HOW TO: Disable XAUTH on iPhone Cisco IPSec

Posted on 2011-10-13
Last Modified: 2012-05-12
I'm trying to setup an openswan VPN for use with iPhone, IPSec and identity certificates. However, the iPhone is set to use Extended Authentication (XAUTH) and something is failing during that part of the transaction.

I don't need or want Extended Authentication for this connection. Using the RSA certificates is enough. But the iPhone seems to be permanently set to use XAUTH. And if it is set to use XAUTH, the server has to be as well.

Question by:Mike R.
    LVL 31

    Expert Comment

    Have you disabled it on the VPN?

    Example: crypto isakmp key %sharedkeystring% address no-xauth

    This is probably the forum with the most chatter about something resembling your issue:

    I haven't read through it all, but a number of people mention adding in AES-128 into the cipher list, which I think from your earlier ticket you might not have had enabled.

    Hope this helps...
    LVL 3

    Author Comment

    by:Mike R.
    Hey Paranormastic,

    Thanks for the response. Unfortunately, when I disable it on the VPN gateway (server) i get a different error complaining that the initiator (the iPhone) wants XAUTH and we don't have it running.

    LVL 3

    Author Comment

    by:Mike R.
    I've requested that this question be deleted for the following reason:

    No reponses.
    LVL 3

    Accepted Solution

    The answer was, the /etc/pam.d/pluto file was corrupt. I coped the /etc/pam.d/pop file to /etc/pam.d/pluto and life is good again :-)
    LVL 31

    Assisted Solution

    Comment 36994285 should be marked as answer.  I think this has value and should not be deleted.
    LVL 3

    Author Closing Comment

    by:Mike R.
    Points for trying. No one else even traid :-)


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Article by: Ph0en1x3
    Abstract - With Apple producing millions of units annually, it might make good business sense to become an Apple Certified Development center. The iPhone, iPad, and iPod consistently use the same SDK and development methodologies and this process al…
    Let me explain this picture a little bit.  First, in case you haven't already guessed, you are looking at my 2 phones, an Android Samsung Galaxy S5 on the left and an iPhone 5 on the right.  They are on their respective cradles on my desk.  But, you…
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now