CONTAP-689361: Different PSKs for the same IKE local and remote identity pair within the same SVM could cause IKE negotiation failure
Issue
- Though strongSwan allows one to configure different PSKs for the same identity tuple (SVM, local_identity, remote_identity), users should be aware that this configuration is not guaranteed to work when negotiating with a different IKE implementation.
- When strongSwan is the initiator, it will pick the first PSK matching the identity tuple, and the responder needs to have that PSK in order to verify the IKE_AUTH message.
- When strongSwan is the responder and an IKE_AUTH message is received, it will try all PSKs of the same identity tuple until a successful verification is reached.
- If all PSKs are tried without verification, then it will respond with an authentication failure.
- ONTAP will allow users to configure different PSKs for the same identity tuple. But because of the possible negotiation failure when negotiating with a non-strongSwan partner, a mgwd.log warning message will be generated.
- The warning message is as follows:
Different PSKs for the same identities <%s> are detected. This could cause authentication failure during IKE negotiation.