Does anybody know how to use Strongswan IKEv2 VPN without validating the FQDN on the CA ?
I'm trying to do the following loadbalancing setup using DNS:
server.hostname.com -> server1.hostname.com and server2.hostname.com
If I connect to server.hostname.com I get an AUTH_FAILED response because probably the hostname doesn't match the one on the Let's Encrypt certificate.
Is there any option to disable this validation and still allowing the user to connect ? Because when using L2TP with PSK it works perfectly, as there is no cert involved.
Apr 15 10:01:43 jp1 strongswan: 06[ENC] unknown attribute type (25)
Apr 15 10:01:43 jp1 strongswan: 06[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
Apr 15 10:01:43 jp1 strongswan: 06[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
Apr 15 10:01:43 jp1 strongswan: 06[IKE] peer supports MOBIKE
Apr 15 10:01:43 jp1 strongswan: 06[ENC] generating IKE_AUTH response 1 [ N(AUTH_FAILED) ]
Thanks in advance!