Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSec problem after Update 2.1.5 -> 2.2 Beta

    Scheduled Pinned Locked Moved 2.2 Snapshot Feedback and Problems - RETIRED
    15 Posts 7 Posters 8.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      eri--
      last edited by

      Can you replace vpn.inc with this one attached on your system and notify if this solves the issue for you?

      NOTE: you have to rename the file to vpn.inc from the attachment.

      vpn.inc.txt

      1 Reply Last reply Reply Quote 0
      • E
        EmL
        last edited by

        @ermal:

        Can you replace vpn.inc with this one attached on your system and notify if this solves the issue for you?

        Of course, just a little hint: I'm not a BSD/*X geek … can you tell me the location of the file? How to put it there ...via shell command or scp or what would you suggest? Thx a lot in advance.

        1 Reply Last reply Reply Quote 0
        • P
          phil.davis
          last edited by

          From the GUI will be easy - Diagnostics->Edit File
          /etc/inc/vpn.inc
          Press Load
          Select all the text and replace it with the text provided by Ermal.
          Press Save

          It avoids any need to know any editors or commands in the underlying FreeBSD.

          As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
          If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

          1 Reply Last reply Reply Quote 0
          • E
            EmL
            last edited by

            This fixed the problem (almost). All my tunnels are now functional again! But a little issue is now left at the dashboard. Even if a tunnel is really up, it's not shown up there …

            I don't know if it's really needed, but here's the actual log after reboot again:

            Last 1000 IPsec log entries
            Dec 22 15:10:22 	charon: 08[IKE] CHILD_SA not found, ignored
            Dec 22 15:10:22 	charon: 08[IKE] <con1000|1> CHILD_SA not found, ignored
            Dec 22 15:10:22 	charon: 08[IKE] received DELETE for ESP CHILD_SA with SPI 8f01860d
            Dec 22 15:10:22 	charon: 08[IKE] <con1000|1> received DELETE for ESP CHILD_SA with SPI 8f01860d
            Dec 22 15:10:22 	charon: 08[ENC] parsed INFORMATIONAL_V1 request 3905131992 [ HASH D ]
            Dec 22 15:10:22 	charon: 08[NET] received packet: from 222.222.222.222[500] to 111.111.111.111[500] (76 bytes)
            Dec 22 15:10:21 	charon: 12[NET] sending packet: from 111.111.111.111[500] to 222.222.222.222[500] (60 bytes)
            Dec 22 15:10:21 	charon: 12[ENC] generating QUICK_MODE request 2242275122 [ HASH ]
            Dec 22 15:10:21 	charon: 12[IKE] CHILD_SA con1005{10005} established with SPIs c7a9ceee_i 40c2be6e_o and TS 192.168.111.0/24|/0 === 192.168.30.0/24|/0
            Dec 22 15:10:21 	charon: 12[IKE] <con1000|1> CHILD_SA con1005{10005} established with SPIs c7a9ceee_i 40c2be6e_o and TS 192.168.111.0/24|/0 === 192.168.30.0/24|/0
            Dec 22 15:10:21 	charon: 12[ENC] parsed QUICK_MODE response 2242275122 [ HASH SA No KE ID ID ]
            Dec 22 15:10:21 	charon: 12[NET] received packet: from 222.222.222.222[500] to 111.111.111.111[500] (300 bytes)
            Dec 22 15:10:21 	charon: 13[NET] sending packet: from 111.111.111.111[500] to 222.222.222.222[500] (316 bytes)
            Dec 22 15:10:21 	charon: 13[ENC] generating QUICK_MODE request 2242275122 [ HASH SA No KE ID ID ]
            Dec 22 15:10:21 	charon: 13[KNL] creating acquire job for policy 111.111.111.111/32|/0 === 222.222.222.222/32|/0 with reqid {10005}
            Dec 22 15:09:57 	charon: 13[IKE] CHILD_SA not found, ignored
            Dec 22 15:09:57 	charon: 13[IKE] <con1000|1> CHILD_SA not found, ignored
            Dec 22 15:09:57 	charon: 13[IKE] received DELETE for ESP CHILD_SA with SPI ec0d1a13
            Dec 22 15:09:57 	charon: 13[IKE] <con1000|1> received DELETE for ESP CHILD_SA with SPI ec0d1a13
            Dec 22 15:09:57 	charon: 13[ENC] parsed INFORMATIONAL_V1 request 407982143 [ HASH D ]
            Dec 22 15:09:57 	charon: 13[NET] received packet: from 222.222.222.222[500] to 111.111.111.111[500] (76 bytes)
            Dec 22 15:09:56 	charon: 13[NET] sending packet: from 111.111.111.111[500] to 222.222.222.222[500] (60 bytes)
            Dec 22 15:09:56 	charon: 13[ENC] generating QUICK_MODE request 3891877266 [ HASH ]
            Dec 22 15:09:56 	charon: 13[IKE] CHILD_SA con1004{10004} established with SPIs cd340446_i 052eedf9_o and TS 192.168.111.0/24|/0 === 192.168.1.0/24|/0
            Dec 22 15:09:56 	charon: 13[IKE] <con1000|1> CHILD_SA con1004{10004} established with SPIs cd340446_i 052eedf9_o and TS 192.168.111.0/24|/0 === 192.168.1.0/24|/0
            Dec 22 15:09:56 	charon: 13[ENC] parsed QUICK_MODE response 3891877266 [ HASH SA No KE ID ID ]
            Dec 22 15:09:56 	charon: 13[NET] received packet: from 222.222.222.222[500] to 111.111.111.111[500] (300 bytes)
            Dec 22 15:09:56 	charon: 13[NET] sending packet: from 111.111.111.111[500] to 222.222.222.222[500] (316 bytes)
            Dec 22 15:09:56 	charon: 13[ENC] generating QUICK_MODE request 3891877266 [ HASH SA No KE ID ID ]
            Dec 22 15:09:56 	charon: 10[KNL] creating acquire job for policy 111.111.111.111/32|/0 === 222.222.222.222/32|/0 with reqid {10004}
            Dec 22 15:09:52 	charon: 10[IKE] CHILD_SA not found, ignored
            Dec 22 15:09:52 	charon: 10[IKE] <con1000|1> CHILD_SA not found, ignored
            Dec 22 15:09:52 	charon: 10[IKE] received DELETE for ESP CHILD_SA with SPI 789ab902
            Dec 22 15:09:52 	charon: 10[IKE] <con1000|1> received DELETE for ESP CHILD_SA with SPI 789ab902
            Dec 22 15:09:52 	charon: 10[ENC] parsed INFORMATIONAL_V1 request 3157639166 [ HASH D ]
            Dec 22 15:09:52 	charon: 10[NET] received packet: from 222.222.222.222[500] to 111.111.111.111[500] (76 bytes)
            Dec 22 15:09:51 	charon: 13[NET] sending packet: from 111.111.111.111[500] to 222.222.222.222[500] (60 bytes)
            Dec 22 15:09:51 	charon: 13[ENC] generating QUICK_MODE request 3912449148 [ HASH ]
            Dec 22 15:09:51 	charon: 13[IKE] CHILD_SA con1003{10003} established with SPIs c64ac329_i b2f7c26f_o and TS 192.168.111.0/24|/0 === 192.168.10.0/24|/0
            Dec 22 15:09:51 	charon: 13[IKE] <con1000|1> CHILD_SA con1003{10003} established with SPIs c64ac329_i b2f7c26f_o and TS 192.168.111.0/24|/0 === 192.168.10.0/24|/0
            Dec 22 15:09:51 	charon: 13[ENC] parsed QUICK_MODE response 3912449148 [ HASH SA No KE ID ID ]
            Dec 22 15:09:51 	charon: 13[NET] received packet: from 222.222.222.222[500] to 111.111.111.111[500] (300 bytes)
            Dec 22 15:09:50 	charon: 13[NET] sending packet: from 111.111.111.111[500] to 222.222.222.222[500] (316 bytes)
            Dec 22 15:09:50 	charon: 13[ENC] generating QUICK_MODE request 3912449148 [ HASH SA No KE ID ID ]
            Dec 22 15:09:50 	charon: 10[KNL] creating acquire job for policy 111.111.111.111/32|/0 === 222.222.222.222/32|/0 with reqid {10003}
            Dec 22 15:09:46 	charon: 11[IKE] CHILD_SA not found, ignored
            Dec 22 15:09:46 	charon: 11[IKE] <con1000|1> CHILD_SA not found, ignored
            Dec 22 15:09:46 	charon: 11[IKE] received DELETE for ESP CHILD_SA with SPI bd32f924
            Dec 22 15:09:46 	charon: 11[IKE] <con1000|1> received DELETE for ESP CHILD_SA with SPI bd32f924
            Dec 22 15:09:46 	charon: 11[ENC] parsed INFORMATIONAL_V1 request 1197046715 [ HASH D ]
            Dec 22 15:09:46 	charon: 11[NET] received packet: from 222.222.222.222[500] to 111.111.111.111[500] (76 bytes)
            Dec 22 15:09:45 	charon: 11[NET] sending packet: from 111.111.111.111[500] to 222.222.222.222[500] (60 bytes)
            Dec 22 15:09:45 	charon: 11[ENC] generating QUICK_MODE request 1467456426 [ HASH ]
            Dec 22 15:09:45 	charon: 11[IKE] CHILD_SA con1002{10002} established with SPIs c66cbb65_i c4016eb5_o and TS 192.168.111.0/24|/0 === 10.0.0.0/24|/0
            Dec 22 15:09:45 	charon: 11[IKE] <con1000|1> CHILD_SA con1002{10002} established with SPIs c66cbb65_i c4016eb5_o and TS 192.168.111.0/24|/0 === 10.0.0.0/24|/0
            Dec 22 15:09:45 	charon: 11[ENC] parsed QUICK_MODE response 1467456426 [ HASH SA No KE ID ID ]
            Dec 22 15:09:45 	charon: 11[NET] received packet: from 222.222.222.222[500] to 111.111.111.111[500] (300 bytes)
            Dec 22 15:09:45 	charon: 11[NET] sending packet: from 111.111.111.111[500] to 222.222.222.222[500] (316 bytes)
            Dec 22 15:09:45 	charon: 11[ENC] generating QUICK_MODE request 1467456426 [ HASH SA No KE ID ID ]
            Dec 22 15:09:45 	charon: 10[KNL] creating acquire job for policy 111.111.111.111/32|/0 === 222.222.222.222/32|/0 with reqid {10002}
            Dec 22 15:09:41 	charon: 10[IKE] CHILD_SA not found, ignored
            Dec 22 15:09:41 	charon: 10[IKE] <con1000|1> CHILD_SA not found, ignored
            Dec 22 15:09:41 	charon: 10[IKE] received DELETE for ESP CHILD_SA with SPI 40d441dd
            Dec 22 15:09:41 	charon: 10[IKE] <con1000|1> received DELETE for ESP CHILD_SA with SPI 40d441dd
            Dec 22 15:09:41 	charon: 10[ENC] parsed INFORMATIONAL_V1 request 493701617 [ HASH D ]
            Dec 22 15:09:41 	charon: 10[NET] received packet: from 222.222.222.222[500] to 111.111.111.111[500] (76 bytes)
            Dec 22 15:09:40 	charon: 10[NET] sending packet: from 111.111.111.111[500] to 222.222.222.222[500] (60 bytes)
            Dec 22 15:09:40 	charon: 10[ENC] generating QUICK_MODE request 2788292895 [ HASH ]
            Dec 22 15:09:40 	charon: 10[IKE] CHILD_SA con1001{10001} established with SPIs c95b529d_i 996639ba_o and TS 192.168.111.0/24|/0 === 10.255.255.0/24|/0
            Dec 22 15:09:40 	charon: 10[IKE] <con1000|1> CHILD_SA con1001{10001} established with SPIs c95b529d_i 996639ba_o and TS 192.168.111.0/24|/0 === 10.255.255.0/24|/0
            Dec 22 15:09:40 	charon: 10[ENC] parsed QUICK_MODE response 2788292895 [ HASH SA No KE ID ID ]
            Dec 22 15:09:40 	charon: 10[NET] received packet: from 222.222.222.222[500] to 111.111.111.111[500] (300 bytes)
            Dec 22 15:09:40 	charon: 10[NET] sending packet: from 111.111.111.111[500] to 222.222.222.222[500] (316 bytes)
            Dec 22 15:09:40 	charon: 10[ENC] generating QUICK_MODE request 2788292895 [ HASH SA No KE ID ID ]
            Dec 22 15:09:40 	charon: 09[KNL] creating acquire job for policy 111.111.111.111/32|/0 === 222.222.222.222/32|/0 with reqid {10001}
            Dec 22 15:09:36 	charon: 09[IKE] CHILD_SA not found, ignored
            Dec 22 15:09:36 	charon: 09[IKE] <con1000|1> CHILD_SA not found, ignored
            Dec 22 15:09:36 	charon: 09[IKE] received DELETE for ESP CHILD_SA with SPI 854be1e5
            Dec 22 15:09:36 	charon: 09[IKE] <con1000|1> received DELETE for ESP CHILD_SA with SPI 854be1e5
            Dec 22 15:09:36 	charon: 09[ENC] parsed INFORMATIONAL_V1 request 3039964438 [ HASH D ]
            Dec 22 15:09:36 	charon: 09[NET] received packet: from 222.222.222.222[500] to 111.111.111.111[500] (76 bytes)
            Dec 22 15:09:35 	charon: 12[NET] sending packet: from 111.111.111.111[500] to 222.222.222.222[500] (60 bytes)
            Dec 22 15:09:35 	charon: 12[ENC] generating QUICK_MODE request 2275084269 [ HASH ]
            Dec 22 15:09:35 	charon: 12[IKE] CHILD_SA con1000{10000} established with SPIs c42ee6dd_i e2f95a88_o and TS 192.168.111.0/24|/0 === 10.20.0.0/16|/0
            Dec 22 15:09:35 	charon: 12[IKE] <con1000|1> CHILD_SA con1000{10000} established with SPIs c42ee6dd_i e2f95a88_o and TS 192.168.111.0/24|/0 === 10.20.0.0/16|/0
            Dec 22 15:09:35 	charon: 12[ENC] parsed QUICK_MODE response 2275084269 [ HASH SA No KE ID ID ]
            Dec 22 15:09:35 	charon: 12[NET] received packet: from 222.222.222.222[500] to 111.111.111.111[500] (300 bytes)
            Dec 22 15:09:35 	charon: 12[NET] sending packet: from 111.111.111.111[500] to 222.222.222.222[500] (316 bytes)
            Dec 22 15:09:35 	charon: 12[ENC] generating QUICK_MODE request 2275084269 [ HASH SA No KE ID ID ]
            Dec 22 15:09:35 	charon: 12[IKE] DPD not supported by peer, disabled
            Dec 22 15:09:35 	charon: 12[IKE] <con1000|1> DPD not supported by peer, disabled
            Dec 22 15:09:35 	charon: 12[IKE] maximum IKE_SA lifetime 86012s
            Dec 22 15:09:35 	charon: 12[IKE] <con1000|1> maximum IKE_SA lifetime 86012s
            Dec 22 15:09:35 	charon: 12[IKE] scheduling reauthentication in 85472s
            Dec 22 15:09:35 	charon: 12[IKE] <con1000|1> scheduling reauthentication in 85472s
            Dec 22 15:09:35 	charon: 12[IKE] IKE_SA con1000[1] established between 111.111.111.111[111.111.111.111]...222.222.222.222[222.222.222.222]
            Dec 22 15:09:35 	charon: 12[IKE] <con1000|1> IKE_SA con1000[1] established between 111.111.111.111[111.111.111.111]...222.222.222.222[222.222.222.222]
            Dec 22 15:09:35 	charon: 12[ENC] parsed ID_PROT response 0 [ ID HASH ]
            Dec 22 15:09:35 	charon: 12[NET] received packet: from 222.222.222.222[500] to 111.111.111.111[500] (76 bytes)
            Dec 22 15:09:35 	charon: 12[NET] sending packet: from 111.111.111.111[500] to 222.222.222.222[500] (76 bytes)
            Dec 22 15:09:35 	charon: 12[ENC] generating ID_PROT request 0 [ ID HASH ]
            Dec 22 15:09:35 	charon: 12[ENC] received unknown vendor ID: 1f:07:f7:0e:aa:65:14:d3:b0:fa:96:54:2a:50:01:00
            Dec 22 15:09:35 	charon: 12[ENC] received unknown vendor ID: 93:16:f4:19:4d:bb:bc:95:e0:64:f6:bc:30:92:59:e3
            Dec 22 15:09:35 	charon: 12[IKE] received XAuth vendor ID
            Dec 22 15:09:35 	charon: 12[IKE] <con1000|1> received XAuth vendor ID
            Dec 22 15:09:35 	charon: 12[IKE] received Cisco Unity vendor ID
            Dec 22 15:09:35 	charon: 12[IKE] <con1000|1> received Cisco Unity vendor ID
            Dec 22 15:09:35 	charon: 12[ENC] parsed ID_PROT response 0 [ KE No V V V V ]
            Dec 22 15:09:35 	charon: 12[NET] received packet: from 222.222.222.222[500] to 111.111.111.111[500] (256 bytes)
            Dec 22 15:09:35 	charon: 12[NET] sending packet: from 111.111.111.111[500] to 222.222.222.222[500] (196 bytes)
            Dec 22 15:09:35 	charon: 12[ENC] generating ID_PROT request 0 [ KE No ]
            Dec 22 15:09:35 	charon: 12[IKE] received FRAGMENTATION vendor ID
            Dec 22 15:09:35 	charon: 12[IKE] <con1000|1> received FRAGMENTATION vendor ID
            Dec 22 15:09:35 	charon: 12[ENC] parsed ID_PROT response 0 [ SA V ]
            Dec 22 15:09:35 	charon: 12[NET] received packet: from 222.222.222.222[500] to 111.111.111.111[500] (112 bytes)
            Dec 22 15:09:35 	charon: 12[NET] sending packet: from 111.111.111.111[500] to 222.222.222.222[500] (204 bytes)
            Dec 22 15:09:35 	charon: 12[ENC] generating ID_PROT request 0 [ SA V V V V V V ]
            Dec 22 15:09:35 	charon: 12[IKE] initiating Main Mode IKE_SA con1000[1] to 222.222.222.222
            Dec 22 15:09:35 	charon: 12[IKE] <con1000|1> initiating Main Mode IKE_SA con1000[1] to 222.222.222.222
            Dec 22 15:05:01 	ipsec_starter[55377]:
            Dec 22 15:05:01 	ipsec_starter[55377]: 'con1005' routed
            Dec 22 15:05:01 	charon: 12[CFG] received stroke: route 'con1005'
            Dec 22 15:05:01 	charon: 13[CFG] added child to existing configuration 'con1000'
            Dec 22 15:05:01 	charon: 13[CFG] received stroke: add connection 'con1005'
            Dec 22 15:05:01 	ipsec_starter[55377]:
            Dec 22 15:05:01 	ipsec_starter[55377]: 'con1004' routed
            Dec 22 15:05:01 	charon: 12[CFG] received stroke: route 'con1004'
            Dec 22 15:05:01 	charon: 13[CFG] added child to existing configuration 'con1000'
            Dec 22 15:05:01 	charon: 13[CFG] received stroke: add connection 'con1004'
            Dec 22 15:05:01 	ipsec_starter[55377]:
            Dec 22 15:05:01 	ipsec_starter[55377]: 'con1003' routed
            Dec 22 15:05:01 	charon: 16[CFG] received stroke: route 'con1003'
            Dec 22 15:05:01 	charon: 15[CFG] added child to existing configuration 'con1000'
            Dec 22 15:05:01 	charon: 15[CFG] received stroke: add connection 'con1003'
            Dec 22 15:05:01 	ipsec_starter[55377]:
            Dec 22 15:05:01 	ipsec_starter[55377]: 'con1002' routed
            Dec 22 15:05:01 	charon: 13[CFG] received stroke: route 'con1002'
            Dec 22 15:05:01 	charon: 16[CFG] added child to existing configuration 'con1000'
            Dec 22 15:05:01 	charon: 16[CFG] received stroke: add connection 'con1002'
            Dec 22 15:05:01 	ipsec_starter[55377]:
            Dec 22 15:05:01 	ipsec_starter[55377]: 'con1001' routed
            Dec 22 15:05:01 	charon: 15[CFG] received stroke: route 'con1001'
            Dec 22 15:05:01 	charon: 13[CFG] added child to existing configuration 'con1000'
            Dec 22 15:05:01 	charon: 13[CFG] received stroke: add connection 'con1001'
            Dec 22 15:05:01 	ipsec_starter[55377]:
            Dec 22 15:05:01 	ipsec_starter[55377]: 'con1000' routed
            Dec 22 15:05:01 	charon: 16[CFG] received stroke: route 'con1000'
            Dec 22 15:05:01 	charon: 13[CFG] added configuration 'con1000'
            Dec 22 15:05:01 	charon: 13[CFG] received stroke: add connection 'con1000'
            Dec 22 15:05:01 	ipsec_starter[55377]: charon (55459) started after 980 ms
            Dec 22 15:05:01 	charon: 00[JOB] spawning 16 worker threads
            Dec 22 15:05:01 	charon: 00[LIB] unable to load 6 plugin features (5 due to unmet dependencies)
            Dec 22 15:05:01 	charon: 00[LIB] loaded plugins: charon unbound aes des blowfish rc2 sha1 sha2 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey ipseckey pem openssl fips-prf gmp xcbc cmac hmac curl attr kernel-pfkey kernel-pfroute resolve socket-default stroke smp updown eap-identity eap-sim eap-aka eap-aka-3gpp2 eap-md5 eap-mschapv2 eap-dynamic eap-radius eap-tls eap-ttls eap-peap xauth-generic xauth-eap whitelist addrblock unity
            Dec 22 15:05:01 	charon: 00[CFG] loaded 0 RADIUS server configurations
            Dec 22 15:05:01 	charon: 00[CFG] opening triplet file /var/etc/ipsec/ipsec.d/triplets.dat failed: No such file or directory
            Dec 22 15:05:01 	charon: 00[CFG] loaded IKE secret for 222.222.222.222
            Dec 22 15:05:01 	charon: 00[CFG] loading secrets from '/var/etc/ipsec/ipsec.secrets'
            Dec 22 15:05:01 	charon: 00[CFG] loading crls from '/var/etc/ipsec/ipsec.d/crls'
            Dec 22 15:05:01 	charon: 00[CFG] loading attribute certificates from '/var/etc/ipsec/ipsec.d/acerts'
            Dec 22 15:05:01 	charon: 00[CFG] loading ocsp signer certificates from '/var/etc/ipsec/ipsec.d/ocspcerts'
            Dec 22 15:05:01 	charon: 00[CFG] loading aa certificates from '/var/etc/ipsec/ipsec.d/aacerts'
            Dec 22 15:05:01 	charon: 00[CFG] loaded ca certificate "C=DE, ST=myState, L=myCity, O=myOrganization, OU=myOrganisationUnit, CN=myCA, E=do@not.use" from '/var/etc/ipsec/ipsec.d/cacerts/cdc05c4c.0.crt'
            Dec 22 15:05:01 	charon: 00[CFG] loaded ca certificate "C=DE, ST=Bayern, L=Hannberg, O=wegscheider office solution gmbh, OU=RootCA, CN=RootCA, E=support@wegscheider-os.de" from '/var/etc/ipsec/ipsec.d/cacerts/7f75f5d6.0.crt'
            Dec 22 15:05:01 	charon: 00[CFG] loading ca certificates from '/var/etc/ipsec/ipsec.d/cacerts'
            Dec 22 15:05:01 	charon: 00[CFG] ipseckey plugin is disabled
            Dec 22 15:05:01 	charon: 00[NET] enabling UDP decapsulation for IPv6 on port 4500 failed
            Dec 22 15:05:01 	charon: 00[KNL] unable to set UDP_ENCAP: Invalid argument
            Dec 22 15:05:00 	charon: 00[DMN] Starting IKE charon daemon (strongSwan 5.2.1, FreeBSD 10.1-RELEASE-p2, i386)
            Dec 22 15:05:00 	ipsec_starter[55006]: no known IPsec stack detected, ignoring!
            Dec 22 15:05:00 	ipsec_starter[55006]: no KLIPS IPsec stack detected
            Dec 22 15:05:00 	ipsec_starter[55006]: no netkey IPsec stack detected
            Dec 22 15:05:00 	ipsec_starter[55006]: Starting strongSwan 5.2.1 IPsec [starter]...</con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1></con1000|1>
            
            1 Reply Last reply Reply Quote 0
            • E
              eri--
              last edited by

              I pushed this on repository.
              Also the dashboard and status pages should behave with latest snapshots.

              1 Reply Last reply Reply Quote 0
              • S
                samham
                last edited by

                I downloaded the latest version this morning  "2.2-RC (amd64)  built on Tue Dec 23 05:11:07 CST 2014" I can now reach all of my subnets behind the remote firewall, however the IPsec GUI is still showing the wrong state "0 tunnels up"
                and the following errors:

                Warning: Invalid argument supplied for foreach() in /usr/local/www/widgets/widgets/ipsec.widget.php on line 89 Warning: Invalid argument supplied for foreach() in /usr/local/www/widgets/widgets/ipsec.widget.php on line 89 Warning: Invalid argument supplied for foreach() in /usr/local/www/widgets/widgets/ipsec.widget.php on line 89

                pfsense_error.PNG
                pfsense_error.PNG_thumb

                1 Reply Last reply Reply Quote 0
                • J
                  jgraham5481
                  last edited by

                  @samham:

                  I downloaded the latest version this morning  "2.2-RC (amd64)  built on Tue Dec 23 05:11:07 CST 2014" I can now reach all of my subnets behind the remote firewall, however the IPsec GUI is still showing the wrong state "0 tunnels up"
                  and the following errors:

                  Warning: Invalid argument supplied for foreach() in /usr/local/www/widgets/widgets/ipsec.widget.php on line 89 Warning: Invalid argument supplied for foreach() in /usr/local/www/widgets/widgets/ipsec.widget.php on line 89 Warning: Invalid argument supplied for foreach() in /usr/local/www/widgets/widgets/ipsec.widget.php on line 89

                  For me, using today's snapshot, the whole "Warning: Invalid argument supplied for foreach() in /usr/local/www/widgets/widgets/ipsec.widget.php on line 89 Warning: Invalid argument supplied for foreach() in /usr/local/www/widgets/widgets/ipsec.widget.php on line 89 Warning: Invalid argument supplied for foreach() in /usr/local/www/widgets/widgets/ipsec.widget.php on line 89" only appears while the animation for the packages update, do not make any GUI changes is running, seems to go away once its done. It does however show all zeros for the tunnels. Going to Status -> IP SEC show the true status, but lacks description for the tunnel. I believe it's being worked on based on https://redmine.pfsense.org/issues/4138

                  1 Reply Last reply Reply Quote 0
                  • S
                    samham
                    last edited by

                    The error messages goes away when the tunnel is brought up and the screen is refreshed, however the "active tunnels" counter is still wrong, and furthermore the errors reappear after the tunnel is brought down.

                    tracked here:

                    https://redmine.pfsense.org/issues/4139#change-16266

                    1 Reply Last reply Reply Quote 0
                    • E
                      EmL
                      last edited by

                      I updated to "2.2-RC (i386) built on Sun Dec 28 04:40:24 CST 2014" and my dashboard IPSec widged shows now 1 tunnel up and 5 down. So the widged has now the issue left, that it shows only the first P1 entry, while any other entry 2-? is shown as down (also if it's up). The IPSec status overview page displays me all my working 6 tunnels - these tunnels now working as a charm again.

                      1 Reply Last reply Reply Quote 0
                      • E
                        eskild
                        last edited by

                        2.2-RC (i386)
                        built on Sun Dec 28 04:40:24 CST 2014

                        In my case, the widget -> "Active tunnels" is always 0, even if all ph1(ike) and ph2(ipsec) entries are established.

                        1 Reply Last reply Reply Quote 0
                        • C
                          cmb
                          last edited by

                          As far as I've been able to determine, all the IPsec widget issues should be fine now. If you can still replicate anything there on the newest available snapshot, please provide details in a new thread on this board rather than continuing to hijack this one so we can follow up with everyone.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.