]> git.ipfire.org Git - thirdparty/strongswan.git/commitdiff
testing: Make RADIUS server enforce client identity in certificate's CN
authorTobias Brunner <tobias@strongswan.org>
Thu, 16 May 2024 14:34:02 +0000 (16:34 +0200)
committerTobias Brunner <tobias@strongswan.org>
Mon, 17 Jun 2024 12:47:11 +0000 (14:47 +0200)
testing/tests/ikev2-stroke/rw-eap-tls-radius/evaltest.dat
testing/tests/ikev2-stroke/rw-eap-tls-radius/hosts/alice/etc/freeradius/3.0/mods-available/eap
testing/tests/ikev2-stroke/rw-eap-tls-radius/hosts/carol/etc/ipsec.conf
testing/tests/ikev2-stroke/rw-eap-tls-radius/hosts/moon/etc/ipsec.conf
testing/tests/ikev2/rw-eap-tls-radius/evaltest.dat
testing/tests/ikev2/rw-eap-tls-radius/hosts/alice/etc/freeradius/3.0/mods-available/eap
testing/tests/ikev2/rw-eap-tls-radius/hosts/carol/etc/swanctl/swanctl.conf
testing/tests/ikev2/rw-eap-tls-radius/hosts/moon/etc/swanctl/swanctl.conf

index 36c054419345e0d999a3a48671b0b0b12f52e614..37f8e06797eae7a76b1063b25e42cee063865a49 100644 (file)
@@ -1,7 +1,7 @@
 carol::cat /var/log/daemon.log::authentication of 'C=CH, O=strongSwan Project, CN=moon.strongswan.org' with RSA.* successful::YES
 carol::cat /var/log/daemon.log::server requested EAP_TLS authentication::YES
 carol::cat /var/log/daemon.log::authentication of 'C=CH, O=strongSwan Project, CN=moon.strongswan.org' with EAP successful::YES
-moon:: cat /var/log/daemon.log::authentication of 'C=CH, O=strongSwan Project, OU=Research, CN=carol@strongswan.org' with EAP successful::YES
+moon:: cat /var/log/daemon.log::authentication of 'carol@strongswan.org' with EAP successful::YES
 moon:: ipsec status 2> /dev/null::rw-eap.*ESTABLISHED::YES
 carol::ipsec status 2> /dev/null::home.*ESTABLISHED::YES
 carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_.eq=1::YES
index ac9bb3106e08bf43920ee834c9b0bf8fa88c9483..061d9ce14787e95bb33c6a2976d89bb60fbf638a 100644 (file)
@@ -7,6 +7,7 @@ eap {
     ca_file = ${cadir}/strongswanCert.pem
     cipher_list = "DEFAULT"
     random_file = ${certdir}/random
+    check_cert_cn = %{User-Name}
   }
 
   tls {
index 05702c4367f1fefee33a3fc81b578c54d3512447..b21cb3b039948401ddb7042211c449e9abfd141a 100644 (file)
@@ -10,6 +10,7 @@ conn %default
 conn home
        left=PH_IP_CAROL
        leftcert=carolCert.pem
+       leftid=carol@strongswan.org
        leftauth=eap
        leftfirewall=yes
        right=PH_IP_MOON
index d82b0d5bfc435ecb38bc5ac17deb8fd4015288bd..0395173300341f7eb121ca794267dd4d9e642ad8 100644 (file)
@@ -15,7 +15,7 @@ conn rw-eap
        leftcert=moonCert.pem
        leftauth=pubkey
        leftfirewall=yes
-       rightid="C=CH, O=strongSwan Project, OU=Research, CN=carol@strongswan.org"
+       rightid=carol@strongswan.org
        rightauth=eap-radius
        rightsendcert=never
        right=%any
index 46d88143c48a1354b05aa4b4e39ae1cd608b3c12..d323cf3c83526d57e57b743c721943624aeb68d0 100644 (file)
@@ -1,9 +1,9 @@
 carol::cat /var/log/daemon.log::authentication of 'C=CH, O=strongSwan Project, CN=moon.strongswan.org' with RSA.* successful::YES
 carol::cat /var/log/daemon.log::server requested EAP_TLS authentication::YES
 carol::cat /var/log/daemon.log::authentication of 'C=CH, O=strongSwan Project, CN=moon.strongswan.org' with EAP successful::YES
-moon:: cat /var/log/daemon.log::authentication of 'C=CH, O=strongSwan Project, OU=Research, CN=carol@strongswan.org' with EAP successful::YES
+moon:: cat /var/log/daemon.log::authentication of 'carol@strongswan.org' with EAP successful::YES
 carol::ping -c 1 PH_IP_ALICE::64 bytes from PH_IP_ALICE: icmp_.eq=1::YES
-carol::swanctl --list-sas --raw 2> /dev/null::home.*version=2 state=ESTABLISHED local-host=192.168.0.100 local-port=4500 local-id=C=CH, O=strongSwan Project, OU=Research, CN=carol@strongswan.org remote-host=192.168.0.1 remote-port=4500 remote-id=C=CH, O=strongSwan Project, CN=moon.strongswan.org initiator=yes.*encr-alg=AES_CBC encr-keysize=128 integ-alg=HMAC_SHA2_256_128 prf-alg=PRF_HMAC_SHA2_256 dh-group=CURVE_25519.*child-sas.*home.*state=INSTALLED mode=TUNNEL.*ESP.*encr-alg=AES_GCM_16 encr-keysize=128.*local-ts=\[192.168.0.100/32] remote-ts=\[10.1.0.0/16]::YES
-moon:: swanctl --list-sas --ike-id 1 --raw 2> /dev/null::rw-eap.*version=2 state=ESTABLISHED local-host=192.168.0.1 local-port=4500 local-id=C=CH, O=strongSwan Project, CN=moon.strongswan.org remote-host=192.168.0.100 remote-port=4500 remote-id=C=CH, O=strongSwan Project, OU=Research, CN=carol@strongswan.org.*encr-alg=AES_CBC encr-keysize=128 integ-alg=HMAC_SHA2_256_128 prf-alg=PRF_HMAC_SHA2_256 dh-group=CURVE_25519.*child-sas.*net.*reqid=1 state=INSTALLED mode=TUNNEL.*ESP.*encr-alg=AES_GCM_16 encr-keysize=128.*local-ts=\[10.1.0.0/16] remote-ts=\[192.168.0.100/32]::YES
+carol::swanctl --list-sas --raw 2> /dev/null::home.*version=2 state=ESTABLISHED local-host=192.168.0.100 local-port=4500 local-id=carol@strongswan.org remote-host=192.168.0.1 remote-port=4500 remote-id=C=CH, O=strongSwan Project, CN=moon.strongswan.org initiator=yes.*encr-alg=AES_CBC encr-keysize=128 integ-alg=HMAC_SHA2_256_128 prf-alg=PRF_HMAC_SHA2_256 dh-group=CURVE_25519.*child-sas.*home.*state=INSTALLED mode=TUNNEL.*ESP.*encr-alg=AES_GCM_16 encr-keysize=128.*local-ts=\[192.168.0.100/32] remote-ts=\[10.1.0.0/16]::YES
+moon:: swanctl --list-sas --ike-id 1 --raw 2> /dev/null::rw-eap.*version=2 state=ESTABLISHED local-host=192.168.0.1 local-port=4500 local-id=C=CH, O=strongSwan Project, CN=moon.strongswan.org remote-host=192.168.0.100 remote-port=4500 remote-id=carol@strongswan.org.*encr-alg=AES_CBC encr-keysize=128 integ-alg=HMAC_SHA2_256_128 prf-alg=PRF_HMAC_SHA2_256 dh-group=CURVE_25519.*child-sas.*net.*reqid=1 state=INSTALLED mode=TUNNEL.*ESP.*encr-alg=AES_GCM_16 encr-keysize=128.*local-ts=\[10.1.0.0/16] remote-ts=\[192.168.0.100/32]::YES
 moon::tcpdump::IP carol.strongswan.org > moon.strongswan.org: ESP::YES
 moon::tcpdump::IP moon.strongswan.org > carol.strongswan.org: ESP::YES
index ac9bb3106e08bf43920ee834c9b0bf8fa88c9483..061d9ce14787e95bb33c6a2976d89bb60fbf638a 100644 (file)
@@ -7,6 +7,7 @@ eap {
     ca_file = ${cadir}/strongswanCert.pem
     cipher_list = "DEFAULT"
     random_file = ${certdir}/random
+    check_cert_cn = %{User-Name}
   }
 
   tls {
index d8212a43583da1dad4d549b36707d2bc7a0d025b..da77ca6326e778a6b1ac1e7043b39ec0cc00d095 100755 (executable)
@@ -7,6 +7,7 @@ connections {
       local {
          auth = eap
          certs = carolCert.pem
+         id = carol@strongswan.org
          aaa_id = "C=CH, O=strongSwan Project, CN=aaa.strongswan.org"
       }
       remote {
index afed192d2fbbee30fe31c6aa4ef7f0874d05f354..c9279c631cb1a27d7eeea59cba14ae9aecd76db3 100755 (executable)
@@ -9,7 +9,7 @@ connections {
       }
       remote {
          auth = eap-radius
-         id = "C=CH, O=strongSwan Project, OU=Research, CN=carol@strongswan.org"
+         id = carol@strongswan.org
       }
       children {
          net {