找回密码
 注册

QQ登录

只需一步,快速开始

搜索
查看: 11503|回复: 0

[radius] MikroTik配合Windows server 2016 NPS,IKEv2-VPN认证失败

[复制链接]
发表于 2021-7-5 21:05:07 | 显示全部楼层 |阅读模式

马上注册,结交更多好友,享用更多功能,让你轻松玩转社区。

您需要 登录 才可以下载或查看,没有账号?注册

×
本帖最后由 e_zhangiso 于 2021-7-5 21:05 编辑

这段时间闲来无事,想测试下ros的IPsec通过radius认证,按照MikroTik 2019 MUM专家的教程进行设置,Radius Server我使用的是Windows Server 2016 NPS,认证过程中,证书认证通过,帐户认证始终通不过,不知什么原因,后来将Radius Server更换为TekRADIUS,还是同样的结果,请各路大神解惑,附图:

strongSwan 认证失败日志:

Jul  5 16:26:32 00[DMN] +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Jul  5 16:26:32 00[DMN] Starting IKE service (strongSwan 5.9.1rc1, Android 9 - PAR-AL00 9.1.0.353(C00E351R1P1)/2020-07-01, PAR-AL00 - HUAWEI/PAR-AL00/HUAWEI, Linux 4.9.148, aarch64)
Jul  5 16:26:32 00[LIB] loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls x509
Jul  5 16:26:32 00[JOB] spawning 16 worker threads
Jul  5 16:26:32 06[IKE] initiating IKE_SA android[14] to 116.10.131.230
Jul  5 16:26:32 06[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Jul  5 16:26:32 06[NET] sending packet: from 10.10.53.112[41282] to 116.10.131.230[500] (716 bytes)
Jul  5 16:26:33 07[NET] received packet: from 116.10.131.230[500] to 10.10.53.112[41282] (38 bytes)
Jul  5 16:26:33 07[ENC] parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
Jul  5 16:26:33 07[IKE] peer didn't accept DH group ECP_256, it requested MODP_2048
Jul  5 16:26:33 07[IKE] initiating IKE_SA android[14] to 116.10.131.230
Jul  5 16:26:33 07[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
Jul  5 16:26:33 07[NET] sending packet: from 10.10.53.112[41282] to 116.10.131.230[500] (908 bytes)
Jul  5 16:26:33 10[NET] received packet: from 116.10.131.230[500] to 10.10.53.112[41282] (429 bytes)
Jul  5 16:26:33 10[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ ]
Jul  5 16:26:33 10[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Jul  5 16:26:33 10[IKE] local host is behind NAT, sending keep alives
Jul  5 16:26:33 10[IKE] sending cert request for "DC=net, DC=testenterprise, CN=testenterprise-DC-CA"
Jul  5 16:26:33 10[IKE] establishing CHILD_SA android{13}
Jul  5 16:26:33 10[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
Jul  5 16:26:33 10[NET] sending packet: from 10.10.53.112[44067] to 116.10.131.230[4500] (448 bytes)
Jul  5 16:26:33 14[NET] received packet: from 116.10.131.230[4500] to 10.10.53.112[44067] (2096 bytes)
Jul  5 16:26:33 14[ENC] parsed IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ]
Jul  5 16:26:33 14[IKE] received end entity cert "CN=ikev2.vpn.net"
Jul  5 16:26:33 14[CFG]   using certificate "CN=ikev2.vpn.net"
Jul  5 16:26:33 14[CFG]   using trusted ca certificate "DC=net, DC=testenterprise, CN=testenterprise-DC-CA"
Jul  5 16:26:33 14[CFG] checking certificate status of "CN=ikev2.vpn.net"
Jul  5 16:26:33 14[CFG]   fetching crl from 'ldap:///CN=testenterprise-DC-CA,CN=dc,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=testenterprise,DC=net?certificateRevocationList?base?objectClass=cRLDistributionPoint' ...
Jul  5 16:26:33 14[LIB] unable to fetch from ldap:///CN=testenterprise-DC-CA,CN=dc,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=testenterprise,DC=net?certificateRevocationList?base?objectClass=cRLDistributionPoint, no capable fetcher found
Jul  5 16:26:33 14[CFG] crl fetching failed
Jul  5 16:26:33 14[CFG] certificate status is not available
Jul  5 16:26:33 14[CFG]   reached self-signed root ca with a path length of 0
Jul  5 16:26:33 14[IKE] authentication of 'ikev2.vpn.net' with RSA signature successful
Jul  5 16:26:33 14[IKE] server requested EAP_IDENTITY (id 0x00), sending 'itest1'
Jul  5 16:26:33 14[ENC] generating IKE_AUTH request 2 [ EAP/RES/ID ]
Jul  5 16:26:33 14[NET] sending packet: from 10.10.53.112[44067] to 116.10.131.230[4500] (80 bytes)
Jul  5 16:26:34 11[NET] received packet: from 116.10.131.230[4500] to 10.10.53.112[44067] (272 bytes)
Jul  5 16:26:34 11[ENC] parsed IKE_AUTH response 2 [ EAP/FAIL ]
Jul  5 16:26:34 11[IKE] received EAP_FAILURE, EAP authentication failed
Jul  5 16:26:34 11[ENC] generating INFORMATIONAL request 3 [ N(AUTH_FAILED) ]
Jul  5 16:26:34 11[NET] sending packet: from 10.10.53.112[44067] to 116.10.131.230[4500] (80 bytes)



QQ图片20210705162549.png
QQ图片20210705162857.png
QQ图片20210705202523.png
routeros
您需要登录后才可以回帖 登录 | 注册

本版积分规则

QQ|Archiver|手机版|小黑屋|软路由 ( 渝ICP备15001194号-1|渝公网安备 50011602500124号 )

GMT+8, 2024-5-4 00:31 , Processed in 0.067656 second(s), 5 queries , Gzip On, Redis On.

Powered by Discuz! X3.5 Licensed

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表