Actions
Feature #16287
openIPSec does not allow to configure the full CA chain
Status:
New
Priority:
Normal
Assignee:
-
Category:
IPsec
Target version:
-
Start date:
Due date:
% Done:
0%
Estimated time:
Release Notes:
Default
Description
I'm configuring a mutual certificate authentication IPSec VPN using Let's Encrypt certificates. pfSense only allows to specify the intermediate CA as the "Peer Certificate Authority". However, Strongswan expects the full CA chain in the x509ca
folder in order to validate the trust chain.
As such, the following error is emitted when building the tunnel
received cert request for unknown ca with keyid f8:16:51:3c:fd:1b:44:9f:2e:6b:28:a1:97:22:1f:b8:1f:51:4e:3c
While the following would be expected:
using certificate "CN=host.example.com" using trusted intermediate ca certificate "C=US, O=Let's Encrypt, CN=E6" using trusted ca certificate "C=US, O=Internet Security Research Group, CN=ISRG Root X2" certificate status is good
Files
Actions