This is a Docker image deriving from the base-supervisor image. It adds the popular VPN software StrongSwan that allows you to create a VPN tunnel from common IKEv2 capable IPSec VPN clients right into your Docker stack. It can be useful, if you want to access your services remotely, but don't want your services (especially administration panels) to be visible on the public internet. This greatly reduces attack vectors malicious people can use to gain access to your system.
The image provides the following features:
- StrongSwan Version 5.7.1
- Road Warrior Setup for Remote Access / Mobile Devices
- Dual-Stack Tunnel Broker (IPv4-over-IPv4, IPv4-over-IPv6, IPv6-over-IPv4, IPv6-over-IPv4)
- Authentication Methods
- IKEv2 certificate authentication
- IKEv2 EAP-TLS (certificate authentication)
- Internal Certificate Authority
- Creates a server certificate for StrongSwan and client certificates to authenticate VPN clients
- Supports RSA/ECC certificates
- RSA: 2048/3072/4096 bit
- ECC: secp256r1 (NIST/SECG curve over a 256 bit prime field) (aka P-256, prime256v1)
- ECC: secp384r1 (NIST/SECG curve over a 384 bit prime field) (aka P-384)
- ECC: secp521r1 (NIST/SECG curve over a 521 bit prime field) (aka P-521)
- Internal DNS forwarder provides name resolution services to VPN clients using...
- Docker's embedded DNS (containers can be accessed by their name)
- External DNS servers
- High performance by using the kernel's NETKEY IPSec stack (kernel 2.6+)
- Communication between VPN clients
- Internet access over the VPN
- IPv4: Masquerading
- IPv6: Masquerading / Global Unicast Address (GUA)
- Tested Clients
- Windows 10 Integrated VPN Client (Desktop)
- Android StrongSwan App
The container needs your docker host to have IPv6 up and running. Please see here for details on how to enable IPv6 support.
One thing to consider is that resolving container names depends on docker's embedded DNS server. The DNS server resolves container names that are in the same user-defined networks as the strongswan container. If you do not already have an user-defined network for public services, you can create a simple bridge network (called internet in the example below) and define the subnets, from which docker will allocate ip addresses for containers. Most probably you will have only one IPv4 address for your server, so you should choose a subnet from the site-local ranges (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16). Docker takes care of connecting published services to the public IPv4 address of the server. Any IPv6 enabled server today has at least a /64 subnet assigned, so any single container can have its own IPv6 address, network address translation (NAT) is not necessary. Therefore you should choose an IPv6 subnet that is part of the subnet assigned to your server. Docker recommends to use a subnet of at least /80, so it can assign IP addresses by ORing the (virtual) MAC address of the container with the specified subnet.
docker network create -d bridge \
--subnet 192.168.0.0/24 \
--subnet 2001:xxxx:xxxx:xxxx::/80 \
--ipv6 \
internet
The strongswan container generates some data (e.g. keys, certificates, settings) that must be persisted. If you are familiar with docker you can also choose to map the data volume to your host, but named volumes are a more natural choice.
You can create a named volume using the following command:
docker volume create strongswan-data
The strongswan container assists with setting up a basic Public Key Infrastructure (PKI). The internal CA maintained by the container itself provides everything needed to generate server certificates to authenticate the server, client certificates to authenticate clients and a Certificate Revocation List (CRL) to disable clients by revoking the corresponding certificates. All RSA keys are 4096 bit. The expiry period of the CA certificate and the generated CRL is 10 years. Such a long expiry period is rather uncommon for CAs, but it ensures that strongswan remains working. An expired CRL would otherwise block all connections to the VPN server.
The initialization of the internal CA sets the key/certificate types the CA will use to create its own certificate, server certificates and client certificates. Usually the key of the CA is stronger than the key of the server or client, since the key of a root CA is very long-lived and the most important supporting pillar in a PKI. RSA certificates are a good choice, if you want to guarantee compatability. Almost all clients support RSA, but RSA keys are much bigger
than ECC keys providing the same level of security. On the other hand, ECC keys are small and therefore cryptographic operations are much faster compared to RSA. If you know that your clients support ECC, you will get the best performance using ECC keys. As long as quantum computers are not a real threat, a secure and future-proof choice is rsa4096
or secp384r1
for the CA and rsa3072
or secp256r1
for server/client keys.
The following key types are supported:
Key Type | Description |
---|---|
rsa2048 | RSA, 2048 bit |
rsa3072 | RSA, 3072 bit |
rsa4096 | RSA, 4096 bit |
secp256r1 | ECC, NIST/SECG curve over a 256 bit prime field (aka P-256, prime256v1) |
secp384r1 | ECC, NIST/SECG curve over a 384 bit prime field (aka P-384) |
secp521r1 | ECC, NIST/SECG curve over a 521 bit prime field (aka P-521) |
Beside the key types the subject that is written into the root certificate of the internal CA must also be set. This is done using the --ca-cert-subject
parameter. The subject for server/client certificates is set analogously using the --server-cert-subject
parameter respectively the --client-cert-subject
parameter. All these parameters expect a properly formatted Distinguished Name (DN). A DN describes the entity (CA, server, client) a certificate refers to. It consists of a list of hierarchically sorted attributes and looks like the following CN=VPN Root CA,OU=Engineering,O=My Company,C=DE
. The following (common) attribute types are supported:
Attribute Type | Description |
---|---|
CN | Common Name |
C | Country Name (2-letter code, e.g. DE or US) |
L | Locality Name |
O | Organization Name |
OU | Organizational Unit Name |
ST | State/Province |
The internal CA can be set up interactively using the following command. You will be prompted to enter a password to protect the CA's private key.
docker run -it \
-v strongswan-data:/data \
griffinplus/strongswan \
init \
--ca-key-type=<key-type> \
--server-key-type=<key-type> \
--client-key-type=<key-type> \
--ca-cert-subject=<subject-dn> \
--server-cert-subject=<subject-dn> \
--client-cert-subject=<subject-dn>
The internal CA can be initialized using the --ca-pass
command line parameter or stdin to feed in the password as well. Using stdin is the recommended way as the password cannot leak via process lists or docker's inspection features:
docker run \
-v strongswan-data:/data \
griffinplus/strongswan \
init \
--ca-pass=<my-ca-secret> \
--ca-key-type=<key-type> \
--server-key-type=<key-type> \
--client-key-type=<key-type> \
--ca-cert-subject=<subject-dn> \
--server-cert-subject=<subject-dn> \
--client-cert-subject=<subject-dn>
echo -e "<my-ca-secret>" | docker run -i \
-v strongswan-data:/data \
griffinplus/strongswan \
init \
--ca-key-type=<key-type> \
--server-key-type=<key-type> \
--client-key-type=<key-type> \
--ca-cert-subject=<subject-dn> \
--server-cert-subject=<subject-dn> \
--client-cert-subject=<subject-dn>
Although the container comes with a set of sensible default settings, some settings still need to be configured to suit your needs:
docker run -it \
--name strongswan-vpn \
--ip6=2001:xxxx:xxxx:xxxx::2 \
--network internet \
--publish 500:500/udp \
--publish 4500:4500/udp \
--volume /lib/modules:/lib/modules:ro \
--volume strongswan-data:/data \
--cap-add NET_ADMIN \
--cap-add SYS_MODULE \
--cap-add SYS_ADMIN \
--security-opt apparmor=unconfined \
--security-opt seccomp=unconfined \
--env VPN_HOSTNAMES="vpn.my-domain.com" \
griffinplus/strongswan \
run-and-enter
This creates and starts a strongswan container with the name strongswan-vpn and attaches it to the user-defined network internet that was created at step 1 using the specified IPv6 address. The IPv6 address must be specified explicitly to ensure that the address is always the same - even, if the container is restarted. This is necessary, if you intend to create DNS records for the VPN server, so clients can use a readable and memorizable hostname instead of a long IPv6 address. The IPv4 address is automatically assigned by docker. Usually there is no need to enforce a certain IPv4 address, because docker maps published ports to the appropriate host interfaces.
The ports 500 (ISAKMP) and 4500 (NAT-Traversal) are published to tell docker to map these ports to all host interfaces. It is worth noticing that these port mappings only effect IPv4. IPv6 is not influenced by docker, so there is no filtering or firewalling done! The strongswan container takes care of this and implements a firewall to protect itself and connected VPN clients.
The container needs a few additional capabilities to work properly. The NET_ADMIN
capability is needed to configure network interfaces and the iptables firewall. The SYS_MODULE
capability is needed to load kernel modules that are required for operation. The SYS_ADMIN
capability is needed to remount the /proc/sys
filesystem as read-write, so sysctl
can configure network related settings. Some strongswan modules seem to require kernel calls that are disabled by docker's default seccomp profile, so we need to disable seccomp entirely (at least until it's clear which kernel calls strongswan needs to operate). The same applys to the apparmor profile. Although that's not the best approach, it's slightly better than running the container in privileged mode.
At last the container specific setting VPN_HOSTNAMES
tells the container under which FQDNs the strongswan container will be seen on the internet. Multiple names can be separated by comma. You should list all names here that are published in the DNS. If you use the internal CA to create a server certificate (which is the default) these names are included in the server certificate.
The container can be configured using the following environment variables:
Determines whether VPN clients are allowed to communicate with each other.
true
,1
=> VPN clients are allowed to communicate with each other.false
,0
=> VPN clients are not allowed to communicate with each other.
Default Value: false
Determines the subnet from which IPv4 addresses are assigned to VPN clients. The subnet should be one of the following or a subnet of one of them to avoid conflicts with global addresses:
- 10.0.0.0/8
- 172.16.0.0/12
- 192.168.0.0/16
Default: 10.0.0.0/24
Determines the subnet from which IPv6 addresses are assigned to VPN clients. The subnet can either be a subnet in the Unique Local Unicast Address (ULA, fc00::/7) range or in the Global Unicast Address (GUA, 2000::/3) range.
A subnet in the ULA range has the benefit that these IP addresses are not visible on the public internet. The IP addresses are only used by the VPN server and its clients to communicate with each other. There is no additional setup needed to get it working. Any communication with the public internet is done using Masquerading, a network address translation (NAT) technique that replaces internal IP addresses with the IP address of the VPN server for connections to the public internet. Although masquerading works really well for most protocols it can cause strange effects with some protocols, especially when multiple clients using the same protocol are involved. A tiny plus of using masquerading is that the IP address of a VPN client cannot be determined by visited sites as the IP address of the VPN server is used as the source address in packets.
You should consider RFC 4193 for details on how to choose a proper subnet from the ULA range. To cut a long story short, you should use the "randomly" generated approach (fd00::/8) and build the prefix using the following blueprint: fdxx xxxx xxxx yyyy zzzz zzzz zzzz zzzz
, where x is a random site id, y is a random subnet id within the site and z is the hosts part within that subnet. This guarantees that the chosen subnet does not conflict with global addresses and makes it very unlikely to conflict with other subnets at your site.
A subnet in the GUA range has the benefit that VPN clients have direct access to the public internet and no network address translation (NAT) is needed that might cause issues with some protocols. By default new connections from the public internet to VPN clients are blocked by the internal firewall. Please see PROTECT_CLIENTS_FROM_INTERNET for details on how to disable this protection.
In order to use a GUA subnet you must configure your host to forward packets that are adressed to the specified subnet to the container, otherwise internet access will not work:
ip -6 route add <client-subnet> via <container-ip>
Furthermore the ISP needs to know which IPv6 addresses are in use to route traffic for these addresses to the host. The strongswan container maintains the NDP proxy table as VPN clients connect/disconnect. But this information is available from within the container only. An ndppd with the following configuration takes the information out to the ISP (most probably you already have ndppd in place to get IPv6 working with docker):
# /etc/ndppd.conf
proxy eth0 {
rule <client-subnet> {
auto
}
}
Default: fd00:dead:beef:affe::/64
(ULA, Site-ID: dead:beef
, Subnet-ID: affe
)
Determines the DNS servers name resolution requests are forwarded to, if USE_DOCKER_DNS
is false
.
Default Value: 8.8.8.8, 8.8.4.4, 2001:4860:4860::8888, 2001:4860:4860::8844
(Google Public DNS)
Determines the algorithms to propose for ESP. The proposal is directly passed to strongswan in the esp setting. The default selection of proposed algorithms should be secure and cover most clients at the same time. It does not contain algorithms that are known to be broken, only reliable ones.
A list of algorithms can be found here.
Default Value:
aes128gcm8-aes128gcm12-aes128gcm16-aes256gcm8-aes256gcm12-aes256gcm16-aes128ccm8-aes128ccm12-aes128ccm16-aes256ccm8-aes256ccm12-aes256ccm16-modp2048-modp3072-modp4096-modp6144-modp8192-ecp192-ecp224-ecp256-ecp384-ecp521-ecp224bp-ecp256bp-ecp384bp-ecp512bp-curve25519,
aes128-aes256-md5-md5_128-sha1-sha1_160-aesxcbc-aescmac-sha256-sha384-sha512-modp2048-modp3072-modp4096-modp6144-modp8192-ecp192-ecp224-ecp256-ecp384-ecp521-ecp224bp-ecp256bp-ecp384bp-ecp512bp-curve25519
Determines the algorithms to propose for IKE. The proposal is passed to strongswan in the ike setting. The default selection of proposed algorithms should be secure and cover most clients at the same time. It does not contain algorithms that are known to be broken, only reliable ones.
A list of algorithms can be found here.
Default Value:
aes128gcm8-aes128gcm12-aes128gcm16-aes256gcm8-aes256gcm12-aes256gcm16-aes128ccm8-aes128ccm12-aes128ccm16-aes256ccm8-aes256ccm12-aes256ccm16-prfmd5-prfsha1-prfaesxcbc-prfaescmac-prfsha256-prfsha384-prfsha512-modp2048-modp3072-modp4096-modp6144-modp8192-ecp192-ecp224-ecp256-ecp384-ecp521-ecp224bp-ecp256bp-ecp384bp-ecp512bp-curve25519,
aes128-aes256-md5-sha1-aesxcbc-aescmac-sha256-sha384-sha512-prfmd5-prfsha1-prfaesxcbc-prfaescmac-prfsha256-prfsha384-prfsha512-modp2048-modp3072-modp4096-modp6144-modp8192-ecp192-ecp224-ecp256-ecp384-ecp521-ecp224bp-ecp256bp-ecp384bp-ecp512bp-curve25519
Determines whether VPN clients can be accessed from the public internet, i.e. whether new connections can be established from the public internet. Connections that are initiated by VPN clients are not effected. This setting only takes effect, if CLIENT_SUBNET_IPV6 specifies a subnet in the GUA range.
true
,1
=> VPN clients are protected, i.e. they cannot be accessed from the public internet.false
,0
=> VPN clients are not protected, i.e. they can be accessed from the public internet.
Default Value: true
Determines the verbosity of the Griffin+ Container Startup System (see here for details).
- 0 => Logging is disabled.
- 1 => Only errors are logged.
- 2 => Errors and warnings are logged.
- 3 => Errors, warnings and notes are logged.
- 4 => Errors, warnings, notes and infos are logged.
- 5 => All messages (incl. debug) are logged.
Default Value: 4
Determines whether the built-in DNS server forwards name resolution requests to Docker's embedded DNS server.
true
,1
=> Docker's Embedded DNS Server is used (containers in user-defined networks can be accessed by their name).false
,0
=> External DNS servers are used (see DNS_SERVERS).
Default Value: true
Determines the fully qualified hostnames of the VPN server. The internal Certificate Authority will create a server certificate for these hostnames telling clients that they are connected to the desired VPN server. Multiple hostnames must be separated by comma.
Default Value: hostname of the container
At this stage the strongswan container should be able to accept VPN connections and allow VPN clients to access containers that are in the same user-defined network as the strongswan container. You can attach the strongswan container (named strongswan-vpn) to additional user-defined networks, so VPN clients can access them as well:
docker network connect <network> strongswan-vpn
This step applys only, if the strongswan container is configured to use the internal CA to authenticate clients. This is the case, if you followed the setup steps up to this point. If the container is configured to use an external CA for client authentication, the following commands are without effect.
A user (VPN client) is always identified by its e-mail address, so <id>
in the examples below means a valid e-mail address. Furthermore users authenticate themselves against the VPN server using client certificates. A VPN client can have multiple client certificates.
Commands that add clients or enable/disable clients need the private key of the internal CA. The private key of the internal CA is stored on the volume. It is encrypted, if you entered a password when initializing the internal CA. In this case these commands need the password to perform the operation. The password can be specified via the command line parameter --ca-pass
(not recommended, the password will be visible in the process list and via docker's inspection features). A better approach is to pipe the password in via stdin. The container must be run with the interactive flag (-i
) to make it work. If you additionally attach a pseudo tty to the container you will be prompted to enter the password.
All commands support two output formats that are optimized for interactive use (text
) and for scripting (tsv
, tab-separated-values). The output format can be explicitly set by the --out-format=[text|tsv]
parameter when running the command using docker run
. If --out-format
is not specified, the output format depends on whether the container has a pseudo TTY attached or not. If the command is run using docker run -it griffinplus/strongswan <cmd>
(terminal mode) the container uses the text
format, otherwise it uses the tsv
format (scripting mode).
The text
output format looks like the following:
| Identity | Serial | Not Before | Not After | Revoked |
|----------------+------------+---------------------------+---------------------------+---------|
| alice@acme.com | 0000000003 | 2018/01/01 08:12:32 (UTC) | 2020/01/01 08:12:32 (UTC) | |
| bob@acme.com | 0000000001 | 2018/01/01 08:10:22 (UTC) | 2020/01/01 08:10:22 (UTC) | |
| john@acme.com | 0000000002 | 2018/01/01 08:11:00 (UTC) | 2020/01/01 08:11:00 (UTC) | |
|----------------+------------+---------------------------+---------------------------+---------|
The tsv
output format looks like the following (fields are separated by tabs, beautified for better readability here):
Identity Serial Not Before Not After Revoked
alice@acme.com 3 2018-01-01T08:12:32 2020-01-01T08:12:32
bob@acme.com 1 2018-01-01T08:10:22 2020-01-01T08:10:22
john@acme.com 2 2018-01-01T08:11:00 2020-01-01T08:11:00
A list of VPN clients - respectively their certificates - that were created by the internal CA can be retrieved as follows:
docker run \
-v strongswan-data:/data \
griffinplus/strongswan \
list clients
A new VPN client - respectively a client certificate for a VPN client - can be created interactively or in a scripted fashion using the internal CA as follows:
# password prompt (interactive)
docker run -it \
-v strongswan-data:/data \
-v $PWD/client-data/:/data-out \
griffinplus/strongswan \
add client <id>
# passwords via command line parameters
docker run \
-v strongswan-data:/data \
-v $PWD/client-data/:/data-out \
griffinplus/strongswan \
add client <id> --ca-pass=<my-ca-secret> --pkcs12-pass=<my-pkcs12-secret>
# passwords via stdin
echo -e "<my-ca-secret>\n<my-pkcs12-secret>" | docker run -i \
-v strongswan-data:/data \
-v $PWD/client-data/:/data-out \
griffinplus/strongswan \
add client <id>
This example assumes that you have a directory client-data
below your working directory. The internal CA will create a new 4096 bit RSA private key, a client certificate with an expiry period of 2 years and package everything together in a PKCS12 archive (most commonly known as .pfx
or .p12
file). If the internal CA also creates the certificate for strongswan, the PKCS12 archive will also contain the CA certificate, so the VPN client will be able to check the authenticity of the VPN server. The PKCS12 archive is encrypted using the specified password and saved to the mounted output directory ($PWD/client-data
).
Mixing command line parameters and stdin is also supported, but when stdin is used the order of parameters is significant:
- Password of the CA
- Password for the PKCS12 archive
Specifying --ca-pass
or --pkcs12-pass
overrides the corresponding passwords piped in via stdin.
A VPN client can be disabled by revoking its client certificate and re-enabled by unrevoking the certificate. Revocations are stored in the Certificate Revocation List (CRL) of the internal CA and the CRL is read by strongswan at startup. After revoking/unrevoking a client certificate the strongswan container must be restarted, so strongswan reloads the CRL and the change becomes active. CRLs are a rather cumbersome thing to realize this functionality, but they are easier to handle than setting up an OCSP responder as professional CAs would do. The internal CA is made for tests and small scale deployments. If you plan to use this container in a large scale deployment, you should really consider using an external CA instead.
As with the other commands the password of the internal CA can be entered interactively, by command line parameter or via stdin. A certain certificate can be revoked/unrevoked by specifying its certificate serial number. If the serial number if omitted, all active certificates will be revoked.
# password prompt (interactive)
docker run -it \
--volume strongswan-data:/data \
griffinplus/strongswan \
disable|enable client <id> [<certificate-serial>]
# password via command line parameters
docker run \
--volume strongswan-data:/data \
griffinplus/strongswan \
disable|enable client <id> [<certificate-serial>] --ca-pass=<my-ca-secret>
# password via stdin
echo -e "<my-ca-secret>" | docker run -i \
--volume strongswan-data:/data \
griffinplus/strongswan \
disable|enable client <id> [<certificate-serial>]
Many customizations have already discussed above as they are configured using environment variables when running the container. Below you will find customizations that cannot be realized using configuration only.
By default the strongswan container uses the internal CA to create the server certificate to authenticate the VPN server and client certificates to authenticate VPN clients. If you are concerned about security, you can use an external CA - most probably part of your corporate PKI - instead.
The strongswan container will take your external CA into account, if you provide the files server.key
and server.crt
containing the private key and the certificate for strongswan in /external-ca
. This is enough to configure strongswan to authenticate itself using the specified certificate. If you specify client-ca.crt
as well, strongswan will furthermore be configured to authenticate clients that have a valid client certificate issued by the associated CA. Key files and certificate files can either be PEM- or DER-encoded.
By default, the Windows 10 Integrated VPN Client only offers a rather insecure set of algorithms. Other sites have illustrated this issue extensively, so here is the extract of the discussion only. The algorithms proposed by Windows 10 will not work with the algorithms proposed by the strongswan container out-of-the-box. By default Windows 10 proposes to use 3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
, but neither 3DES_CBC for encryption nor a 1024 bit Diffie-Hellman group is a secure choice nowadays. Windows 10 can be configured to use more secure algorithms (AES_256_CBC for encryption and a 2048 bit Diffie-Hellman group) by adding the following registry snippet:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Parameters]
"NegotiateDH2048_AES256"=dword:00000001
Value | Meaning |
---|---|
0 | Disable AES-256-CBC and MODP-2048 (default) |
1 | Enable AES-256-CBC and MODP-2048 |
2 | Enforce the usage of AES-256-CBC and MODP-2048 |
With this tiny modification, Windows 10 and the strongswan container will play together securely. Before you can set up a VPN connection, you need to import the client's private key and the client certificate into the user's certificate store and the certificate of the internal CA into the machine certificate store. The key and the certificates are contained in the PKCS12 archive that is created when adding a VPN client (see above). Sad to say that you have to import the PKCS12 archive twice to get the certificates in place (if somebody knows, why this is necessary and how one can circumvent this issue, please let me know!). The VPN connection can now be set up manually (IKEv2, Authentication with EAP-TLS using certificates). Alternatively the following PowerShell script can be used as well (please adjust -ServerAddress
to fit your setup):
PS C:\> $tlsauth = New-EapConfiguration -tls -VerifyServerIdentity -UserCertificate
PS C:\> Add-VpnConnection -Name "My-VPN-Connection" -ServerAddress "vpn.my-domain.com" -TunnelType "IKEv2" -EncryptionLevel "Required" -AuthenticationMethod Eap -EapConfigXmlStream $tlsauth.EapConfigXmlStream -PassThru
At this point you should be able to connect to the strongswan container with default settings. You can dig a bit deeper and select more secure or faster ciphers, if you want. I recommend using AES-128-GCM. It is both a secure and fast choice, since AES in Galois/Counter Mode (GCM) is an Authenticated Encryption with Associated Data (AEAD) algorithm that ensures both confidentiality and authenticity at the same time eliminating the need for a separate integrity algorithm. The following Powershell snippet will set it up. Don't get confused by the -IntegrityCheckMethod
parameter, it is required for the cmdlet, but ignored in GCM mode. The snippet will furthermore configure the Diffie Hellman Group used for IKE key exchanges (-DHGroup
) and the Perfect Forward Secrecy (PFS) Group (-PfsGroup
) in the IPSec policy. Details concerning the Set-VpnConnectionIPSecConfiguration
function can be found here:
PS C:\> Set-VpnConnectionIPsecConfiguration `
-ConnectionName "My-VPN-Connection" `
-AuthenticationTransformConstants GCMAES128 `
-CipherTransformConstants GCMAES128 `
-EncryptionMethod GCMAES128 `
-IntegrityCheckMethod SHA384 `
-PfsGroup ECP384 `
-DHGroup ECP384 `
-PassThru `
-Force
The StrongSwan App is the natural choice when connecting an Android device to the VPN server. The app takes the PKCS12 file as is, you do not need to import certificates into the certificate store. Choose IKEv2 Certificate or IKEv2 EAP-TLS as VPN type and everything should work.