@4920441-0 said in IPsec IKE secrets not written properly:
I go 9 (!) IKE secrets despite the fact in the webinterface there is only one defined....
Secrets entries are also defined by user keys under user accounts and on the PSK tab, not just from tunnel.
Sorry for the fuss but @netgate this is not good at all...
Some key feature which is essential like IPSec should be tested more thouroughly....
We did test it thoroughly but there are only so many configuration variations we can test. We all use IPsec on 2.5.0/21.02 on our edges and have for many months during development. We use it for remote access IPsec. We use it in our labs. I personally have about 20 lab systems and most of them have interconnected IPsec tunnels with a variety of configurations.
@4920441-0 said in IPsec IKE secrets not written properly:
When I look in the secrets section on the pfsense site I see a different key in the resulting swanctl.conf file /var/etc/ipsec/swanctl.conf which is completely different like so...
secret = 0sVGF.......................dg==
(the '.' are a several dozend of random characters)
Not all, but many start with '0sVGF' and end wih '=='
I haven't seen other reports of anything like that. The secrets are base64 encoded and prefixed with 0s so in your case, the part starting with VGF all the way to the end (including the ==) is the encoded form of the string. If it didn't match, then the config didn't match in some way. Without seeing the whole keys it's hard to say what might have been the case there, but some top suspects would be extraneous characters in the field (extra whitespace, quotes, etc) which made them not match.
That said, I tried running a few different strings through a base64 encoder and I didn't see any that started with VGF.