Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Charon memory leak

    Scheduled Pinned Locked Moved IPsec
    18 Posts 8 Posters 5.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      stemond
      last edited by

      How can you solved it ?

      Setting your tunnels  from IKEv1 to IKEv2 ?

      1 Reply Last reply Reply Quote 0
      • D
        djamp42
        last edited by

        I don't think you can. I've tried IKEv1 IKEv2 all sorts of different settings and Charon continues to eat memory.

        1 Reply Last reply Reply Quote 0
        • L
          luma
          last edited by

          Any news on this problem ? Is Strongswan working well for anyone ? Or all >= 2.2.3 users affected ?

          I would be happy to offer my help to find the culpit… Maybe we can open a Redmine ticket ?

          Thanks !

          1 Reply Last reply Reply Quote 0
          • M
            MadBullet
            last edited by

            Exactly the same issue for me in production with a low constant traffic. We need to restart the service every week.

            I'm a bit afraid by this ticket from strongswan tracking :
            https://wiki.strongswan.org/issues/964
            Since I clearly do not have a high traffic on that pfSense node, it seems there IS a memory leak somewhere in charon… But in any case, they're talking about the v5.3, so if it's our issue, upgrade the pfsense dependency won't fix it.

            I think we need a ticket, but where ? ... both places ?

            Regards
            Alex

            1 Reply Last reply Reply Quote 0
            • D
              djamp42
              last edited by

              It is not that issue, see this thread also. https://forum.pfsense.org/index.php?topic=96187.0

              CMB said he was going to look into it, but haven't heard anything back yet. i think it might be something with the FreeBSD port of strongswan because it doesn't seem like linux users are having this issue. Strongswan does have 5.3.3 coming out soon, but i don't see anything in release related to this.

              Also from my testing this issue is in every 2.2.X release

              1 Reply Last reply Reply Quote 0
              • M
                mudshark79
                last edited by

                Can confirm. Didin't check new threads before posting:

                https://forum.pfsense.org/index.php?topic=98672.0

                1 Reply Last reply Reply Quote 0
                • C
                  cmb
                  last edited by

                  @MadBullet:

                  I'm a bit afraid by this ticket from strongswan tracking :
                  https://wiki.strongswan.org/issues/964

                  That's strictly related to their userland libipsec, which has no relevance to anything we use.

                  I confirmed the general issue.
                  https://redmine.pfsense.org/issues/5149
                  https://wiki.strongswan.org/issues/1106

                  1 Reply Last reply Reply Quote 0
                  • L
                    luma
                    last edited by

                    Hi,

                    May I ask you for news about this really anoying problem ?

                    Thanks and regards

                    1 Reply Last reply Reply Quote 0
                    • D
                      djamp42
                      last edited by

                      It's being worked currently. https://redmine.pfsense.org/issues/5149

                      1 Reply Last reply Reply Quote 0
                      • C
                        cmb
                        last edited by

                        @djamp42:

                        It's being worked currently. https://redmine.pfsense.org/issues/5149

                        There's an update on that ticket. Next snapshot run should resolve the serious leaks.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.