Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSEC Connections in 2.2.3 fail after a couple of days.

    Scheduled Pinned Locked Moved IPsec
    12 Posts 5 Posters 5.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      cmb
      last edited by

      Those aren't likely related at all. What logs do you have around that?

      If you could open that back up to me, I'll get in and check it out. I don't recall your IPs, etc., can PM me details.

      1 Reply Last reply Reply Quote 0
      • C
        cmb
        last edited by

        The bulk of this was a result of WAN flapping, every time it goes down and comes back up it forces rekey of IPsec, which drops it for a period of time. Rinse and repeat with repeated WAN failures, and they don't stay up for long. Once the connection stabilized, most of the VPNs have been fine. The ones that aren't, I'm not sure they should be up. Seems the remote isn't responding on a few of them.

        1 Reply Last reply Reply Quote 0
        • K
          kitdavis
          last edited by

          I agree that the flapping is the cause of the problem.  And I also agree that the log reports that the connections at the other end are not responding.

          However this morning, the status looked like the first screen shot - with 5 or more remote ends that have been unresponsive for more than 2 days.  And the log reported that the other end of the connection is down and not responding.

          After a reboot of this end, all of the connections are restored and working.  Since this has been happening exactly this way for several days I think we can rule out a simultaneous miracle at the remote ends.  ;-)  Its as if pfsense just gets tired of trying to make the connection and flags them as being down.

          ![Screenshot from 2015-07-01 08:22:37.png](/public/imported_attachments/1/Screenshot from 2015-07-01 08:22:37.png)
          ![Screenshot from 2015-07-01 08:22:37.png_thumb](/public/imported_attachments/1/Screenshot from 2015-07-01 08:22:37.png_thumb)
          ![Screenshot from 2015-07-01 08:26:15.png](/public/imported_attachments/1/Screenshot from 2015-07-01 08:26:15.png)
          ![Screenshot from 2015-07-01 08:26:15.png_thumb](/public/imported_attachments/1/Screenshot from 2015-07-01 08:26:15.png_thumb)

          1 Reply Last reply Reply Quote 0
          • E
            Ed Servello
            last edited by

            I'm running an IPSEC tunnel between two 2.2.4 systems, one is a Netgate RCC-VE 2440 and the other is a dedicated Dell PowerEdge R220. They are both directly connected to the Internet. On startup, the tunnel is established immediately and performs really well for about three days. Then the tunnel disconnects and only a restart of the Dell machine will enable the tunnel to connect again.

            I did notice an interesting sign of trouble on the R220 server - when the tunnel drops, the SPD table is blank. It's normal for the SAD table to be empty when there's no connection but I've never seen the SPD completely blank. Otherwise all of the other settings in the GUI appear normal. The IPSEC log on the Netgate side shows that the remote peer stops responding.

            ~Ed

            1 Reply Last reply Reply Quote 0
            • K
              kitdavis
              last edited by

              One thing that I should have noticed and reported previously is that with 2.2.4, when the problem occurs, stopping IPSEC from the GUI reports that IPSEC is stopped, but the status always remains as running (no red X).  The log merely reports:  php-fpm[31554]: /status_services.php: Forcefully reloading IPsec.  No error message is generated and IPSEC status does not change.  After a reboot, stopping the service results in a red X, the same message in the log and IPSEC is truly stopped.

              1 Reply Last reply Reply Quote 0
              • Z
                ZPrime
                last edited by

                @kitdavis:

                One thing that I should have noticed and reported previously is that with 2.2.4, when the problem occurs, stopping IPSEC from the GUI reports that IPSEC is stopped, but the status always remains as running (no red X).  The log merely reports:  php-fpm[31554]: /status_services.php: Forcefully reloading IPsec.  No error message is generated and IPSEC status does not change.  After a reboot, stopping the service results in a red X, the same message in the log and IPSEC is truly stopped.

                Interesting, I'm seeing the same "doesn't stop" behavior although my "symptoms" are different.  I'm passing traffic with several SAs over a tunnel, but I'm unable to bring up additional SAs across that same tunnel.  I haven't tried a pfsense reboot to see if that clears things up, but now I suspect it might (since I've had this work correctly in the past even with the mess that is strongswan).

                It's been enough of a pain in my rear that I picked up an EdgeRouter Lite and have been toying with the idea of using it for VPN duties while keeping pfsense as my main router (simply because EdgeOS is still not as nice to use through a GUI and I don't feel like learning Vyatta more than I'd need to setup the VPN :P)

                1 Reply Last reply Reply Quote 0
                • K
                  kitdavis
                  last edited by

                  I agree that this IPSEC problem is a real pain at the moment, but for the last 7 or so years I've never had a problem with PFSense that lasted more than a day.  I have 20 + installations and no desire to change, so I'll hang in for a while - I'm sure once the issues with StrongsWan are resolved it will be another 7 trouble-free years.  And if the problem drags out I could always just move everything to OPENVPN.

                  1 Reply Last reply Reply Quote 0
                  • D
                    djamp42
                    last edited by

                    Unfortunately if you are running a tunnel with another vendor chances are you'll be stuck with IPSec. My tunnels have been pretty much stable with 2.2.4 but the memory leak issue is a major pain right now. Strongswan is way better now then it was in the first 2.2 releases.

                    1 Reply Last reply Reply Quote 0
                    • K
                      kitdavis
                      last edited by

                      For what it is worth, I got tired of restarting PFSense every third day.  I installed last weekend's 2.2.5 snapshot and IPSEC has been stable for the whole week.  I'm not sure looking through the list what change was responsible, but it is a relief to have IPSEC working again.

                      1 Reply Last reply Reply Quote 0
                      • K
                        kitdavis
                        last edited by

                        I celebrated too soon.  It took 6 days before IPSEC failed.  The IPSEC task can't be stopped or restarted, only solution is to reboot pfsense.

                        1 Reply Last reply Reply Quote 0
                        • K
                          kitdavis
                          last edited by

                          The problem still exists in 2.2.5.  Upgraded from the Development stream to the production version on Friday and today the tunnels are inoperative and can not be restarted.  The IPSEC task can not be stopped from the GUI or from the command line and the only option is to reboot pfsense.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.