Dopo aver seguito la guida da openwrt.org e sia riprovando oggi eseguendo lo script da github postato sopra non riesco a connettermi. Qualcuno sa come configurare l'app e se è solo un errore di configurazione? Questi sono i log del router (sull'app ho provato i due tipi IKEv2 EAP e IKEv2 Certificate + EAP)
Ho importato sul telefono e selezionato il certificato /tmp/myvpnclientCert.p12
App android strongSwan VPN type: IKEv2 EAP (Username/Password)
15[NET] received packet: from 62.19.XXX.X[25120] to 151.41.XXX.XXX[500] (716 bytes)
15[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
15[IKE] 62.19.XXX.X is initiating an IKE_SA
15[IKE] 62.19.XXX.X is initiating an IKE_SA
15[IKE] remote host is behind NAT
15[IKE] DH group ECP_256 inacceptable, requesting MODP_3072
15[ENC] generating IKE_SA_INIT response 0 [ N(INVAL_KE) ]
15[NET] sending packet: from 151.41.XXX.XXX[500] to 62.19.XXX.X[25120] (38 bytes)
06[NET] received packet: from 62.19.XXX.X[25120] to 151.41.XXX.XXX[500] (1036 bytes)
06[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
06[IKE] 62.19.XXX.X is initiating an IKE_SA
06[IKE] 62.19.XXX.X is initiating an IKE_SA
06[IKE] remote host is behind NAT
06[IKE] sending cert request for "C=US, O=Technicolor, CN=CATechnicolor"
06[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
06[NET] sending packet: from 151.41.XXX.XXX[500] to 62.19.XXX.X[25120] (615 bytes)
16[NET] received packet: from 62.19.XXX.X[25077] to 151.41.XXX.XXX[4500] (1364 bytes)
16[ENC] parsed IKE_AUTH request 1 [ EF(1/3) ]
16[ENC] received fragment #1 of 3, waiting for complete IKE message
07[NET] received packet: from 62.19.XXX.X[25077] to 151.41.XXX.XXX[4500] (1364 bytes)
07[ENC] parsed IKE_AUTH request 1 [ EF(2/3) ]
07[ENC] received fragment #2 of 3, waiting for complete IKE message
08[NET] received packet: from 62.19.XXX.X[25077] to 151.41.XXX.XXX[4500] (580 bytes)
08[ENC] parsed IKE_AUTH request 1 [ EF(3/3) ]
08[ENC] received fragment #3 of 3, reassembling fragmented IKE message
08[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
08[IKE] received 136 cert requests for an unknown ca
08[CFG] looking for peer configs matching 151.41.XXX.XXX[%any]...62.19.XXX.X[taan]
08[CFG] no matching peer config found
08[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
08[IKE] peer supports MOBIKE
08[ENC] generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
08[NET] sending packet: from 151.41.XXX.XXX[4500] to 62.19.XXX.X[25077] (80 bytes)
App android strongSwan VPN type: IKEv2 Certificate + EAP (Username/Password)
10[NET] received packet: from 62.19.XXX.X[24800] to 151.41.XXX.XXX[500] (716 bytes)
10[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
10[IKE] 62.19.XXX.X is initiating an IKE_SA
10[IKE] 62.19.XXX.X is initiating an IKE_SA
10[IKE] remote host is behind NAT
10[IKE] DH group ECP_256 inacceptable, requesting MODP_3072
10[ENC] generating IKE_SA_INIT response 0 [ N(INVAL_KE) ]
10[NET] sending packet: from 151.41.XXX.XXX[500] to 62.19.XXX.X[24800] (38 bytes)
11[NET] received packet: from 62.19.XXX.X[24800] to 151.41.XXX.XXX[500] (1036 bytes)
11[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
11[IKE] 62.19.XXX.X is initiating an IKE_SA
11[IKE] 62.19.XXX.X is initiating an IKE_SA
11[IKE] remote host is behind NAT
11[IKE] sending cert request for "C=US, O=Technicolor, CN=CATechnicolor"
11[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
11[NET] sending packet: from 151.41.XXX.XXX[500] to 62.19.XXX.X[24800] (615 bytes)
13[NET] received packet: from 62.19.XXX.X[24733] to 151.41.XXX.XXX[4500] (1364 bytes)
13[ENC] parsed IKE_AUTH request 1 [ EF(1/4) ]
13[ENC] received fragment #1 of 4, waiting for complete IKE message
05[NET] received packet: from 62.19.XXX.X[24733] to 151.41.XXX.XXX[4500] (1364 bytes)
05[ENC] parsed IKE_AUTH request 1 [ EF(2/4) ]
05[ENC] received fragment #2 of 4, waiting for complete IKE message
12[NET] received packet: from 62.19.XXX.X[24733] to 151.41.XXX.XXX[4500] (1364 bytes)
12[ENC] parsed IKE_AUTH request 1 [ EF(3/4) ]
12[ENC] received fragment #3 of 4, waiting for complete IKE message
12[NET] received packet: from 62.19.XXX.X[24733] to 151.41.XXX.XXX[4500] (468 bytes)
12[ENC] parsed IKE_AUTH request 1 [ EF(4/4) ]
12[ENC] received fragment #4 of 4, reassembling fragmented IKE message
12[ENC] parsed IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) N(AUTH_FOLLOWS) ]
12[IKE] received cert request for "C=US, O=Technicolor, CN=CATechnicolor"
12[IKE] received 136 cert requests for an unknown ca
12[IKE] received end entity cert "C=US, O=Technicolor, CN=myvpnclient"
12[CFG] looking for peer configs matching 151.41.XXX.XXX[%any]...62.19.XXX.X[C=US, O=Technicolor, CN=myvpnclient]
12[CFG] selected peer config 'roadwarrior'
12[CFG] using trusted ca certificate "C=US, O=Technicolor, CN=CATechnicolor"
12[CFG] checking certificate status of "C=US, O=Technicolor, CN=myvpnclient"
12[CFG] certificate status is not available
12[CFG] reached self-signed root ca with a path length of 0
12[CFG] using trusted certificate "C=US, O=Technicolor, CN=myvpnclient"
12[IKE] authentication of 'C=US, O=Technicolor, CN=myvpnclient' with RSA_EMSA_PKCS1_SHA2_256 successful
12[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
12[IKE] peer supports MOBIKE
12[IKE] authentication of 'XXXXX.ddnsking.com' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
12[IKE] sending end entity cert "C=US, O=Technicolor, CN=XXXXX.ddnsking.com"
12[ENC] generating IKE_AUTH response 1 [ IDr CERT AUTH ]
12[NET] sending packet: from 151.41.XXX.XXX[4500] to 62.19.XXX.X[24733] (1248 bytes)
15[NET] received packet: from 62.19.XXX.X[24733] to 151.41.XXX.XXX[4500] (80 bytes)
15[ENC] parsed IKE_AUTH request 2 [ IDi ]
15[IKE] peer requested EAP, config inacceptable
15[CFG] no alternative config found
15[ENC] generating IKE_AUTH response 2 [ N(AUTH_FAILED) ]
15[NET] sending packet: from 151.41.XXX.XXX[4500] to 62.19.XXX.X[24733] (80 bytes)