casper8016's recent timeline updates
casper8016

casper8016

V2EX member #74069, joined on 2014-09-16 13:43:35 +08:00
casper8016's recent replies
Nov 3, 2016
Replied to a topic by casper8016 VPS linode 新加坡线路 渣
谢谢 提醒
Nov 3, 2016
Replied to a topic by casper8016 VPS linode 新加坡线路 渣
Tokyo 2

Retrofitted: N/A
Transit: NTT, Tata, PCCW (more to come)
Peering: BBIX

We ’ re opening a brand new Tokyo facility next month. This will enable customers in the region to take advantage of several recent Linode announcements: KVM hypervisor, our latest plan specs including double the RAM and SSD servers, and mass availability. Stay tuned for the announcement within the next few weeks.
Nov 3, 2016
Replied to a topic by casper8016 VPS linode 新加坡线路 渣
@seeley 之前他们家的 新加坡 最好的时候 160-180 带宽也足很不错 ,现在 我们都挪到 digitalocean 了 也不错
谢谢支持
@wzxjohn 请问一下 我按照这个配置 连接 IOS8 手机也安装了ca clinet 证书
但服务器输出
Aug 12 11:31:12 localhost strongswan: 16[IKE] 223.223.193.58 is initiating an IKE_SA
Aug 12 11:31:12 localhost strongswan: 16[IKE] IKE_SA (unnamed)[7] state change: CREATED => CONNECTING
Aug 12 11:31:12 localhost strongswan: 16[CFG] selecting proposal:
Aug 12 11:31:12 localhost strongswan: 16[CFG] no acceptable ENCRYPTION_ALGORITHM found
Aug 12 11:31:12 localhost strongswan: 16[CFG] selecting proposal:
Aug 12 11:31:12 localhost strongswan: 16[CFG] no acceptable DIFFIE_HELLMAN_GROUP found
Aug 12 11:31:12 localhost strongswan: 16[CFG] selecting proposal:
Aug 12 11:31:12 localhost strongswan: 16[CFG] proposal matches
Aug 12 11:31:12 localhost strongswan: 16[CFG] received proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
Aug 12 11:31:23 localhost charon: 05[JOB] deleting half open IKE_SA after timeout
Aug 12 11:31:23 localhost charon: 05[IKE] IKE_SA (unnamed)[6] state change: CONNECTING => DESTROYING
Aug 12 11:31:42 localhost charon: 02[JOB] deleting half open IKE_SA after timeout
Aug 12 11:31:42 localhost charon: 02[IKE] IKE_SA (unnamed)[7] state change: CONNECTING => DESTROYING


是 这个 no acceptable ENCRYPTION_ALGORITHM found 导致 没有连接的原因吗?
附上我的ipsec.conf
conn %default
keyexchange=ikev2
dpdaction=clear
dpddelay=5s
#auto destroy unused connections
rekey=no
left=%any
leftsubnet=0.0.0.0/0
leftcert=serverCert.pem
#server cert that will send to client
leftsendcert=always
#always send server cert
#not set may cause cert failed
right=%any
rightdns=8.8.8.8,8.8.4.4
#DNS send to client
rightsourceip=172.0.0.0/24
#DHCP Pool for client
conn IPSec-IKEv2
keyexchange=ikev2
leftid=106.187.42.230
#your servr name in cert "server.pem"
rightid=*@106.187.42.230
#define a suffix for user account
auto=add
conn IPSec-IKEv2-EAP
also="IPSec-IKEv2"
rightauth=eap-mschapv2
#define auth type to EAP
rightsendcert=never
#do not need client cert
eap_identity=%any
#any user can login successfully
我们这边 主要是做手机端的 ios 版本和 安卓版本 :)
About   ·   Help   ·   Advertise   ·   Blog   ·   API   ·   FAQ   ·   Solana   ·   3364 Online   Highest 6679   ·     Select Language
创意工作者们的社区
World is powered by solitude
VERSION: 3.9.8.5 · 18ms · UTC 12:53 · PVG 20:53 · LAX 05:53 · JFK 08:53
♥ Do have faith in what you're doing.