentation of
IKEv2 UDP datagrams exceeding the network's MTU size. This feature is activated by setting fragmentation=yes in ipsec.conf and optionally setting the maximum IP packet size with the charon.fragment_size parameter in strongswan.conf."
VTI on RouterOS. PleeeaseRouterOS is policy based and there is no ipsec interface to adjust MTU.
19:43:57.474594 IP (tos 0x0, ttl 63, id 45839, offset 0, flags [DF], proto UDP (17), length 121)
185.134.196.4.50138 > 185.134.196.12.1812: [udp sum ok] RADIUS, length: 93
Access Request (1), id: 0x17, Authenticator: 216e38c751e9598c38bae6dc5169c34b
Calling Station Attribute (31), length: 10, Value: ./.Y..t.
0x0000: c42f 8359 e3d3 74e4
Username Attribute (1), length: 11, Value: 10.3.0.31
0x0000: 3130 2e33 2e30 2e33 31
Service Type Attribute (6), length: 6, Value: Framed
0x0000: 0000 0002
Framed MTU Attribute (12), length: 6, Value: 1400
0x0000: 0000 0578
EAP Message Attribute (79), length: 16, Value: .
0x0000: 0200 000e 0131 302e 332e 302e 3331
NAS ID Attribute (32), length: 18, Value: chr01.faelix.net
0x0000: 6368 7230 312e 6661 656c 6978 2e6e 6574
NAS IP Address Attribute (4), length: 6, Value: 185.134.196.4
0x0000: b986 c404
/*
* http://www.freeradius.org/rfc/rfc2869.html#EAP-Message
*
* A packet with an EAP-Message attribute MUST also have
* a Message-Authenticator attribute.
*
* A Message-Authenticator all by itself is OK, though.
*
* Similarly, Status-Server packets MUST contain
* Message-Authenticator attributes.
*/
if (require_ma && !seen_ma) {
FR_DEBUG_STRERROR_PRINTF("Insecure packet from host %s: Packet does not contain required Message-Authenticator attribute",
inet_ntop(packet->src_ipaddr.af,
&packet->src_ipaddr.ipaddr,
host_ipaddr, sizeof(host_ipaddr)));
failure = DECODE_FAIL_MA_MISSING;
goto finish;
}
/radius
add address=XXXXXX secret=XXXXXX service=ppp,hotspot,wireless,dhcp,ipsec src-address=185.134.196.4
/ip ipsec mode-config
add address-pool=rw-pool address-prefix-length=32 name=cfg1
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-128-cbc lifetime=8h
/ip ipsec peer
add address=0.0.0.0/0 auth-method=eap-radius certificate=chr01.faelix.net. enc-algorithm=aes-128 exchange-mode=ike2 generate-policy=\
port-strict local-address=185.134.196.4 mode-config=cfg1 my-id=fqdn:chr01.faelix.net passive=yes
/ip ipsec policy
set 0 dst-address=192.168.77.0/24 src-address=0.0.0.0/0
/ip ipsec user settings
set xauth-use-radius=yes
…if this forum had a "like" button, I would press it :-)Next RC will include message-authenticator attribute
# dec/22/2016 18:50:18 by RouterOS 6.38rc52
# software id = RNJ2-HSU2
#
/ip ipsec mode-config
add address-pool=mobile_clients address-prefix-length=32 name=cfg1 \
split-include=192.168.100.0/24
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-128-cbc,3des lifetime=10h \
pfs-group=modp2048
/ip ipsec peer
add address=0.0.0.0/0 dh-group=modp2048,modp1024 enc-algorithm=aes-128 \
exchange-mode=ike2 generate-policy=port-strict mode-config=cfg1 passive=\
yes
/ip ipsec policy
set 0 dst-address=192.168.99.0/24 src-address=0.0.0.0/0
Do you still need to set up mobileconfig file for the iphone?Hello everyone,
I have successfully set up IKEv2 and i am able to connect from my iPhone and macbook, but connection drops every exactly 8 minutes. I have try various lifetime in proposals and played with settings without success. Here is my config
Thank you and sorry my EnglishCode: Select all# dec/22/2016 18:50:18 by RouterOS 6.38rc52 # software id = RNJ2-HSU2 # /ip ipsec mode-config add address-pool=mobile_clients address-prefix-length=32 name=cfg1 \ split-include=192.168.100.0/24 /ip ipsec proposal set [ find default=yes ] enc-algorithms=aes-128-cbc,3des lifetime=10h \ pfs-group=modp2048 /ip ipsec peer add address=0.0.0.0/0 dh-group=modp2048,modp1024 enc-algorithm=aes-128 \ exchange-mode=ike2 generate-policy=port-strict mode-config=cfg1 passive=\ yes /ip ipsec policy set 0 dst-address=192.168.99.0/24 src-address=0.0.0.0/0
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-128-cbc
/ip ipsec peer
add address=172.30.4.36/32 disabled=yes exchange-mode=ike2 my-id=fqdn:rbtest.test secret=\
0xe48cc4f17398821969bfc243fbc28e6a
/ip ipsec policy
add dst-address=172.30.4.36/32 protocol=gre sa-dst-address=172.30.4.36 sa-src-address=\
0.0.0.0 src-address=172.30.4.200/32
I'm also having this problem. I can connect successfully from my macbook, but after 8 minutes connection drops.I have successfully set up IKEv2 and i am able to connect from my iPhone and macbook, but connection drops every exactly 8 minutes. I have try various lifetime in proposals and played with settings without success. Here is my config
17:13:46 ipsec,info new ike2 SA (R): 1.1.1.1[500]-2.2.2.2[500] spi:55b2bf4541cc23a8:7a4bf2f20934ae25
17:13:46 ipsec,info peer authorized: 1.1.1.1[4500]-2.2.2.2[41122] spi:55b2bf4541cc23a8:7a4bf2f20934ae25
17:13:46 ipsec,info acquired 192.168.101.199 address for 2.2.2.2
17:21:47 ipsec,error payload missing: TS_I
17:21:47 ipsec,info killing ike2 SA: 1.1.1.1[4500]-2.2.2.2[41122] spi:55b2bf4541cc23a8:7a4bf2f20934ae25
17:21:47 ipsec,info releasing address 192.168.101.199
http://forum.mikrotik.com/viewtopic.php ... 50#p574052 - mrz says it's in the next RC :)I'm trying to set up eap-radius with Windows NPS, but i keep getting these errors on my windows radius server:
An Access-Request message was received from RADIUS client 192.168.xx.xx with an Extensible Authentication Protocol (EAP) message but no Message-Authenticator attribute.
Anyone know how to solve this?
With 6.38rc52 still not working.Same problem here. Latest RC version can't connect with Azure.After uppgrading to v6.38rc35 I cannot connect to Azure anymore.
Stopped working yesterday, and after upgrading from 6.38rc31 I cannot connect to Azure anymore with ikev2
[...]
In other test lab, Ikev2 between two mikrotik also fails.
Support ticket #2016120722000706 with supout and "ipsec" logs from 2 routers. If you need I can post it here.Any supout with debug logs from non working version?
It has finally worked. I had setup port 500. When I disabled it in Winbox, it has started to work.All known problems with azure were solved, please send access to the routers to that ticket so that we can look at.
It works for me with 6.38rc52 against AzureAny update on this problem?
With 6.38rc52 still not working.Same problem here. Latest RC version can't connect with Azure.After uppgrading to v6.38rc35 I cannot connect to Azure anymore.
Stopped working yesterday, and after upgrading from 6.38rc31 I cannot connect to Azure anymore with ikev2
[...]
In other test lab, Ikev2 between two mikrotik also fails.
It's bug in AppleAny news about the 8 minute disconnection bug?
It is notIt's bug in AppleAny news about the 8 minute disconnection bug?
Thanks... I deeply appreciate the IKEv2 feature coming before the forever waited ROS v7.We have repeated the issue and found the cause. We are working to fix it now. Fix is probably coming in one of the next RC releases.
/ip ipsec proposal
add enc-algorithms=aes-256-cbc,aes-128-cbc,3des lifetime=1h name=Azure \
pfs-group=none
/ip ipsec peer
add address=a.a.a.a/32 dpd-interval=disable-dpd enc-algorithm=\
aes-256,aes-128,3des exchange-mode=ike2 generate-policy=port-strict \
lifetime=1h local-address=b.b.b.b secret=secretkeyhere
/ip ipsec policy
add template=yes
add dst-address=c.c.c.c/cc proposal=Azure sa-dst-address=a.a.a.a \
sa-src-address=b.b.b.b src-address=d.d.d.d/dd tunnel=yes
Also don't forget you need to add the firewall filter to accept and forward requests from the Azure Subnet to the On premise Subnet,For those that are interested: here is a working configuration for an IKEv2 tunnel to Azure. This config works both as initiator and responder.
a.a.a.a = Public IP of your Azure VPN gateway
b.b.b.b = Public IP of the Mikrotik
c.c.c.c/cc = Private IP range on the Azure side
d.d.d.d/dd = Private IP range on the Mikrotik side
Code: Select all/ip ipsec proposal add enc-algorithms=aes-256-cbc,aes-128-cbc,3des lifetime=1h name=Azure \ pfs-group=none /ip ipsec peer add address=a.a.a.a/32 dpd-interval=disable-dpd enc-algorithm=\ aes-256,aes-128,3des exchange-mode=ike2 generate-policy=port-strict \ lifetime=1h local-address=b.b.b.b secret=secretkeyhere /ip ipsec policy add template=yes add dst-address=c.c.c.c/cc proposal=Azure sa-dst-address=a.a.a.a \ sa-src-address=b.b.b.b src-address=d.d.d.d/dd tunnel=yes
Only the first subnet shows as "established". The rest are "no phase2"./ip ipsec peer add address=GOOGLEIP dpd-interval=disable-dpd enc-algorithm=aes-256,3des exchange-mode=ike2 local-address=LOCALIP nat-traversal=yes secret=SECRET
/ip ipsec policy add dst-address=10.0.1.0/24 proposal=default sa-dst-address=GOOGLEIP sa-src-address=LOCALIP src-address=192.168.1.0/24 tunnel=yes
/ip ipsec policy add dst-address=10.0.2.0/24 proposal=default sa-dst-address=GOOGLEIP sa-src-address=LOCALIP src-address=192.168.1.0/24 tunnel=yes
/ip ipsec policy add dst-address=10.0.3.0/24 proposal=default sa-dst-address=GOOGLEIP sa-src-address=LOCALIP src-address=192.168.1.0/24 tunnel=yes
/ip ipsec policy add dst-address=10.0.4.0/24 proposal=default sa-dst-address=GOOGLEIP sa-src-address=LOCALIP src-address=192.168.1.0/24 tunnel=yes
I can access by IP, but can't use DNS names from remote networkModeconf is needed to give out ip addresses and send DNS to the iphone.
set level=unique for each policyI am unable to set up ike2 with google cloud and multiple subnets.
Only the first subnet shows as "established". The rest are "no phase2"./ip ipsec peer add address=GOOGLEIP dpd-interval=disable-dpd enc-algorithm=aes-256,3des exchange-mode=ike2 local-address=LOCALIP nat-traversal=yes secret=SECRET
/ip ipsec policy add dst-address=10.0.1.0/24 proposal=default sa-dst-address=GOOGLEIP sa-src-address=LOCALIP src-address=192.168.1.0/24 tunnel=yes
/ip ipsec policy add dst-address=10.0.2.0/24 proposal=default sa-dst-address=GOOGLEIP sa-src-address=LOCALIP src-address=192.168.1.0/24 tunnel=yes
/ip ipsec policy add dst-address=10.0.3.0/24 proposal=default sa-dst-address=GOOGLEIP sa-src-address=LOCALIP src-address=192.168.1.0/24 tunnel=yes
/ip ipsec policy add dst-address=10.0.4.0/24 proposal=default sa-dst-address=GOOGLEIP sa-src-address=LOCALIP src-address=192.168.1.0/24 tunnel=yes
This works with linux box and Strongswan.
Same thing. Though, now the second subnet is established, the first and the rest are "no phase2".set level=unique for each policyI am unable to set up ike2 with google cloud and multiple subnets.
Only the first subnet shows as "established". The rest are "no phase2"....
This works with linux box and Strongswan.
I have exact same problem. I can establish IKEv2 tunnel from iPhone to Mikrotik but cant access any of the hosts at the end of the tunnel using their DNS names (i have defined a number of static DNS entries on the Mikrotik). Google search suggested that adding the appropriate SearchDomains, ServerAddresses and SupplementalMatchDomains keys to the MobileConfig file on the iPhone should do the trick but it didn't. Another (I think related) issue is that not all traffic is sent over the VPN even when the relevant key is set in MobileConfig (OverridePrimary).I can access by IP, but can't use DNS names from remote networkModeconf is needed to give out ip addresses and send DNS to the iphone.
/ip ipsec mode-conf
add name=cfg1 system-dns=yes address-pool=rw-pool address-prefix=32
/ip dns
in this section I have correct DNS servers from my internal network.
Any ideas?
Thanks to Mikrotik support, it is working. Nothing was wrong with the ipsec itself, however tunneled traffic has to bypass fasttrack - as described here: http://wiki.mikrotik.com/wiki/Manual:IP ... ack_BypassSame thing. Though, now the second subnet is established, the first and the rest are "no phase2".set level=unique for each policyI am unable to set up ike2 with google cloud and multiple subnets.
Only the first subnet shows as "established". The rest are "no phase2"....
This works with linux box and Strongswan.
Adjust the encryption and dh group can be solved, in 6.38I'm also having this problem. I can connect successfully from my macbook, but after 8 minutes connection drops.I have successfully set up IKEv2 and i am able to connect from my iPhone and macbook, but connection drops every exactly 8 minutes. I have try various lifetime in proposals and played with settings without success. Here is my config
/ip ipsec peer
add address=0.0.0.0/0 auth-method=rsa-signature certificate=fullchain.pem_0 dh-group=modp2048 enc-algorithm=aes-256 exchange-mode=ike2 generate-policy=\
port-strict hash-algorithm=sha256 mode-config=cfg1 passive=yes
/ip ipsec policy
set 0 dst-address=172.30.0.0/15 src-address=0.0.0.0/0
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha256 enc-algorithms=aes-256-cbc pfs-group=none
/ip ipsec mode-config
add address-pool=pool1 address-prefix-length=32 name=cfg1 split-include=172.30.0.0/15 system-dns=no
/ip address
add address=172.31.1.254/24 interface=ether3 network=172.31.1.0
/ip pool
add name=pool1 ranges=172.31.1.1-172.31.1.253
/ip firewall nat
add action=accept chain=srcnat dst-address=172.31.1.0/24 src-address=172.31.0.0/24
add action=accept chain=srcnat dst-address=172.31.0.0/24 src-address=172.31.1.0/24
add action=src-nat chain=srcnat out-interface=pppoe-out1 src-address=172.31.0.0/24 to-addresses=pppoe-out1 address
add action=src-nat chain=srcnat out-interface=pppoe-out2 src-address=172.31.0.0/24 to-addresses=pppoe-out1 address
23:41:26.241030 IP (tos 0x0, ttl 63, id 38214, offset 0, flags [DF], proto UDP (17), length 141)
185.134.196.4.60758 > 185.134.XXXXXX.1812: [udp sum ok] RADIUS, length: 113
Access Request (1), id: 0x01, Authenticator: 1f3697ca6de1a6a1c1b52d3703b54a6a
Calling Station Attribute (31), length: 10, Value: .b.@S...
0x0000: f362 a940 53e6 12d9
Username Attribute (1), length: 12, Value: 10.15.0.51
0x0000: 3130 2e31 352e 302e 3531
Service Type Attribute (6), length: 6, Value: Framed
0x0000: 0000 0002
Framed MTU Attribute (12), length: 6, Value: 1400
0x0000: 0000 0578
EAP Message Attribute (79), length: 17, Value: .
0x0000: 0200 000f 0131 302e 3135 2e30 2e35 31
Message Authentication Attribute (80), length: 18, Value: .r!.H.GZ.a]v&...
0x0000: 9e72 2117 4809 475a ae61 5d76 2683 acd7
NAS ID Attribute (32), length: 18, Value: chr01.faelix.net
0x0000: 6368 7230 312e 6661 656c 6978 2e6e 6574
NAS IP Address Attribute (4), length: 6, Value: 185.134.196.4
0x0000: b986 c404
/ip ipsec mode-config
add address-pool=rw-pool address-prefix-length=32 name=cfg1
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-128-cbc lifetime=8h
/ip ipsec peer
add address=0.0.0.0/0 auth-method=eap-radius certificate=chr01.faelix.net. \
enc-algorithm=aes-128 exchange-mode=ike2 generate-policy=port-strict \
local-address=185.134.196.4 mode-config=cfg1 my-id=fqdn:chr01.faelix.net \
passive=yes
/ip ipsec policy
set 0 dst-address=192.168.77.0/24 src-address=0.0.0.0/0
/ip ipsec user settings
set xauth-use-radius=yes
Hamster,I apologize if this has been answered before, but I spent about 10 hours already trying to make a working config... Does anyone have a working IKEv2 for road warriors config that I could borrow as my starting point? I'm using ROS v6.38.
/ip ipsec mode-config
set request-only name=request-only
add address-pool=ipsec-pool address-prefix-length=24 name=cfg_priv split-include=0.0.0.0/0,<local subnet> system-dns=\
yes
/ip ipsec policy group
set default name=default
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha256,sha1 disabled=no enc-algorithms=aes-256-cbc,aes-192-cbc,aes-128-cbc \
lifetime=1h name=default pfs-group=modp2048
/ip ipsec peer
add address=0.0.0.0/0 auth-method=rsa-signature certificate=<cert name>_0 comment=IKEv2 dh-group=\
modp4096 disabled=no dpd-interval=2m enc-algorithm=aes-256 exchange-mode=ike2 generate-policy=port-strict \
hash-algorithm=sha512 lifetime=1d local-address=<public IP> mode-config=cfg_priv my-id=fqdn:<public URL> \
passive=yes policy-template-group=default send-initial-contact=no
/ip ipsec policy
set 0 disabled=no dst-address=0.0.0.0/0 group=default proposal=default protocol=all src-address=0.0.0.0/0 template=\
yes
/ip ipsec user settings
set xauth-use-radius=no
set 0 dst-address=0.0.0.0/0 src-address=0.0.0.0/0
Jan 14 00:08:46 iPad neagent(NetworkExtension)[5207] <Error>: Authentication method did not match
Jan 14 00:08:46 iPad neagent(NetworkExtension)[5207] <Error>: Failed to process IKE Auth packet
Network Policy Server denied access to a user.
Contact the Network Policy Server administrator for more information.
User:
Security ID: NULL SID
Account Name: 192.168.13.35
Account Domain: MYDOMAIN
Fully Qualified Account Name: MYDOMAIN\192.168.13.35
Client Machine:
Security ID: NULL SID
Account Name: -
Fully Qualified Account Name: -
OS-Version: -
Called Station Identifier: -
Calling Station Identifier: 8
ŠÁK
NAS:
NAS IPv4 Address: 10.1.1.1
NAS IPv6 Address: -
NAS Identifier: TheRouter
NAS Port-Type: -
NAS Port: -
RADIUS Client:
Client Friendly Name: TheRouter
Client IP Address: 10.1.1.1
Authentication Details:
Connection Request Policy Name: Use Windows authentication for all users
Network Policy Name: -
Authentication Provider: Windows
Authentication Server: MyServer.mydomain.local
Authentication Type: EAP
EAP Type: -
Account Session Identifier: -
Logging Results: Accounting information was written to the local log file.
Reason Code: 8
Reason: The specified user account does not exist.
Network Policy Server granted access to a user.
User:
Security ID: MYDOMAIN\myname
Account Name: myname
Account Domain: MYDOMAIN
Fully Qualified Account Name: mydomain.local/MyDomain/MyName
Client Machine:
Security ID: NULL SID
Account Name: -
Fully Qualified Account Name: -
OS-Version: -
Called Station Identifier: 82.192.xxx.xxx
Calling Station Identifier: 93.103.xxx.xxx
NAS:
NAS IPv4 Address: 10.1.1.1
NAS IPv6 Address: -
NAS Identifier: TheRouter
NAS Port-Type: Virtual
NAS Port: 15728640
RADIUS Client:
Client Friendly Name: TheRouter
Client IP Address: 10.1.1.1
Authentication Details:
Connection Request Policy Name: Use Windows authentication for all users
Network Policy Name: Connections to other access servers
Authentication Provider: Windows
Authentication Server: MyServer.mydomain.local
Authentication Type: MS-CHAPv2
EAP Type: -
Account Session Identifier: -
Logging Results: Accounting information was written to the local log file.
Quarantine Information:
Result: Full Access
Session Identifier: -
Jan 16 20:28:00 00[DMN] Starting IKE charon daemon (strongSwan 5.5.1rc1, Linux 3.0.31-Bauner, armv7l)
Jan 16 20:28:01 00[LIB] loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls
Jan 16 20:28:01 00[JOB] spawning 16 worker threads
Jan 16 20:28:01 08[IKE] initiating IKE_SA android[3] to 82.192.xxx.xxx
Jan 16 20:28:01 08[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Jan 16 20:28:01 08[NET] sending packet: from 192.168.13.33[49936] to 82.192.xxx.xxx[500] (744 bytes)
Jan 16 20:28:01 11[NET] received packet: from 82.192.xxx.xxx[500] to 192.168.13.33[49936] (38 bytes)
Jan 16 20:28:01 11[ENC] parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
Jan 16 20:28:01 11[IKE] peer didn\'t accept DH group ECP_256, it requested MODP_4096
Jan 16 20:28:02 11[IKE] initiating IKE_SA android[3] to 82.192.xxx.xxx
Jan 16 20:28:02 11[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Jan 16 20:28:02 11[NET] sending packet: from 192.168.13.33[49936] to 82.192.xxx.xxx[500] (1192 bytes)
Jan 16 20:28:03 12[IKE] retransmit 1 of request with message ID 0
Jan 16 20:28:03 12[NET] sending packet: from 192.168.13.33[49936] to 82.192.xxx.xxx[500] (1192 bytes)
Jan 16 20:28:04 13[IKE] retransmit 2 of request with message ID 0
Jan 16 20:28:04 13[NET] sending packet: from 192.168.13.33[49936] to 82.192.xxx.xxx[500] (1192 bytes)
Jan 16 20:28:06 07[IKE] retransmit 3 of request with message ID 0
Jan 16 20:28:06 07[NET] sending packet: from 192.168.13.33[49936] to 82.192.xxx.xxx[500] (1192 bytes)
Jan 16 20:28:08 14[IKE] giving up after 3 retransmits
Jan 16 20:28:08 14[IKE] peer not responding, trying again (2/0)
Jan 16 20:28:08 14[IKE] initiating IKE_SA android[3] to 82.192.xxx.xxx
Jan 16 20:28:08 14[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Jan 16 20:28:08 14[NET] sending packet: from 192.168.13.33[49936] to 82.192.xxx.xxx[500] (1192 bytes)
Jan 16 20:28:08 16[IKE] destroying IKE_SA in state CONNECTING without notification
185.134.196.4.36540 > 185.134.196.12.1812: [udp sum ok] RADIUS, length: 111
Access Request (1), id: 0x01, Authenticator: f68c0e84765b5b0644e739efb2e947d4
Calling Station Attribute (31), length: 10, Value: ......k.
0x0000: b6c6 d3bb c0f5 6b0b
Username Attribute (1), length: 11, Value: 10.3.0.31
0x0000: 3130 2e33 2e30 2e33 31
6.39rc12 and 6.38.1 are both still sending through an IP address (the road warrior's local IP) as the "Username" attribute in RADIUS. Isn't this meant to be the Username I specified in the iOS IKEv2 client?
Code: Select all185.134.196.4.36540 > 185.134.196.12.1812: [udp sum ok] RADIUS, length: 111 Access Request (1), id: 0x01, Authenticator: f68c0e84765b5b0644e739efb2e947d4 Calling Station Attribute (31), length: 10, Value: ......k. 0x0000: b6c6 d3bb c0f5 6b0b Username Attribute (1), length: 11, Value: 10.3.0.31 0x0000: 3130 2e33 2e30 2e33 31
user-name radius attribute is equal to clients local-identity, IOS by default puts its ip address as local-identity. Eap username and password for authentication is inside eap message.We are experiencing exactly the same. Radius to Windows Server 2016 Network Policy Server and IKEv2 client is a Windows 10 machine.
6.39rc12 and 6.38.1 are both still sending through an IP address (the road warrior's local IP) as the "Username" attribute in RADIUS. Isn't this meant to be the Username I specified in the iOS IKEv2 client?
Code: Select all185.134.196.4.36540 > 185.134.196.12.1812: [udp sum ok] RADIUS, length: 111 Access Request (1), id: 0x01, Authenticator: f68c0e84765b5b0644e739efb2e947d4 Calling Station Attribute (31), length: 10, Value: ......k. 0x0000: b6c6 d3bb c0f5 6b0b Username Attribute (1), length: 11, Value: 10.3.0.31 0x0000: 3130 2e33 2e30 2e33 31
What a lovely information leak... Thanks for the info, mrz!user-name radius attribute is equal to clients local-identity, IOS by default puts its ip address as local-identity. Eap username and password for authentication is inside eap message.
add chain=input comment="UDP 500,4500" dst-port=500,4500 in-interface=WAN protocol=udp src-port=500,4500
add chain=input comment="UDP 500,4500" port=500,4500 in-interface=WAN protocol=udp
/certificate
Flags: K - private-key, D - dsa, L - crl, C - smart-card-key, A - authority, I - issued, R - revoked, E - expired, T - trusted
# NAME COMMON-NAME SUBJECT-ALT-NAME FINGERPRINT
0 K I server1 <external router IP(2.2.2.2)> DNS:<reverse.domain.name> c92...
1 K I client1 client1 559...
2 K L A T ca
/ip ipsec mode-config
add address-pool=vpn-pool address-prefix-length=32 name=cfg1 split-include=<local network(192.168.55.0/24)>
/ip ipsec policy group
add name=group1
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha512 enc-algorithms=aes-256-cbc pfs-group=modp2048
add auth-algorithms=sha512,sha256 name=proposal-IPSEC pfs-group=modp2048
/ip ipsec peer
add address=0.0.0.0/0 auth-method=rsa-signature certificate=server1 dh-group=modp2048 enc-algorithm=\
aes-256 exchange-mode=ike2 generate-policy=port-strict hash-algorithm=sha512 mode-config=cfg1 my-id=\
fqdn:reverse.domain.name passive=yes policy-template-group=group1 send-initial-contact=no
/ip ipsec policy
set 0 dst-address=<remote network(192.168.77.0/24)> group=group1 proposal=proposal-IPSEC src-address=0.0.0.0/0
/ip firewall filter
add action=accept chain=input port=500,4500 protocol=udp
add action=accept chain=input connection-state=established,related
Using no filter will work when I am connecting within the local network however when coming from outside of the router then nothing is coming in when I don't explicit accept the traffic.There is no firewall rules mentioned in ike2 example. If you get these rules from other examples then there such configuration is valid.
Okay.@maw as it was mentioned many times before, "username" that you see is not username but local-id on the client. Actual username and password used for authentication is in EAP message.
Using local-id as a value of the User-Name RADIUS attribute in the "outer session" sounds wrong. My understanding is that local-id is used during phase1 negotiation, and has nothing to do with user authentication (at least when EAP is in use).@maw as it was mentioned many times before, "username" that you see is not username but local-id on the client. Actual username and password used for authentication is in EAP message.
Are you telling us that RouterOS itself "terminates" the TLS part of EAP-TTLS and only passes EAP/MS-CHAPv2 part to the RADIUS server? That's plain wrong! You should pass the whole EAP session to the RADIUS. TLS part of the EAP-TTLS is meant to authenticate Authenticator (i.e. RADIUS server) to Supplicant (VPN client), and not NAS or VPN server to client.What you are talking about is TTLS. In IOS case outer protocol is TLS and inner protocol is EAP/MS-CHAPv2.
No RouterOS does not terminate, it relays everything to RADIUS.Are you telling us that RouterOS itself "terminates" the TLS part of EAP-TTLS and only passes EAP/MS-CHAPv2 part to the RADIUS server? That's plain wrong! You should pass the whole EAP session to the RADIUS. TLS part of the EAP-TTLS is meant to authenticate Authenticator (i.e. RADIUS server) to Supplicant (VPN client), and not NAS or VPN server to client.What you are talking about is TTLS. In IOS case outer protocol is TLS and inner protocol is EAP/MS-CHAPv2.
The "outer" RADIUS session is what NAS or VPN server constructs itself in order to encapsulate EAP payload it receives from the client. So it's under your control what to put into the "outer" session User-Name attribute. Please put what RFC5281 suggests in there.
set local-id manually the same as username. As it was mentioned in my previous post strongSwan does that automatically, but other clients does not.Dear andriys, thanks for fighting the good fight. Your fight is now over
Mikrotik has fixed the issue. I'm incredibly happy to report that the issue with IKEv2 + RADIUS is now in v6.39rc27 RESOLVED! With the same configuration as before, it suddenly now FOOKIN' WORKS! YISSS!
Edit: I got excited too soon. It works from strongSwan client on Android now, but when connecting from Windows 10 native client, the problem is the same as before. So, in case of strongSwan client, my RADIUS server sees "user-name" property as it should, when connecting from Windows, my RADIUS server sees "user-name" property as an IP address and obviously rejects authentication request. Well, andriys, perhaps the fight isn't over yet, but we're getting there...
Currently we do not plan to rename peer and policy.Hi Maris and other Mikrotik staff.
Thank you for the recent love you have been giving IPSEC. Even without the IKEv2 additions, the 6.39 branch is already a great improvement on prior versions, I particularly like the addition of showing the Phase2 status in the policy screen. It makes troubleshooting much quicker.
Have you considered aligning your terminology ?
e.g. rename "Peer" tab to "Phase 1" and "Policy" tab to "Phase 2"
EAP-TLS uses certificates exclusively to authenticate both Authenticator and Supplicant, so I guess you are talking about PEAP here.No RouterOS does not terminate, it relays everything to RADIUS.
What I am saying is that mentioned clients here does not use TTLS, but TLS as outer protocol, so RFC5281 is not applicable.
Yes, but to put username which is used in EAP-MSCHAP as radius user-name we have to parse EAP message, which currently is not done.In case of PEAP a secure TLS session is established between Supplicant and Authenticator. At this stage a certificate is used to authenticate Authenticator to Supplicant. Supplicant does not provided any proof of identity at this stage. Once the secure TLS session is established EAP-MSCHAPv2 is used inside that session to authenticate Supplicant to Authenticator. I hope this is where we agree with each other.
And here comes a very important part: When I'm talking about the outer RADIUS session I mean exactly this: RADIUS session between VPN server and RADIUS server. It has nothing to do with the TLS session between Supplicant and Authenticator. Those are completely separate!
It looks like such option does not exist on windows 10.mrz, I will gladly do that, if you can tell me where/how in Windows 10 "native client" can I do that? I just want to be able to configure this (otherwise wonderful new addition to ROS) reliably on my user's computers.
In fact, that is not possible to do (unless you terminate PEAP TLS session on the VPN server instead of passing it through to the RADIUS server, but you said you don't do that a few posts above). So please-please-please just put anonymized user-name (similar to what EAP-TTLS requires) in there. Most of the existing RADIUS servers will be happy to accept that.Yes, but to put username which is used in EAP-MSCHAP as radius user-name we have to parse EAP message, which currently is not done.
There are several types of EAP MSCHAP implementations (not to mention that they all are drafts and client or server may implement older draft version)even when using username in local-id section, in freeradius logs I see this error and can not login:
(5) mschap: ERROR: MS-CHAP2-Response is incorrect
(5) [mschap] = reject
(5) } # authenticate = reject
any help?
Hi mrz. I'm not sure if I understand why would that be a problem with mobile client. The client still receives all the routes, but Mikrotik doesn't know where to send the traffic because it doesn't have matching IPSec policy.Problem is not on RouterOS. Some mobile clients do not support multiple subnets.
Fixed in 6.39rc49Just to update the status of RADIUS problem: I was told by Mikrotik support via email that it will not be fixed yet: "Definately not in next RC, maybe after few versions. At the moment we want to fix more critical problems first."
There is not any option to set MSChapv2 type in FreeRadius and it only supports a single type.There are several types of EAP MSCHAP implementations (not to mention that they all are drafts and client or server may implement older draft version)
MS-EAP-Authentication (EAP/MS-CHAPv2) RFC-draft-kamath-pppext-eap-mschapv2-02.txt
PEAPv0/EAP-MSCHAPv2 RFC-draft-dpotter-pppext-eap-mschap-01.txt
In your case selected authentication on freeradius is not compatible with clients authentication algorithm.
What does 'itto work' and 'valid certificate' mean for me ? I want at least one functional method for IKEv2 to authenticate Win a iOS clients with Radius based on Windows Network Policy Server... Is it so much for Mikrotik to make it compatible and available for us? There is no reliable method nor config over the months/years what IKEv2 exists.Android client supports eap-only. Windows and ios does not. Maybe that is the problem. For itto work you need valid certificate on ipsec server
hamster is right, same in my environment with Windows Radius even with certificate installation.Certificate is now also installed on the NPS (RADIUS) server and the result is exactly the same as before.
Yep, same problem here as emiX is having. At first I was getting "no proposal chosen" errors, but after setting PFS group to "none" (which is kinda moronic default in Windows, but you can "conveniently" change that via PowerShell), it "established" the connection, but Windows asked me for username and password 2 more times before saying nope, f you, "Error processing Signature payload".
Soo... Good try Mikrotik, getting closer there, but nope, still not working.
"SSTP connection" with verify-client-certificate=yes ??? I don't think so, but if yes, please send your config with working NPS.I have the same problem wheter I use EAP-MSCHAPv2 method with certificate on mikrotik server or EAP-PEAP with certificate on Microsoft NPS.
I'm using Widnows 7 as a client. Certificates are correct because they work fo SSTP connection on the same mikrotik server and Windows client.
Okay, but if you use verify-client-certificate=no, you can connect success with any wrong cerfificate if you have correct xychap password :]No, "verify-client-certificate=yes" you can use only for mikrotik to mikrotik connections.
Windows native client doesn't support it. I was talking only about authenticating mikrotik SSTP server.
IKEv2 is already there and working. You need to update to the curren channel.+1 IKEv2
All Cloud Services like Google Cloud, AWS, AZURE need this type to connect VPN
have the same problem, server is not pushing route to client. My client is ROS 6.39.1i have insert 192.168.83.0/24 in mode-config for vpn and reconnect the vpn-client but the gateway will not push to them.
Syntax Problem?
[admin@router] /ip ipsec mode-config> print
Flags: * - default
0 * name="request-only"
1 name="cfg1" system-dns=yes static-dns="" address-pool=vpnpool
address-prefix-length=32 split-include=192.168.83.0/24
Ipsec is policy based, it is not supposed to push any routes.have the same problem, server is not pushing route to client. My client is ROS 6.39.1i have insert 192.168.83.0/24 in mode-config for vpn and reconnect the vpn-client but the gateway will not push to them.
Syntax Problem?
[admin@router] /ip ipsec mode-config> print
Flags: * - default
0 * name="request-only"
1 name="cfg1" system-dns=yes static-dns="" address-pool=vpnpool
address-prefix-length=32 split-include=192.168.83.0/24
Could you please look into my problem?Ipsec is policy based, it is not supposed to push any routes.
I also had a lot of trouble getting the configuration to work. Initially my connection ran fine but would disconnect every 8 minute when rekeying.Hamster,I apologize if this has been answered before, but I spent about 10 hours already trying to make a working config... Does anyone have a working IKEv2 for road warriors config that I could borrow as my starting point? I'm using ROS v6.38.
No need to apologise. It has taken me ages to get an IKEv2 based RoadWarrior setup working. I can confirm I got this working between Mikrotik and 3 devices, iPad, iPhone and MacBook Pro.
I am using 6.39rc12 and my IPSEC config is below:
Note I found this incredibly finnicky to get working. For example just viewing the Peer config page in webfig causes the remote certificate option to change (!) The EAP Radius doesn't work at all for me - RADIUS sends access accept but iOS clients complain:Code: Select all/ip ipsec mode-config set request-only name=request-only add address-pool=ipsec-pool address-prefix-length=24 name=cfg_priv split-include=0.0.0.0/0,<local subnet> system-dns=\ yes /ip ipsec policy group set default name=default /ip ipsec proposal set [ find default=yes ] auth-algorithms=sha256,sha1 disabled=no enc-algorithms=aes-256-cbc,aes-192-cbc,aes-128-cbc \ lifetime=1h name=default pfs-group=modp2048 /ip ipsec peer add address=0.0.0.0/0 auth-method=rsa-signature certificate=<cert name>_0 comment=IKEv2 dh-group=\ modp4096 disabled=no dpd-interval=2m enc-algorithm=aes-256 exchange-mode=ike2 generate-policy=port-strict \ hash-algorithm=sha512 lifetime=1d local-address=<public IP> mode-config=cfg_priv my-id=fqdn:<public URL> \ passive=yes policy-template-group=default send-initial-contact=no /ip ipsec policy set 0 disabled=no dst-address=0.0.0.0/0 group=default proposal=default protocol=all src-address=0.0.0.0/0 template=\ yes /ip ipsec user settings set xauth-use-radius=no set 0 dst-address=0.0.0.0/0 src-address=0.0.0.0/0
So I just use the rsa-signature option and then it works. You must use MobileConfig build a profile to load onto your iOS and MacBook to get the clients properly configured.Code: Select allJan 14 00:08:46 iPad neagent(NetworkExtension)[5207] <Error>: Authentication method did not match Jan 14 00:08:46 iPad neagent(NetworkExtension)[5207] <Error>: Failed to process IKE Auth packet
Hope this helps.
Achelon
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>PayloadContent</key>
<array>
<dict>
<key>IKEv2</key>
<dict>
<key>AuthenticationMethod</key>
<string>SharedSecret</string>
<key>ChildSecurityAssociationParameters</key>
<dict>
<key>DiffieHellmanGroup</key>
<integer>14</integer>
<key>EncryptionAlgorithm</key>
<string>AES-256</string>
<key>IntegrityAlgorithm</key>
<string>SHA2-256</string>
<key>LifeTimeInMinutes</key>
<integer>1440</integer>
</dict>
<key>DeadPeerDetectionRate</key>
<string>Medium</string>
<key>DisableMOBIKE</key>
<integer>0</integer>
<key>DisableRedirect</key>
<integer>0</integer>
<key>EnableCertificateRevocationCheck</key>
<integer>0</integer>
<key>EnablePFS</key>
<integer>0</integer>
<key>IKESecurityAssociationParameters</key>
<dict>
<key>DiffieHellmanGroup</key>
<integer>14</integer>
<key>EncryptionAlgorithm</key>
<string>AES-256</string>
<key>IntegrityAlgorithm</key>
<string>SHA2-256</string>
<key>LifeTimeInMinutes</key>
<integer>1440</integer>
</dict>
<key>LocalIdentifier</key>
<string>roadwarrior</string>
<key>RemoteAddress</key>
<string>example.com</string>
<key>RemoteIdentifier</key>
<string>example.com</string>
<key>SharedSecret</key>
<string>XXXXXXXXXXX</string>
<key>UseConfigurationAttributeInternalIPSubnet</key>
<integer>0</integer>
</dict>
<key>IPv4</key>
<dict>
<key>OverridePrimary</key>
<integer>0</integer>
</dict>
<key>PayloadDescription</key>
<string>Configures VPN settings</string>
<key>PayloadDisplayName</key>
<string>VPN</string>
<key>PayloadIdentifier</key>
<string>com.apple.vpn.managed.XXXX</string>
<key>PayloadType</key>
<string>com.apple.vpn.managed</string>
<key>PayloadUUID</key>
<string>XXXX</string>
<key>PayloadVersion</key>
<integer>1</integer>
<key>Proxies</key>
<dict>
<key>HTTPEnable</key>
<integer>0</integer>
<key>HTTPSEnable</key>
<integer>0</integer>
</dict>
<key>UserDefinedName</key>
<string>IPSEC</string>
<key>VPNType</key>
<string>IKEv2</string>
</dict>
</array>
<key>PayloadDisplayName</key>
<string>Untitled</string>
<key>PayloadIdentifier</key>
<string>XXXX</string>
<key>PayloadRemovalDisallowed</key>
<false/>
<key>PayloadType</key>
<string>Configuration</string>
<key>PayloadUUID</key>
<string>XXXX</string>
<key>PayloadVersion</key>
<integer>1</integer>
</dict>
</plist>
It is Apple bug. They do not do rekey correctly when DH group is anything less than 14I also had a lot of trouble getting the configuration to work. Initially my connection ran fine but would disconnect every 8 minute when rekeying.
Currently using 14, so that should work?It is Apple bug. They do not do rekey correctly when DH group is anything less than 14I also had a lot of trouble getting the configuration to work. Initially my connection ran fine but would disconnect every 8 minute when rekeying.
got itWhen you set exchange-mode=ike2
Thank you for your reply
Thank youWildcard certificates are supported only starting from v6.40rcXX version.
/ip ipsec peer print
0 R address=::/0 passive=yes auth-method=rsa-signature certificate=mktik.cert.pem_0 generate-policy=port-strict
policy-template-group=default exchange-mode=ike2 mode-config=ike2_cfg send-initial-contact=no hash-algorithm=sha1
enc-algorithm=aes-256,aes-192,aes-128 dh-group=modp1024 dpd-interval=disable-dpd
1 R address=::/0 passive=yes auth-method=rsa-signature certificate=mktik.cert.pem_0 generate-policy=port-strict
policy-template-group=default exchange-mode=ike2 mode-config=ike2_cfg send-initial-contact=no hash-algorithm=sha256
enc-algorithm=aes-256,aes-192,aes-128 dh-group=modp2048 dpd-interval=disable-dpd
/ip ipsec policy print
0 T * group=default src-address=0.0.0.0/0 dst-address=192.168.7.0/24 protocol=all proposal=default template=yes
1 T group=default src-address=0.0.0.0/0 dst-address=192.168.7.0/24 protocol=all proposal=dh14 template=yes
/ip ipsec proposal print
0 * name="default" auth-algorithms=sha256,sha1 enc-algorithms=aes-256-cbc,aes-192-cbc,aes-128-cbc lifetime=30m pfs-group=modp1024
1 name="dh14" auth-algorithms=sha256,sha1 enc-algorithms=aes-256-cbc,aes-192-cbc,aes-128-cbc lifetime=30m pfs-group=modp2048
I have upgraded to 6.40Wildcard certificates are supported only starting from v6.40rcXX version.
Hi Huntah,Hi all,
i have a working Roadwarrior setup IKEv2 but I would like to route all traffic accross the VPN not just SPLIT-Tunnel.
I cannot seem to make it work.
I get the default route (StrongSwan, even on Win10 with option to use remote default gateway) but it does not seem to work.
I think it is a probelm with masquerade.
The split-include for local subnet is working as it should.
Has anyone been able to Route all traffic over IKEv2. How?
I am using ROS 6.40.4
Oct 20 16:12:33 00[DMN] Starting IKE charon daemon (strongSwan 5.6.0, Android 8.0.0 - OPR4.170623.009/2017-10-05, Nexus 5X - google/bullhead/LGE, Linux 3.10.73-ga51b1600b7f8, aarch64)
Oct 20 16:12:33 00[LIB] loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls x509
Oct 20 16:12:33 00[JOB] spawning 16 worker threads
Oct 20 16:12:33 06[CFG] loaded user certificate 'CN=vpn-Nexus5X' and private key
Oct 20 16:12:33 06[CFG] loaded CA certificate 'CN=vpn-ca'
Oct 20 16:12:34 06[IKE] initiating IKE_SA android[22] to 95.91.XXX.XXX
Oct 20 16:12:34 06[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Oct 20 16:12:34 06[NET] sending packet: from 10.110.148.78[45519] to 95.91.XXX.XXX[500] (746 bytes)
Oct 20 16:12:34 09[NET] received packet: from 95.91.XXX.XXX[500] to 10.110.148.78[45519] (38 bytes)
Oct 20 16:12:34 09[ENC] parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
Oct 20 16:12:34 09[IKE] peer didn't accept DH group ECP_256, it requested MODP_1024
Oct 20 16:12:34 09[IKE] initiating IKE_SA android[22] to 95.91.XXX.XXX
Oct 20 16:12:34 09[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Oct 20 16:12:34 09[NET] sending packet: from 10.110.148.78[45519] to 95.91.XXX.XXX[500] (810 bytes)
Oct 20 16:12:34 11[NET] received packet: from 95.91.XXX.XXX[500] to 10.110.148.78[45519] (301 bytes)
Oct 20 16:12:34 11[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ ]
Oct 20 16:12:34 11[IKE] local host is behind NAT, sending keep alives
Oct 20 16:12:34 11[IKE] sending cert request for "CN=vpn-ca"
Oct 20 16:12:34 11[IKE] authentication of 'CN=vpn-Nexus5X' (myself) with RSA signature successful
Oct 20 16:12:34 11[IKE] sending end entity cert "CN=vpn-Nexus5X"
Oct 20 16:12:34 11[IKE] establishing CHILD_SA android{15}
Oct 20 16:12:34 11[ENC] generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Oct 20 16:12:34 11[NET] sending packet: from 10.110.148.78[43786] to 95.91.XXX.XXX[4500] (1628 bytes)
Oct 20 16:12:34 12[NET] received packet: from 95.91.XXX.XXX[4500] to 10.110.148.78[43786] (1548 bytes)
Oct 20 16:12:34 12[ENC] parsed IKE_AUTH response 1 [ CERT IDr AUTH N(INIT_CONTACT) CPRP(ADDR MASK DNS DNS) TSi TSr SA ]
Oct 20 16:12:34 12[IKE] received end entity cert "CN=569504bXXXXX.sn.mynetname.net"
Oct 20 16:12:34 12[CFG] using certificate "CN=569504bXXXXX.sn.mynetname.net"
Oct 20 16:12:34 12[CFG] using trusted ca certificate "CN=vpn-ca"
Oct 20 16:12:34 12[CFG] checking certificate status of "CN=569504bXXXXX.sn.mynetname.net"
Oct 20 16:12:34 12[CFG] certificate status is not available
Oct 20 16:12:34 12[CFG] reached self-signed root ca with a path length of 0
Oct 20 16:12:34 12[IKE] authentication of 'CN=569504bXXXXX.sn.mynetname.net' with RSA signature successful
Oct 20 16:12:34 12[CFG] constraint check failed: identity '569504bXXXXX.sn.mynetname.net' required
Oct 20 16:12:34 12[CFG] selected peer config 'android' inacceptable: constraint checking failed
Oct 20 16:12:34 12[CFG] no alternative config found
Oct 20 16:12:34 12[ENC] generating INFORMATIONAL request 2 [ N(AUTH_FAILED) ]
Oct 20 16:12:34 12[NET] sending packet: from 10.110.148.78[43786] to 95.91.XXX.XXX[4500] (76 bytes)
add common-name=569504bXXXXX.sn.mynetname.net subject-alt-name=[b]IP[/b]:569504bXXXXX.sn.mynetname.net key-usage=tls-server name=server1
add common-name=569504bXXXXX.sn.mynetname.net subject-alt-name=[b]DNS[/b]:569504bXXXXX.sn.mynetname.net key-usage=tls-server name=server1
03:52:21 ipsec ike auth: finish
03:52:21 ipsec my ID (DER): 192.168.111.11
03:52:21 ipsec processing payload: NONCE
03:52:21 ipsec adding payload: CERT
03:52:21 ipsec adding payload: ID_R
03:52:21 ipsec adding payload: AUTH
03:52:21 ipsec prepearing internal IPv4 address
03:52:21 ipsec prepearing internal IPv4 netmask
03:52:21 ipsec prepearing internal IPv4 DNS
03:52:21 ipsec adding payload: CONFIG
03:52:21 ipsec initiator selector: 192.168.77.254
03:52:21 ipsec adding payload: TS_I
03:52:21 ipsec responder selector: 0.0.0.0/0
03:52:21 ipsec adding payload: TS_R
03:52:21 ipsec adding payload: SA
03:52:21 ipsec IPsec-SA established: 192.168.111.242[4500]<->192.168.111.11[4500] spi=0x5abc024
03:52:21 ipsec IPsec-SA established: 192.168.111.11[4500]<->192.168.111.242[4500] spi=0x9b2a9f1
03:54:21 ipsec sending dpd packet
03:54:26 ipsec dpd: retransmit
03:54:31 ipsec dpd: retransmit
03:54:36 ipsec dpd: retransmit
03:54:41 ipsec dpd: retransmit
03:54:46 ipsec dpd: max retransmit failures reached
03:54:46 ipsec,info killing ike2 SA: 192.168.111.11[4500]-192.168.111.242[4500] spi:62a552307497bfe0:8a809506787dd7fa
04:18:01 ipsec ike auth: finish
04:18:01 ipsec my ID (DER): 192.168.111.11
04:18:01 ipsec processing payload: NONCE
04:18:01 ipsec adding payload: CERT
04:18:01 ipsec adding payload: ID_R
04:18:01 ipsec adding payload: AUTH
04:18:01 ipsec adding payload: NOTIFY
04:18:01 ipsec notify: INITIAL_CONTACT
04:18:01 ipsec prepearing internal IPv4 address
04:18:01 ipsec prepearing internal IPv4 netmask
04:18:01 ipsec prepearing internal IPv4 DNS
04:18:01 ipsec adding payload: CONFIG
04:18:01 ipsec initiator selector: 192.168.77.253
04:18:01 ipsec adding payload: TS_I
04:18:01 ipsec responder selector: 0.0.0.0/0
04:18:01 ipsec adding payload: TS_R
04:18:01 ipsec adding payload: SA
04:18:01 ipsec IPsec-SA established: 192.168.111.10[4500]<->192.168.111.11[4500] spi=0xcc3dd9d
04:18:01 ipsec IPsec-SA established: 192.168.111.11[4500]<->192.168.111.10[4500] spi=0x9e512210
04:20:01 ipsec sending dpd packet
04:20:01 ipsec ike2 reply, exchange: INFORMATIONAL:0 192.168.111.10[4500]
04:20:01 ipsec payload seen: ENC
04:20:01 ipsec processing payload: ENC
04:20:01 ipsec respond: info
General
######
Site to Site
IKE using Preshared Secret
Shared Secret: 123test
Local IKE ID: Firewall Identifier: 123test
Peer IKE ID: Firewall Identifier: 123test
Proposal
#######
IKE (Phase 1) Proposal
Exchange: IKEv2 Mode
DH Group: Group 2
Encryption: 3DES
Authentication: SHA1
PFS unchecked
Lifetime: 28800
# mar/21/2018 17:47:17 by RouterOS 6.41.3
# software id = 8EQD-U7QY
#
# model = RouterBOARD 750G r3
# serial number = xxxxxxxxxxxxxxxxxxx
/ip ipsec peer
add address=[peer public ip]/32 dh-group=modp1024 enc-algorithm=3des exchange-mode=ike2 lifetime=8h my-id=key-id:123test secret=123test
LOCAL PUBLIC IP: 1.1.1.1
REMOTE PUBLIC IP: 2.2.2.2
17:34:22 ipsec,debug ===== sending 292 bytes from 1.1.1.1[4500] to 2.2.2.2[4500]
17:34:22 ipsec,debug 1 times of 296 bytes message will be sent to 2.2.2.2[4500]
17:34:22 ipsec,debug ===== received 317 bytes from 2.2.2.2[4500] to 1.1.1.1[4500]
17:34:22 ipsec,debug 2a6775d0ad2aa7887c33fe1d68baf308966f0001
17:34:22 ipsec,debug => shared secret (size 0x80)
17:34:22 ipsec,debug xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx
17:34:22 ipsec,debug xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx
17:34:22 ipsec,debug xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx
17:34:22 ipsec,debug xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx
17:34:22 ipsec,debug => skeyseed (size 0x14)
17:34:22 ipsec,debug 2577407e b774290d 3e39eb4b 707c20d6 230ef24d
17:34:22 ipsec,debug => keymat (size 0x14)
17:34:22 ipsec,debug 624ce5f0 08623e82 87b28d17 27113d02 06b0c7b1
17:34:22 ipsec,debug => SK_ai (size 0x14)
17:34:22 ipsec,debug d2fcfce0 d2cd6146 1abd8150 8d890031 f3bac165
17:34:22 ipsec,debug => SK_ar (size 0x14)
17:34:22 ipsec,debug 5c0762a7 873595aa 5f7da9f2 2ba02666 ad1b4b4a
17:34:22 ipsec,debug => SK_ei (size 0x18)
17:34:22 ipsec,debug 75d1a8e3 954ad272 8c776663 aafd9d01 ecd0f694 b62b2a35
17:34:22 ipsec,debug => SK_er (size 0x18)
17:34:22 ipsec,debug 84fcc538 976c2fdf f442018e 72136907 b0f501d4 54f71a51
17:34:22 ipsec,debug => SK_pi (size 0x14)
17:34:22 ipsec,debug 5fc31380 08e5989e 23d7a820 1c11dca1 0d328d03
17:34:22 ipsec,debug => SK_pr (size 0x14)
17:34:22 ipsec,debug 46348d04 fa37f11a 0f1c2387 1db3ccf2 abb4002a
17:34:22 ipsec,info new ike2 SA (I): 1.1.1.1[4500]-2.2.2.2[4500] spi:5cf4c94886a6b4d4:0a004c31a26458fb
17:34:22 ipsec,debug c7fc48aefca0df916f8f74eb65c5e0d524f6d98e
17:34:22 ipsec,debug 7976fefe3e79c301fed37cd30b39aee781d297a8
17:34:22 ipsec,debug => auth nonce (size 0x14)
17:34:22 ipsec,debug 9697d571 77b90034 fca051b4 5732754f 68c93263
17:34:22 ipsec,debug => SK_p (size 0x14)
17:34:22 ipsec,debug 5fc31380 08e5989e 23d7a820 1c11dca1 0d328d03
17:34:22 ipsec,debug => idhash (size 0x14)
17:34:22 ipsec,debug bb65a017 adb8e84b c9c15df7 9afca8fa f4d67361
17:34:22 ipsec,debug => my auth (size 0x14)
17:34:22 ipsec,debug xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx
17:34:22 ipsec,debug => (size 0x11)
17:34:22 ipsec,debug 00000011 0b000000 43686162 6f743831 38
17:34:22 ipsec,debug => (size 0x1c)
17:34:22 ipsec,debug 0000001c 02000000 f43d1401 d278b36f 2e186170 7f4cd9be 1c770aef
17:34:22 ipsec,debug => (size 0x44)
17:34:22 ipsec,debug 00000044 00000040 01030405 067d0e4e 0300000c 0100000c 800e0100 0300000c
17:34:22 ipsec,debug 0100000c 800e00c0 0300000c 0100000c 800e0080 03000008 03000002 00000008
17:34:22 ipsec,debug 05000000
17:34:22 ipsec,debug => (size 0x18)
17:34:22 ipsec,debug 00000018 01000000 07000010 0000ffff 2d4919b2 2d4919b2
17:34:22 ipsec,debug => (size 0x18)
17:34:22 ipsec,debug 00000018 01000000 07000010 0000ffff 42aba3c2 42aba3c2
17:34:22 ipsec,debug ===== sending 356 bytes from 1.1.1.1[4500] to 2.2.2.2[4500]
17:34:22 ipsec,debug 1 times of 360 bytes message will be sent to 2.2.2.2[4500]
17:34:22 ipsec,debug ===== received 68 bytes from 2.2.2.2[4500] to 1.1.1.1[4500]
17:34:22 ipsec,debug => iv (size 0x8)
17:34:22 ipsec,debug 4559965b 17b5afb3
17:34:22 ipsec,debug => plain payload (trimmed) (size 0x8)
17:34:22 ipsec,debug 00000008 00000026
17:34:22 ipsec,debug decrypted
17:34:22 ipsec,error payload missing: ID_R
17:34:22 ipsec,debug ===== sending 68 bytes from 1.1.1.1[4500] to 2.2.2.2[4500]
17:34:22 ipsec,debug 1 times of 72 bytes message will be sent to 2.2.2.2[4500]
17:34:22 ipsec,info killing ike2 SA: 1.1.1.1[4500]-REMOREIP[4500] spi:5cf4c94886a6b4d4:0a004c31a26458fb
.I am trying to connect a RB450G to a pfSense 2.4.2 firewall as an IKEv2 client and tunnel all traffic over the tunnel.
by mrz » Thu Oct 16, 2014 11:23 amAs it was mentioned earlier in this topic
ROS v7.
my grandpa hopes to see ROS7 before he died
when can we test ROS7 with ikev2 server
How to configure ROS v6 IKEv2 to work with Apple IOS?What are you waiting? IKE2 was backported to v6 long time ago.
@MikroTikFan
What are you waiting? IKE2 was backported to v6 long time ago.
Sorry for my english...08:27:10 ipsec,info new ike2 SA (R): x.x.x.x[500]-y.y.y.y[500] spi:b28322b0e9c7ed28:bf5a4127e3c4fd79
08:27:10 ipsec,error EAP not configured
08:27:10 ipsec,info killing ike2 SA: x.x.x.x[4500]-y.y.y.y[4500] spi:b28322b0e9c7ed28:bf5a4127e3c4fd79
Thank you! It works now. IPhone successfully connected via ikev2.Did you configured IOS and ROS as stated in these notes?
https://wiki.mikrotik.com/wiki/Manual:I ... figuration
I think the reason of the disconnection was this.It is necessary to mark the self-signed CA certificate as trusted on the iOS device. This can be done in Settings -> General -> About -> Certificate Trust Settings menu.
In Wiki said: "Note: Currently RouterOS does not support any of EAP authentication methods".Currently no, User Manager currently does not support EAP so you will need external RADIUS. And xauth is not compatible with ike2.
correct i made it work for me... works with iOS, apple, windows and strongswan. assigning an static ip via radius works too.Yes, EAP pasthrough to external RADIUS is supported.
i made it with self signed CA...Hi mark,
I’ve got another thread about this open in the general forum, but did you use a third party ca or your own? I want to use a third party ca and can’t get it to work without installing the intermediate cert on the windows clients. if you did use a third party ca which one?
Thanks
Martin