After 2.2.3 upgrade IPsec tunnels wont come back up
-
It shouldn't do that's a Phase2/routing type option.
So it's working PSK and still using the hardware crypto?
Steve
-
Yes. PSK is working.
P1 established on 3DES SHA1
P2 established on 3DES SHA1
Full packet flow in both directions.
I haven't tested throughput benchmark to see if crypto cards are working but it seems normal.I cannot get RSA certs working at all with 2.2.3.
I have tried:-2.2.2 initiating connection to 2.2.3 - no luck
2.2.3 initiating connection to 2.2.2 - no luck
2.2.3 initiating connection to 2.2.3 - no luck2.2.2 initiating connection to 2.2.2 - works every time!
I have been reading the changelog for StrongSwan and I'm wondering if this has something to do with reqid.
Perhaps there is something missing in the existing RSA certs that reqid is looking for?My RSA certs are setup similar to the process described in the HowTo except that instead of IP:value in the certs I am using DNS:value instead. This works well with dynamic IP and dynamic DNS on 2.2.2 IPsec VPNs.
https://doc.pfsense.org/index.php/IPsec_RSA_Authentication_Quick_Start -
Ok, I setup my test tunnel here using certs as described in the quick start doc and it came right up.
That's running 2.2.3 on one side and 2.2.4-dev on the other but at this point the only difference in 2.2.4 is removing the offending AES-NI patch.That's running: P1 AES 256/SHA1 P2 AES-GCM 256/SHA1
If you tell me exactly what encryption settings you were using I can verify that. It does look likely to be an issue with your encryption hardware though.
Steve
-
Thanks for trying to replicate my issue.
Did you use IP addresses for your P1 config or FQDN?
Did you use IP: references in your RSA certs or DNS: references?
Did you use ASN.1 distinguished names for 'My Identifier' and 'Peer Identifier' Eg. "C=GB, ST=E… "My P1 config that works well on 2.2.2 does not use IP addresses only FQDN.
I am using only hostnames because one end of my tunnel is on dynamic IP.
My P2 config does use IP addresses.I realise that I am probably using an off-the-beaten track configuration and I will be putting time in next week to try to find the root cause of the problem. Thanks in advance for confirming a known good starting point for my tests.
-
I went for a basic setup just to confirm that certs were working so exactly as described in the quick_start doc.
I'll try to test some more variations.Steve
-
Thanks Steve.
My guess is that it's a data matching problem with the references in the certs. -
There is a patch for 2.2.3 you can try that adds the various fixes from 2.2.4. Let me know if you'd like to try that.
Steve
-
Hi!
How to apply this patch?
BR
-
Thank you to the team for the hard work that went into fixing IPsec in 2.2.4 , my RSA certificate authenticated tunnels are running again.
I read the release notes for 2.2.4 first.
I installed 2.2.4 from the console.
I created new certificates and revoked the originals and installed imported certs where necessary.
I had to remove a set of "" from the ASN.1 config in the GUI but after that the links came up.I haven't tried any hardware crypto tests yet but it looks like it is still working.
Thanks again.
-
Great, thanks for confirming that. :)
Steve