/docker-strongswan-2

Docker image providing StrongSwan for building VPN tunnels via IPSec.

Primary LanguagePythonMIT LicenseMIT

Docker Image with StrongSwan

Build Status Docker Pulls Github Stars Github Stars Github Forks

Overview

This is a Docker image deriving from the base-supervisor image. It adds the popular VPN software StrongSwan that allows you to create a VPN tunnel from common IKEv2 capable IPSec VPN clients right into your Docker stack. It can be useful, if you want to access your services remotely, but don't want your services (especially administration panels) to be visible on the public internet. This greatly reduces attack vectors malicious people can use to gain access to your system.

The image provides the following features:

  • StrongSwan Version 5.7.1
  • Road Warrior Setup for Remote Access / Mobile Devices
  • Dual-Stack Tunnel Broker (IPv4-over-IPv4, IPv4-over-IPv6, IPv6-over-IPv4, IPv6-over-IPv4)
  • Authentication Methods
    • IKEv2 certificate authentication
    • IKEv2 EAP-TLS (certificate authentication)
  • Internal Certificate Authority
    • Creates a server certificate for StrongSwan and client certificates to authenticate VPN clients
    • Supports RSA/ECC certificates
      • RSA: 2048/3072/4096 bit
      • ECC: secp256r1 (NIST/SECG curve over a 256 bit prime field) (aka P-256, prime256v1)
      • ECC: secp384r1 (NIST/SECG curve over a 384 bit prime field) (aka P-384)
      • ECC: secp521r1 (NIST/SECG curve over a 521 bit prime field) (aka P-521)
  • Internal DNS forwarder provides name resolution services to VPN clients using...
    • Docker's embedded DNS (containers can be accessed by their name)
    • External DNS servers
  • High performance by using the kernel's NETKEY IPSec stack (kernel 2.6+)
  • Communication between VPN clients
  • Internet access over the VPN
    • IPv4: Masquerading
    • IPv6: Masquerading / Global Unicast Address (GUA)
  • Tested Clients

Usage

The container needs your docker host to have IPv6 up and running. Please see here for details on how to enable IPv6 support.

Step 1 - Configuring a User-Defined Network

One thing to consider is that resolving container names depends on docker's embedded DNS server. The DNS server resolves container names that are in the same user-defined networks as the strongswan container. If you do not already have an user-defined network for public services, you can create a simple bridge network (called internet in the example below) and define the subnets, from which docker will allocate ip addresses for containers. Most probably you will have only one IPv4 address for your server, so you should choose a subnet from the site-local ranges (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16). Docker takes care of connecting published services to the public IPv4 address of the server. Any IPv6 enabled server today has at least a /64 subnet assigned, so any single container can have its own IPv6 address, network address translation (NAT) is not necessary. Therefore you should choose an IPv6 subnet that is part of the subnet assigned to your server. Docker recommends to use a subnet of at least /80, so it can assign IP addresses by ORing the (virtual) MAC address of the container with the specified subnet.

docker network create -d bridge \
  --subnet 192.168.0.0/24 \
  --subnet 2001:xxxx:xxxx:xxxx::/80 \
  --ipv6 \
  internet

Step 2 - Create a Volume for the StrongSwan Container

The strongswan container generates some data (e.g. keys, certificates, settings) that must be persisted. If you are familiar with docker you can also choose to map the data volume to your host, but named volumes are a more natural choice.

You can create a named volume using the following command:

docker volume create strongswan-data

Step 3 - Initialize the Internal CA

The strongswan container assists with setting up a basic Public Key Infrastructure (PKI). The internal CA maintained by the container itself provides everything needed to generate server certificates to authenticate the server, client certificates to authenticate clients and a Certificate Revocation List (CRL) to disable clients by revoking the corresponding certificates. All RSA keys are 4096 bit. The expiry period of the CA certificate and the generated CRL is 10 years. Such a long expiry period is rather uncommon for CAs, but it ensures that strongswan remains working. An expired CRL would otherwise block all connections to the VPN server.

The initialization of the internal CA sets the key/certificate types the CA will use to create its own certificate, server certificates and client certificates. Usually the key of the CA is stronger than the key of the server or client, since the key of a root CA is very long-lived and the most important supporting pillar in a PKI. RSA certificates are a good choice, if you want to guarantee compatability. Almost all clients support RSA, but RSA keys are much bigger than ECC keys providing the same level of security. On the other hand, ECC keys are small and therefore cryptographic operations are much faster compared to RSA. If you know that your clients support ECC, you will get the best performance using ECC keys. As long as quantum computers are not a real threat, a secure and future-proof choice is rsa4096 or secp384r1 for the CA and rsa3072 or secp256r1 for server/client keys.

The following key types are supported:

Key Type Description
rsa2048 RSA, 2048 bit
rsa3072 RSA, 3072 bit
rsa4096 RSA, 4096 bit
secp256r1 ECC, NIST/SECG curve over a 256 bit prime field (aka P-256, prime256v1)
secp384r1 ECC, NIST/SECG curve over a 384 bit prime field (aka P-384)
secp521r1 ECC, NIST/SECG curve over a 521 bit prime field (aka P-521)

Beside the key types the subject that is written into the root certificate of the internal CA must also be set. This is done using the --ca-cert-subject parameter. The subject for server/client certificates is set analogously using the --server-cert-subject parameter respectively the --client-cert-subject parameter. All these parameters expect a properly formatted Distinguished Name (DN). A DN describes the entity (CA, server, client) a certificate refers to. It consists of a list of hierarchically sorted attributes and looks like the following CN=VPN Root CA,OU=Engineering,O=My Company,C=DE. The following (common) attribute types are supported:

Attribute Type Description
CN Common Name
C Country Name (2-letter code, e.g. DE or US)
L Locality Name
O Organization Name
OU Organizational Unit Name
ST State/Province

The internal CA can be set up interactively using the following command. You will be prompted to enter a password to protect the CA's private key.

docker run -it \
  -v strongswan-data:/data \
  griffinplus/strongswan \
  init \
  --ca-key-type=<key-type> \
  --server-key-type=<key-type> \
  --client-key-type=<key-type> \
  --ca-cert-subject=<subject-dn> \
  --server-cert-subject=<subject-dn> \
  --client-cert-subject=<subject-dn>

The internal CA can be initialized using the --ca-pass command line parameter or stdin to feed in the password as well. Using stdin is the recommended way as the password cannot leak via process lists or docker's inspection features:

docker run \
  -v strongswan-data:/data \
  griffinplus/strongswan \
  init \
  --ca-pass=<my-ca-secret> \
  --ca-key-type=<key-type> \
  --server-key-type=<key-type> \
  --client-key-type=<key-type> \
  --ca-cert-subject=<subject-dn> \
  --server-cert-subject=<subject-dn> \
  --client-cert-subject=<subject-dn>
  
echo -e "<my-ca-secret>" | docker run -i \
  -v strongswan-data:/data \
  griffinplus/strongswan \
  init \
  --ca-key-type=<key-type> \
  --server-key-type=<key-type> \
  --client-key-type=<key-type> \
  --ca-cert-subject=<subject-dn> \
  --server-cert-subject=<subject-dn> \
  --client-cert-subject=<subject-dn>

Step 4 - Run the StrongSwan Container

Although the container comes with a set of sensible default settings, some settings still need to be configured to suit your needs:

docker run -it \
  --name strongswan-vpn \
  --ip6=2001:xxxx:xxxx:xxxx::2 \
  --network internet \
  --publish 500:500/udp \
  --publish 4500:4500/udp \
  --volume /lib/modules:/lib/modules:ro \
  --volume strongswan-data:/data \
  --cap-add NET_ADMIN \
  --cap-add SYS_MODULE \
  --cap-add SYS_ADMIN \
  --security-opt apparmor=unconfined \
  --security-opt seccomp=unconfined \
  --env VPN_HOSTNAMES="vpn.my-domain.com" \
  griffinplus/strongswan \
  run-and-enter

This creates and starts a strongswan container with the name strongswan-vpn and attaches it to the user-defined network internet that was created at step 1 using the specified IPv6 address. The IPv6 address must be specified explicitly to ensure that the address is always the same - even, if the container is restarted. This is necessary, if you intend to create DNS records for the VPN server, so clients can use a readable and memorizable hostname instead of a long IPv6 address. The IPv4 address is automatically assigned by docker. Usually there is no need to enforce a certain IPv4 address, because docker maps published ports to the appropriate host interfaces.

The ports 500 (ISAKMP) and 4500 (NAT-Traversal) are published to tell docker to map these ports to all host interfaces. It is worth noticing that these port mappings only effect IPv4. IPv6 is not influenced by docker, so there is no filtering or firewalling done! The strongswan container takes care of this and implements a firewall to protect itself and connected VPN clients.

The container needs a few additional capabilities to work properly. The NET_ADMIN capability is needed to configure network interfaces and the iptables firewall. The SYS_MODULE capability is needed to load kernel modules that are required for operation. The SYS_ADMIN capability is needed to remount the /proc/sys filesystem as read-write, so sysctl can configure network related settings. Some strongswan modules seem to require kernel calls that are disabled by docker's default seccomp profile, so we need to disable seccomp entirely (at least until it's clear which kernel calls strongswan needs to operate). The same applys to the apparmor profile. Although that's not the best approach, it's slightly better than running the container in privileged mode.

At last the container specific setting VPN_HOSTNAMES tells the container under which FQDNs the strongswan container will be seen on the internet. Multiple names can be separated by comma. You should list all names here that are published in the DNS. If you use the internal CA to create a server certificate (which is the default) these names are included in the server certificate.

The container can be configured using the following environment variables:

ALLOW_INTERCLIENT_COMMUNICATION

Determines whether VPN clients are allowed to communicate with each other.

  • true, 1 => VPN clients are allowed to communicate with each other.
  • false, 0 => VPN clients are not allowed to communicate with each other.

Default Value: false

CLIENT_SUBNET_IPV4

Determines the subnet from which IPv4 addresses are assigned to VPN clients. The subnet should be one of the following or a subnet of one of them to avoid conflicts with global addresses:

  • 10.0.0.0/8
  • 172.16.0.0/12
  • 192.168.0.0/16

Default: 10.0.0.0/24

CLIENT_SUBNET_IPV6

Determines the subnet from which IPv6 addresses are assigned to VPN clients. The subnet can either be a subnet in the Unique Local Unicast Address (ULA, fc00::/7) range or in the Global Unicast Address (GUA, 2000::/3) range.

Unique Local Addresses (ULA)

A subnet in the ULA range has the benefit that these IP addresses are not visible on the public internet. The IP addresses are only used by the VPN server and its clients to communicate with each other. There is no additional setup needed to get it working. Any communication with the public internet is done using Masquerading, a network address translation (NAT) technique that replaces internal IP addresses with the IP address of the VPN server for connections to the public internet. Although masquerading works really well for most protocols it can cause strange effects with some protocols, especially when multiple clients using the same protocol are involved. A tiny plus of using masquerading is that the IP address of a VPN client cannot be determined by visited sites as the IP address of the VPN server is used as the source address in packets.

You should consider RFC 4193 for details on how to choose a proper subnet from the ULA range. To cut a long story short, you should use the "randomly" generated approach (fd00::/8) and build the prefix using the following blueprint: fdxx xxxx xxxx yyyy zzzz zzzz zzzz zzzz, where x is a random site id, y is a random subnet id within the site and z is the hosts part within that subnet. This guarantees that the chosen subnet does not conflict with global addresses and makes it very unlikely to conflict with other subnets at your site.

Global Unicast Addresses (GUA)

A subnet in the GUA range has the benefit that VPN clients have direct access to the public internet and no network address translation (NAT) is needed that might cause issues with some protocols. By default new connections from the public internet to VPN clients are blocked by the internal firewall. Please see PROTECT_CLIENTS_FROM_INTERNET for details on how to disable this protection.

In order to use a GUA subnet you must configure your host to forward packets that are adressed to the specified subnet to the container, otherwise internet access will not work:

ip -6 route add <client-subnet> via <container-ip>

Furthermore the ISP needs to know which IPv6 addresses are in use to route traffic for these addresses to the host. The strongswan container maintains the NDP proxy table as VPN clients connect/disconnect. But this information is available from within the container only. An ndppd with the following configuration takes the information out to the ISP (most probably you already have ndppd in place to get IPv6 working with docker):

# /etc/ndppd.conf
proxy eth0 {
  rule <client-subnet> {
    auto
  }
}

Default: fd00:dead:beef:affe::/64 (ULA, Site-ID: dead:beef, Subnet-ID: affe)

DNS_SERVERS

Determines the DNS servers name resolution requests are forwarded to, if USE_DOCKER_DNS is false.

Default Value: 8.8.8.8, 8.8.4.4, 2001:4860:4860::8888, 2001:4860:4860::8844 (Google Public DNS)

ESP_PROPOSALS

Determines the algorithms to propose for ESP. The proposal is directly passed to strongswan in the esp setting. The default selection of proposed algorithms should be secure and cover most clients at the same time. It does not contain algorithms that are known to be broken, only reliable ones.

A list of algorithms can be found here.

Default Value:

aes128gcm8-aes128gcm12-aes128gcm16-aes256gcm8-aes256gcm12-aes256gcm16-aes128ccm8-aes128ccm12-aes128ccm16-aes256ccm8-aes256ccm12-aes256ccm16-modp2048-modp3072-modp4096-modp6144-modp8192-ecp192-ecp224-ecp256-ecp384-ecp521-ecp224bp-ecp256bp-ecp384bp-ecp512bp-curve25519,
aes128-aes256-md5-md5_128-sha1-sha1_160-aesxcbc-aescmac-sha256-sha384-sha512-modp2048-modp3072-modp4096-modp6144-modp8192-ecp192-ecp224-ecp256-ecp384-ecp521-ecp224bp-ecp256bp-ecp384bp-ecp512bp-curve25519

IKE_PROPOSALS

Determines the algorithms to propose for IKE. The proposal is passed to strongswan in the ike setting. The default selection of proposed algorithms should be secure and cover most clients at the same time. It does not contain algorithms that are known to be broken, only reliable ones.

A list of algorithms can be found here.

Default Value:

aes128gcm8-aes128gcm12-aes128gcm16-aes256gcm8-aes256gcm12-aes256gcm16-aes128ccm8-aes128ccm12-aes128ccm16-aes256ccm8-aes256ccm12-aes256ccm16-prfmd5-prfsha1-prfaesxcbc-prfaescmac-prfsha256-prfsha384-prfsha512-modp2048-modp3072-modp4096-modp6144-modp8192-ecp192-ecp224-ecp256-ecp384-ecp521-ecp224bp-ecp256bp-ecp384bp-ecp512bp-curve25519,
aes128-aes256-md5-sha1-aesxcbc-aescmac-sha256-sha384-sha512-prfmd5-prfsha1-prfaesxcbc-prfaescmac-prfsha256-prfsha384-prfsha512-modp2048-modp3072-modp4096-modp6144-modp8192-ecp192-ecp224-ecp256-ecp384-ecp521-ecp224bp-ecp256bp-ecp384bp-ecp512bp-curve25519

PROTECT_CLIENTS_FROM_INTERNET

Determines whether VPN clients can be accessed from the public internet, i.e. whether new connections can be established from the public internet. Connections that are initiated by VPN clients are not effected. This setting only takes effect, if CLIENT_SUBNET_IPV6 specifies a subnet in the GUA range.

  • true, 1 => VPN clients are protected, i.e. they cannot be accessed from the public internet.
  • false, 0 => VPN clients are not protected, i.e. they can be accessed from the public internet.

Default Value: true

STARTUP_VERBOSITY

Determines the verbosity of the Griffin+ Container Startup System (see here for details).

  • 0 => Logging is disabled.
  • 1 => Only errors are logged.
  • 2 => Errors and warnings are logged.
  • 3 => Errors, warnings and notes are logged.
  • 4 => Errors, warnings, notes and infos are logged.
  • 5 => All messages (incl. debug) are logged.

Default Value: 4

USE_DOCKER_DNS

Determines whether the built-in DNS server forwards name resolution requests to Docker's embedded DNS server.

  • true, 1 => Docker's Embedded DNS Server is used (containers in user-defined networks can be accessed by their name).
  • false, 0 => External DNS servers are used (see DNS_SERVERS).

Default Value: true

VPN_HOSTNAMES

Determines the fully qualified hostnames of the VPN server. The internal Certificate Authority will create a server certificate for these hostnames telling clients that they are connected to the desired VPN server. Multiple hostnames must be separated by comma.

Default Value: hostname of the container

Step 5 - Attach Container to Additional Networks

At this stage the strongswan container should be able to accept VPN connections and allow VPN clients to access containers that are in the same user-defined network as the strongswan container. You can attach the strongswan container (named strongswan-vpn) to additional user-defined networks, so VPN clients can access them as well:

docker network connect <network> strongswan-vpn

Step 6 - Manage VPN Clients

This step applys only, if the strongswan container is configured to use the internal CA to authenticate clients. This is the case, if you followed the setup steps up to this point. If the container is configured to use an external CA for client authentication, the following commands are without effect.

A user (VPN client) is always identified by its e-mail address, so <id> in the examples below means a valid e-mail address. Furthermore users authenticate themselves against the VPN server using client certificates. A VPN client can have multiple client certificates.

Commands that add clients or enable/disable clients need the private key of the internal CA. The private key of the internal CA is stored on the volume. It is encrypted, if you entered a password when initializing the internal CA. In this case these commands need the password to perform the operation. The password can be specified via the command line parameter --ca-pass (not recommended, the password will be visible in the process list and via docker's inspection features). A better approach is to pipe the password in via stdin. The container must be run with the interactive flag (-i) to make it work. If you additionally attach a pseudo tty to the container you will be prompted to enter the password.

All commands support two output formats that are optimized for interactive use (text) and for scripting (tsv, tab-separated-values). The output format can be explicitly set by the --out-format=[text|tsv] parameter when running the command using docker run. If --out-format is not specified, the output format depends on whether the container has a pseudo TTY attached or not. If the command is run using docker run -it griffinplus/strongswan <cmd> (terminal mode) the container uses the text format, otherwise it uses the tsv format (scripting mode).

The text output format looks like the following:

| Identity       | Serial     | Not Before                | Not After                 | Revoked |
|----------------+------------+---------------------------+---------------------------+---------|
| alice@acme.com | 0000000003 | 2018/01/01 08:12:32 (UTC) | 2020/01/01 08:12:32 (UTC) |         |
| bob@acme.com   | 0000000001 | 2018/01/01 08:10:22 (UTC) | 2020/01/01 08:10:22 (UTC) |         |
| john@acme.com  | 0000000002 | 2018/01/01 08:11:00 (UTC) | 2020/01/01 08:11:00 (UTC) |         |
|----------------+------------+---------------------------+---------------------------+---------|

The tsv output format looks like the following (fields are separated by tabs, beautified for better readability here):

Identity        Serial  Not Before            Not After               Revoked
alice@acme.com  3       2018-01-01T08:12:32   2020-01-01T08:12:32
bob@acme.com    1       2018-01-01T08:10:22   2020-01-01T08:10:22
john@acme.com   2       2018-01-01T08:11:00   2020-01-01T08:11:00

Getting Clients

A list of VPN clients - respectively their certificates - that were created by the internal CA can be retrieved as follows:

docker run \
  -v strongswan-data:/data \
  griffinplus/strongswan \
  list clients

Adding a Client

A new VPN client - respectively a client certificate for a VPN client - can be created interactively or in a scripted fashion using the internal CA as follows:

# password prompt (interactive)
docker run -it \
  -v strongswan-data:/data \
  -v $PWD/client-data/:/data-out \
  griffinplus/strongswan \
  add client <id>

# passwords via command line parameters
docker run \
  -v strongswan-data:/data \
  -v $PWD/client-data/:/data-out \
  griffinplus/strongswan \
  add client <id> --ca-pass=<my-ca-secret> --pkcs12-pass=<my-pkcs12-secret>

# passwords via stdin
echo -e "<my-ca-secret>\n<my-pkcs12-secret>" | docker run -i \
  -v strongswan-data:/data \
  -v $PWD/client-data/:/data-out \
  griffinplus/strongswan \
  add client <id>

This example assumes that you have a directory client-data below your working directory. The internal CA will create a new 4096 bit RSA private key, a client certificate with an expiry period of 2 years and package everything together in a PKCS12 archive (most commonly known as .pfx or .p12 file). If the internal CA also creates the certificate for strongswan, the PKCS12 archive will also contain the CA certificate, so the VPN client will be able to check the authenticity of the VPN server. The PKCS12 archive is encrypted using the specified password and saved to the mounted output directory ($PWD/client-data).

Mixing command line parameters and stdin is also supported, but when stdin is used the order of parameters is significant:

  1. Password of the CA
  2. Password for the PKCS12 archive

Specifying --ca-pass or --pkcs12-pass overrides the corresponding passwords piped in via stdin.

Disabling/Re-enabling a Client

A VPN client can be disabled by revoking its client certificate and re-enabled by unrevoking the certificate. Revocations are stored in the Certificate Revocation List (CRL) of the internal CA and the CRL is read by strongswan at startup. After revoking/unrevoking a client certificate the strongswan container must be restarted, so strongswan reloads the CRL and the change becomes active. CRLs are a rather cumbersome thing to realize this functionality, but they are easier to handle than setting up an OCSP responder as professional CAs would do. The internal CA is made for tests and small scale deployments. If you plan to use this container in a large scale deployment, you should really consider using an external CA instead.

As with the other commands the password of the internal CA can be entered interactively, by command line parameter or via stdin. A certain certificate can be revoked/unrevoked by specifying its certificate serial number. If the serial number if omitted, all active certificates will be revoked.

# password prompt (interactive)
docker run -it \
  --volume strongswan-data:/data \
  griffinplus/strongswan \
  disable|enable client <id> [<certificate-serial>]

# password via command line parameters
docker run \
  --volume strongswan-data:/data \
  griffinplus/strongswan \
  disable|enable client <id> [<certificate-serial>] --ca-pass=<my-ca-secret>
  
# password via stdin
echo -e "<my-ca-secret>" | docker run -i \
  --volume strongswan-data:/data \
  griffinplus/strongswan \
  disable|enable client <id> [<certificate-serial>]

Customizations

Many customizations have already discussed above as they are configured using environment variables when running the container. Below you will find customizations that cannot be realized using configuration only.

Using an External CA

By default the strongswan container uses the internal CA to create the server certificate to authenticate the VPN server and client certificates to authenticate VPN clients. If you are concerned about security, you can use an external CA - most probably part of your corporate PKI - instead.

The strongswan container will take your external CA into account, if you provide the files server.key and server.crt containing the private key and the certificate for strongswan in /external-ca. This is enough to configure strongswan to authenticate itself using the specified certificate. If you specify client-ca.crt as well, strongswan will furthermore be configured to authenticate clients that have a valid client certificate issued by the associated CA. Key files and certificate files can either be PEM- or DER-encoded.

Configuring Clients

Windows 10 (Desktop, Integrated VPN Client)

By default, the Windows 10 Integrated VPN Client only offers a rather insecure set of algorithms. Other sites have illustrated this issue extensively, so here is the extract of the discussion only. The algorithms proposed by Windows 10 will not work with the algorithms proposed by the strongswan container out-of-the-box. By default Windows 10 proposes to use 3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, but neither 3DES_CBC for encryption nor a 1024 bit Diffie-Hellman group is a secure choice nowadays. Windows 10 can be configured to use more secure algorithms (AES_256_CBC for encryption and a 2048 bit Diffie-Hellman group) by adding the following registry snippet:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Parameters]
"NegotiateDH2048_AES256"=dword:00000001
Value Meaning
0 Disable AES-256-CBC and MODP-2048 (default)
1 Enable AES-256-CBC and MODP-2048
2 Enforce the usage of AES-256-CBC and MODP-2048

With this tiny modification, Windows 10 and the strongswan container will play together securely. Before you can set up a VPN connection, you need to import the client's private key and the client certificate into the user's certificate store and the certificate of the internal CA into the machine certificate store. The key and the certificates are contained in the PKCS12 archive that is created when adding a VPN client (see above). Sad to say that you have to import the PKCS12 archive twice to get the certificates in place (if somebody knows, why this is necessary and how one can circumvent this issue, please let me know!). The VPN connection can now be set up manually (IKEv2, Authentication with EAP-TLS using certificates). Alternatively the following PowerShell script can be used as well (please adjust -ServerAddress to fit your setup):

PS C:\> $tlsauth = New-EapConfiguration -tls -VerifyServerIdentity -UserCertificate
PS C:\> Add-VpnConnection -Name "My-VPN-Connection" -ServerAddress "vpn.my-domain.com" -TunnelType "IKEv2" -EncryptionLevel "Required" -AuthenticationMethod Eap -EapConfigXmlStream $tlsauth.EapConfigXmlStream -PassThru

At this point you should be able to connect to the strongswan container with default settings. You can dig a bit deeper and select more secure or faster ciphers, if you want. I recommend using AES-128-GCM. It is both a secure and fast choice, since AES in Galois/Counter Mode (GCM) is an Authenticated Encryption with Associated Data (AEAD) algorithm that ensures both confidentiality and authenticity at the same time eliminating the need for a separate integrity algorithm. The following Powershell snippet will set it up. Don't get confused by the -IntegrityCheckMethod parameter, it is required for the cmdlet, but ignored in GCM mode. The snippet will furthermore configure the Diffie Hellman Group used for IKE key exchanges (-DHGroup) and the Perfect Forward Secrecy (PFS) Group (-PfsGroup) in the IPSec policy. Details concerning the Set-VpnConnectionIPSecConfiguration function can be found here:

PS C:\> Set-VpnConnectionIPsecConfiguration `
           -ConnectionName "My-VPN-Connection" `
           -AuthenticationTransformConstants GCMAES128 `
           -CipherTransformConstants GCMAES128 `
           -EncryptionMethod GCMAES128 `
           -IntegrityCheckMethod SHA384 `
           -PfsGroup ECP384 `
           -DHGroup ECP384 `
           -PassThru `
           -Force

Android StrongSwan App

The StrongSwan App is the natural choice when connecting an Android device to the VPN server. The app takes the PKCS12 file as is, you do not need to import certificates into the certificate store. Choose IKEv2 Certificate or IKEv2 EAP-TLS as VPN type and everything should work.