I am connecting from a Mac, using an RSA cert. I generated the certificates following the wiki instructions and imported my client cert as .p12 in my Mac’s keychain. I also imported and marked as trusted the newly-generated ca cert. The imported certificate is selected on my Mac’s VPN config. macOS is 10.12.3.
When connecting, I get the following messages in the log:
new ike2 SA (R): x.x.x.x[500]-x.x.x.x[1011] spi:96afff1c45f978d5:eee52cf155d61186
EAP not configured
killing ike2 SA: x.x.x.x[4500]-x.x.x.x[64916] spi:96afff1c45f978d5:eee52cf155d61186
As I clearly have chosen RSA signature authentication, why is it attempting to use EAP instead?
So, in other words, in macOS, even when you choose certificate authentication, and do not have the option of entering a username and password, macOS is still attempting EAP, and the only way to solve this is to use a completely separate application, because heaven forbid that we have an “Advanced settings…” button that might confuse users if they clicked it.
In case this helps anyone, here is what I have in my Configurator profile:
IKE SA and Child SA parameters are the same.
You also need to import the ca cert and your client cert into the profile. Export the CA cert in PKCS1 format, and the Client cert in PKCS12 format with a password.
To avoid untrusted certificate warnings, first import the ca cert into Keychain Access, trust the ca cert, and then export it to a new file.
Import the now trusted ca cert into your Configurator profile, as well as the .p12 file for the Client cert. Make sure your client certificate’s CN matches the Local Identifier in your VPN profile.
Save the configurator profile. Double-click it on a Mac to install it. The same profile will work on any recent iOS device. Just email it to yourself and open the attachment.