Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    KeyID tag issue since 2.4.5

    Scheduled Pinned Locked Moved IPsec
    20 Posts 2 Posters 2.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • H
      hdservices
      last edited by

      I was not using # - It was really a simple word.
      You can get me a beta version with auto mode option? To see if that works again?

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        I'm telling you that choosing ASN.1 Distinguished Name would be functionally identical to "Auto" -- neither one would add a type prefix.

        Check your /var/etc/ipsec/ipsec.conf for the identifier to see how it shows up each time.

        Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • H
          hdservices
          last edited by hdservices

          9b365d86-0884-4c32-8731-2eb733bdff4c-image.png
          This is the info in the file when I set it to ASN.1 DN and type in a keyword.

          Tunnel does not come online with this setting.

          1 Reply Last reply Reply Quote 0
          • jimpJ
            jimp Rebel Alliance Developer Netgate
            last edited by

            So rightid doesn't have any kind of type prefix. That's exactly what would have been in the config on 2.4.4-p3 when set to Key ID.

            Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            1 Reply Last reply Reply Quote 0
            • H
              hdservices
              last edited by hdservices

              WIll it help if I send you log info from PFsense IPsec logging?
              Can I send it to an e-mail address or PM?

              It should see with what Draytek is trying to connect (Draytek is dialling out)

              1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate
                last edited by

                Sorry, I can't commit to helping with this kind of issue privately. If you can anonymize the logs a bit and post them here, myself or others may be able to assist.

                Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                1 Reply Last reply Reply Quote 0
                • H
                  hdservices
                  last edited by

                  Ok did so. Here the working log based on Peer IP address (WAN address)

                  Working:
                  May 6 07:56:15 charon 10[CFG] vici client 14149 disconnected
                  May 6 07:56:15 charon 11[CFG] vici client 14149 requests: list-sas
                  May 6 07:56:15 charon 10[CFG] vici client 14149 registered for: list-sa
                  May 6 07:56:15 charon 11[CFG] vici client 14149 connected
                  May 6 07:56:12 charon 05[CHD] <con1000|289> CHILD_SA con1000{395} state change: INSTALLING => INSTALLED
                  May 6 07:56:12 charon 05[IKE] <con1000|289> CHILD_SA con1000{395} established with SPIs c8c66c98_i d000df9e_o and TS 192.168.31.0/24|/0 === 10.0.4.0/24|/0
                  May 6 07:56:12 charon 05[CHD] <con1000|289> SPI 0xd000df9e, src x.x.x.x dst x.x.x.x
                  May 6 07:56:12 charon 05[CHD] <con1000|289> adding outbound ESP SA
                  May 6 07:56:12 charon 05[CHD] <con1000|289> SPI 0xc8c66c98, src x.x.x.x dst x.x.x.x
                  May 6 07:56:12 charon 05[CHD] <con1000|289> adding inbound ESP SA
                  May 6 07:56:12 charon 05[CHD] <con1000|289> using HMAC_SHA2_256_128 for integrity
                  May 6 07:56:12 charon 05[CHD] <con1000|289> using AES_CBC for encryption
                  May 6 07:56:12 charon 05[CHD] <con1000|289> CHILD_SA con1000{395} state change: CREATED => INSTALLING
                  May 6 07:56:12 charon 05[ENC] parsed QUICK_MODE request 109397397 [ HASH ]
                  May 6 07:56:12 charon 05[NET] <con1000|289> received packet: from x.x.x.x[4500] to x.x.x.x[4500] (76 bytes)
                  May 6 07:56:12 charon 05[NET] <con1000|289> sending packet: from x.x.x.x[4500] to x.x.x.x[4500] (460 bytes)
                  May 6 07:56:12 charon 05[ENC] generating QUICK_MODE response 109397397 [ HASH SA No KE ID ID ]
                  May 6 07:56:12 charon 05[IKE] <con1000|289> received 3600s lifetime, configured 0s
                  May 6 07:56:12 charon 05[CFG] <con1000|289> selected proposal: ESP:AES_CBC_256/HMAC_SHA2_256_128/MODP_2048/NO_EXT_SEQ
                  May 6 07:56:12 charon 05[CFG] <con1000|289> configured proposals: ESP:AES_CBC_256/HMAC_SHA2_256_128/MODP_2048/NO_EXT_SEQ
                  May 6 07:56:12 charon 05[CFG] <con1000|289> received proposals: ESP:AES_CBC_256/HMAC_SHA2_256_128/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_MD5_96/MODP_2048/NO_EXT_SEQ
                  May 6 07:56:12 charon 05[CFG] <con1000|289> proposal matches
                  May 6 07:56:12 charon 05[CFG] <con1000|289> selecting proposal:
                  May 6 07:56:12 charon 05[CFG] <con1000|289> config: 192.168.31.0/24|/0, received: 192.168.31.0/24|/0 => match: 192.168.31.0/24|/0
                  May 6 07:56:12 charon 05[CFG] <con1000|289> selecting traffic selectors for us:
                  May 6 07:56:12 charon 05[CFG] <con1000|289> config: 10.0.4.0/24|/0, received: 10.0.4.0/24|/0 => match: 10.0.4.0/24|/0
                  May 6 07:56:12 charon 05[CFG] <con1000|289> selecting traffic selectors for other:
                  May 6 07:56:12 charon 05[CFG] <con1000|289> found matching child config "con1000" with prio 10
                  May 6 07:56:12 charon 05[CFG] <con1000|289> candidate "con1000" with prio 5+5
                  May 6 07:56:12 charon 05[CFG] <con1000|289> 10.0.4.0/24|/0
                  May 6 07:56:12 charon 05[CFG] <con1000|289> proposing traffic selectors for other:
                  May 6 07:56:12 charon 05[CFG] <con1000|289> 192.168.31.0/24|/0
                  May 6 07:56:12 charon 05[CFG] <con1000|289> proposing traffic selectors for us:
                  May 6 07:56:12 charon 05[CFG] <con1000|289> looking for a child config for 192.168.31.0/24|/0 === 10.0.4.0/24|/0
                  May 6 07:56:12 charon 05[ENC] parsed QUICK_MODE request 109397397 [ HASH SA No KE ID ID ]
                  May 6 07:56:12 charon 05[NET] <con1000|289> received packet: from x.x.x.x[4500] to x.x.x.x[4500] (508 bytes)
                  May 6 07:56:12 charon 11[NET] <con1000|289> sending packet: from x.x.x.x[4500] to x.x.x.x[4500] (92 bytes)
                  May 6 07:56:12 charon 11[ENC] <con1000|289> generating ID_PROT response 0 [ ID HASH ]
                  May 6 07:56:12 charon 11[IKE] <con1000|289> IKE_SA con1000[289] state change: CONNECTING => ESTABLISHED
                  May 6 07:56:12 charon 11[IKE] <con1000|289> IKE_SA con1000[289] established between x.x.x.x[x.x.x.x]...x.x.x.x[192.168.1.60]
                  May 6 07:56:12 charon 11[CFG] <289> selected peer config "con1000"
                  May 6 07:56:12 charon 11[CFG] <289> candidate "con1000", match: 1/20/3100 (me/other/ike)
                  May 6 07:56:12 charon 11[CFG] <289> candidate "bypasslan", match: 1/1/24 (me/other/ike)
                  May 6 07:56:12 charon 11[CFG] <289> looking for pre-shared key peer configs matching x.x.x.x...x.x.x.x[192.168.1.60]
                  May 6 07:56:12 charon 11[ENC] <289> parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
                  May 6 07:56:12 charon 11[NET] <289> received packet: from x.x.x.x[4500] to x.x.x.x[4500] (108 bytes)
                  May 6 07:56:11 charon 11[NET] <289> sending packet: from x.x.x.x[500] to x.x.x.x[500] (396 bytes)
                  May 6 07:56:11 charon 11[ENC] <289> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
                  May 6 07:56:11 charon 11[CFG] <289> candidate "con1000", match: 1/1/3100 (me/other/ike)
                  May 6 07:56:11 charon 11[CFG] <289> candidate "bypasslan", match: 1/1/24 (me/other/ike)
                  May 6 07:56:11 charon 11[IKE] <289> remote host is behind NAT
                  May 6 07:56:11 charon 11[ENC] <289> parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
                  May 6 07:56:11 charon 11[NET] <289> received packet: from x.x.x.x[500] to x.x.x.x[500] (380 bytes)
                  May 6 07:56:11 charon 11[NET] <289> sending packet: from x.x.x.x[500] to x.x.x.x[500] (136 bytes)
                  May 6 07:56:11 charon 11[ENC] <289> generating ID_PROT response 0 [ SA V V V ]
                  May 6 07:56:11 charon 11[IKE] <289> sending NAT-T (RFC 3947) vendor ID
                  May 6 07:56:11 charon 11[IKE] <289> sending DPD vendor ID
                  May 6 07:56:11 charon 11[IKE] <289> sending XAuth vendor ID
                  May 6 07:56:11 charon 11[CFG] <289> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
                  May 6 07:56:11 charon 11[CFG] <289> configured proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
                  May 6 07:56:11 charon 11[CFG] <289> received proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_2048, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536, IKE:AES_CBC_192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC_192/HMAC_MD5_96/PRF_HMAC_MD5/MODP_2048, IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536, IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
                  May 6 07:56:11 charon 11[CFG] <289> proposal matches
                  May 6 07:56:11 charon 11[CFG] <289> selecting proposal:
                  May 6 07:56:11 charon 11[IKE] <289> IKE_SA (unnamed)[289] state change: CREATED => CONNECTING
                  May 6 07:56:11 charon 11[IKE] <289> x.x.x.x is initiating a Main Mode IKE_SA
                  May 6 07:56:11 charon 11[IKE] <289> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
                  May 6 07:56:11 charon 11[IKE] <289> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
                  May 6 07:56:11 charon 11[IKE] <289> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
                  May 6 07:56:11 charon 11[IKE] <289> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
                  May 6 07:56:11 charon 11[IKE] <289> received NAT-T (RFC 3947) vendor ID
                  May 6 07:56:11 charon 11[IKE] <289> received DPD vendor ID
                  May 6 07:56:11 charon 11[CFG] <289> found matching ike config: x.x.x.x...x.x.x.x with prio 3100
                  May 6 07:56:11 charon 11[CFG] <289> candidate: x.x.x.x...x.x.x.x, prio 3100
                  May 6 07:56:11 charon 11[CFG] <289> candidate: %any...%any, prio 24
                  May 6 07:56:11 charon 11[CFG] <289> looking for an IKEv1 config for x.x.x.x...x.x.x.x
                  May 6 07:56:11 charon 11[ENC] <289> parsed ID_PROT request 0 [ SA V V V V V V ]
                  May 6 07:56:11 charon 11[NET] <289> received packet: from x.x.x.x[500] to x.x.x.x[500] (556 bytes)
                  May 6 07:56:10 charon 05[CFG] vici client 14148 disconnected
                  May 6 07:56:10 charon 13[CFG] vici client 14148 requests: list-sas
                  May 6 07:56:10 charon 05[CFG] vici client 14148 registered for: list-sa
                  May 6 07:56:10 charon 13[CFG] vici client 14148 connected
                  May 6 07:56:10 charon 13[IKE] <con1000|288> IKE_SA con1000[288] state change: DELETING => DESTROYING
                  May 6 07:56:10 charon 13[NET] <con1000|288> sending packet: from x.x.x.x[4500] to x.x.x.x[4500] (108 bytes)
                  May 6 07:56:10 charon 13[ENC] generating INFORMATIONAL_V1 request 2804867589 [ HASH D ]
                  May 6 07:56:10 charon 13[IKE] <con1000|288> IKE_SA con1000[288] state change: ESTABLISHED => DELETING
                  May 6 07:56:10 charon 13[IKE] <con1000|288> sending DELETE for IKE_SA con1000[288]
                  May 6 07:56:10 charon 13[IKE] <con1000|288> deleting IKE_SA con1000[288] between x.x.x.x[x.x.x.x]...x.x.x.x[192.168.1.60]
                  May 6 07:56:10 charon 13[IKE] <con1000|288> activating ISAKMP_DELETE task
                  May 6 07:56:10 charon 13[IKE] <con1000|288> activating new tasks
                  May 6 07:56:10 charon 13[NET] <con1000|288> sending packet: from x.x.x.x[4500] to x.x.x.x[4500] (92 bytes)
                  May 6 07:56:10 charon 13[ENC] generating INFORMATIONAL_V1 request 738891620 [ HASH D ]
                  May 6 07:56:10 charon 13[IKE] <con1000|288> sending DELETE for ESP CHILD_SA with SPI c8de6673
                  May 6 07:56:10 charon 13[CHD] <con1000|288> CHILD_SA con1000{394} state change: DELETED => DESTROYING
                  May 6 07:56:10 charon 13[CHD] <con1000|288> CHILD_SA con1000{394} state change: DELETING => DELETED
                  May 6 07:56:10 charon 13[IKE] <con1000|288> closing CHILD_SA con1000{394} with SPIs c8de6673_i (3992 bytes) d000df9d_o (8432 bytes) and TS 192.168.31.0/24|/0 === 10.0.4.0/24|/0
                  May 6 07:56:10 charon 13[CHD] <con1000|288> CHILD_SA con1000{394} state change: INSTALLED => DELETING
                  May 6 07:56:10 charon 13[IKE] <con1000|288> activating QUICK_DELETE task
                  May 6 07:56:10 charon 13[IKE] <con1000|288> activating new tasks
                  May 6 07:56:10 charon 13[IKE] <con1000|288> queueing ISAKMP_DELETE task
                  May 6 07:56:10 charon 13[IKE] <con1000|288> queueing QUICK_DELETE task
                  May 6 07:56:10 charon 11[CFG] received stroke: terminate 'con1000[288]'
                  May 6 07:56:06 charon 11[CFG] vici client 14147 disconnected
                  May 6 07:56:06 charon 16[CFG] vici client 14147 requests: list-sas
                  May 6 07:56:06 charon 11[CFG] vici client 14147 registered for: list-sa
                  May 6 07:56:06 charon 11[CFG] vici client 14147 connected

                  And here the log not working with ASN.1 defined now (So in previous version I used KeyIDTag)
                  Here you see the VPN fail

                  May 6 07:58:52 charon 10[CFG] vici client 14177 disconnected
                  May 6 07:58:52 charon 10[CFG] vici client 14177 requests: list-sas
                  May 6 07:58:52 charon 10[CFG] vici client 14177 registered for: list-sa
                  May 6 07:58:52 charon 06[CFG] vici client 14177 connected
                  May 6 07:58:47 charon 08[CFG] vici client 14176 disconnected
                  May 6 07:58:47 charon 08[CFG] vici client 14176 requests: list-sas
                  May 6 07:58:47 charon 06[CFG] vici client 14176 registered for: list-sa
                  May 6 07:58:47 charon 08[CFG] vici client 14176 connected
                  May 6 07:58:47 charon 08[IKE] <290> IKE_SA (unnamed)[290] state change: CONNECTING => DESTROYING
                  May 6 07:58:47 charon 08[NET] <290> sending packet: from x.x.x.x[4500] to x.x.x.x[4500] (108 bytes)
                  May 6 07:58:47 charon 08[ENC] <290> generating INFORMATIONAL_V1 request 626828801 [ HASH N(AUTH_FAILED) ]
                  May 6 07:58:47 charon 08[IKE] <290> activating INFORMATIONAL task
                  May 6 07:58:47 charon 08[IKE] <290> activating new tasks
                  May 6 07:58:47 charon 08[IKE] <290> queueing INFORMATIONAL task
                  May 6 07:58:47 charon 08[IKE] <290> found 1 matching config, but none allows pre-shared key authentication using Main Mode
                  May 6 07:58:47 charon 08[CFG] <290> candidate "bypasslan", match: 1/1/24 (me/other/ike)
                  May 6 07:58:47 charon 08[CFG] <290> looking for pre-shared key peer configs matching x.x.x.x...x.x.x.x[192.168.1.60]
                  May 6 07:58:47 charon 08[ENC] <290> parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
                  May 6 07:58:47 charon 08[NET] <290> received packet: from x.x.x.x[4500] to x.x.x.x[4500] (108 bytes)
                  May 6 07:58:47 charon 08[NET] <290> sending packet: from x.x.x.x[500] to x.x.x.x[500] (396 bytes)
                  May 6 07:58:47 charon 08[ENC] <290> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
                  May 6 07:58:47 charon 08[CFG] <290> candidate "con1000", match: 1/1/3100 (me/other/ike)
                  May 6 07:58:47 charon 08[CFG] <290> candidate "bypasslan", match: 1/1/24 (me/other/ike)
                  May 6 07:58:47 charon 08[IKE] <290> remote host is behind NAT
                  May 6 07:58:47 charon 08[ENC] <290> parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
                  May 6 07:58:47 charon 08[NET] <290> received packet: from x.x.x.x[500] to x.x.x.x[500] (380 bytes)
                  May 6 07:58:47 charon 08[NET] <290> sending packet: from x.x.x.x[500] to x.x.x.x[500] (136 bytes)
                  May 6 07:58:47 charon 08[IKE] <290> received retransmit of request with ID 0, retransmitting response
                  May 6 07:58:47 charon 08[NET] <290> received packet: from x.x.x.x[500] to x.x.x.x[500] (556 bytes)
                  May 6 07:58:44 charon 16[NET] <290> sending packet: from x.x.x.x[500] to x.x.x.x[500] (136 bytes)
                  May 6 07:58:44 charon 16[ENC] <290> generating ID_PROT response 0 [ SA V V V ]
                  May 6 07:58:44 charon 16[IKE] <290> sending NAT-T (RFC 3947) vendor ID
                  May 6 07:58:44 charon 16[IKE] <290> sending DPD vendor ID
                  May 6 07:58:44 charon 16[IKE] <290> sending XAuth vendor ID
                  May 6 07:58:44 charon 16[CFG] <290> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
                  May 6 07:58:44 charon 16[CFG] <290> configured proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
                  May 6 07:58:44 charon 16[CFG] <290> received proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_2048, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536, IKE:AES_CBC_192/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC_192/HMAC_MD5_96/PRF_HMAC_MD5/MODP_2048, IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536, IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
                  May 6 07:58:44 charon 16[CFG] <290> proposal matches
                  May 6 07:58:44 charon 16[CFG] <290> selecting proposal:
                  May 6 07:58:44 charon 16[IKE] <290> IKE_SA (unnamed)[290] state change: CREATED => CONNECTING
                  May 6 07:58:44 charon 16[IKE] <290> x.x.x.x is initiating a Main Mode IKE_SA
                  May 6 07:58:44 charon 16[IKE] <290> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
                  May 6 07:58:44 charon 16[IKE] <290> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
                  May 6 07:58:44 charon 16[IKE] <290> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
                  May 6 07:58:44 charon 16[IKE] <290> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
                  May 6 07:58:44 charon 16[IKE] <290> received NAT-T (RFC 3947) vendor ID
                  May 6 07:58:44 charon 16[IKE] <290> received DPD vendor ID
                  May 6 07:58:44 charon 16[CFG] <290> found matching ike config: x.x.x.x...x.x.x.x with prio 3100
                  May 6 07:58:44 charon 16[CFG] <290> candidate: x.x.x.x...x.x.x.x, prio 3100
                  May 6 07:58:44 charon 16[CFG] <290> candidate: %any...%any, prio 24
                  May 6 07:58:44 charon 16[CFG] <290> looking for an IKEv1 config for x.x.x.x...x.x.x.x
                  May 6 07:58:44 charon 16[ENC] <290> parsed ID_PROT request 0 [ SA V V V V V V ]
                  May 6 07:58:44 charon 16[NET] <290> received packet: from x.x.x.x[500] to x.x.x.x[500] (556 bytes)
                  May 6 07:58:42 charon 16[CFG] ignoring acquire, connection attempt pending
                  May 6 07:58:42 charon 08[KNL] creating acquire job for policy x.x.x.x/32|/0 === x.x.x.x/32|/0 with reqid {17}
                  May 6 07:58:42 charon 08[CFG] vici client 14175 disconnected
                  May 6 07:58:42 charon 16[CFG] vici client 14175 requests: list-sas
                  May 6 07:58:42 charon 08[CFG] vici client 14175 registered for: list-sa
                  May 6 07:58:42 charon 12[CFG] vici client 14175 connected
                  May 6 07:58:42 charon 12[IKE] <con1000|289> IKE_SA con1000[289] state change: DELETING => DESTROYING
                  May 6 07:58:42 charon 12[NET] <con1000|289> sending packet: from x.x.x.x[4500] to x.x.x.x[4500] (108 bytes)
                  May 6 07:58:42 charon 12[ENC] generating INFORMATIONAL_V1 request 1940305061 [ HASH D ]
                  May 6 07:58:42 charon 12[IKE] <con1000|289> IKE_SA con1000[289] state change: ESTABLISHED => DELETING
                  May 6 07:58:42 charon 12[IKE] <con1000|289> sending DELETE for IKE_SA con1000[289]
                  May 6 07:58:42 charon 12[IKE] <con1000|289> deleting IKE_SA con1000[289] between x.x.x.x[x.x.x.x]...x.x.x.x[192.168.1.60]
                  May 6 07:58:42 charon 12[IKE] <con1000|289> activating ISAKMP_DELETE task
                  May 6 07:58:42 charon 12[IKE] <con1000|289> activating new tasks
                  May 6 07:58:42 charon 12[NET] <con1000|289> sending packet: from x.x.x.x[4500] to x.x.x.x[4500] (92 bytes)
                  May 6 07:58:42 charon 12[ENC] generating INFORMATIONAL_V1 request 3096891326 [ HASH D ]
                  May 6 07:58:42 charon 12[IKE] <con1000|289> sending DELETE for ESP CHILD_SA with SPI c8c66c98
                  May 6 07:58:42 charon 12[CHD] <con1000|289> CHILD_SA con1000{395} state change: DELETED => DESTROYING
                  May 6 07:58:42 charon 12[CHD] <con1000|289> CHILD_SA con1000{395} state change: DELETING => DELETED
                  May 6 07:58:42 charon 12[IKE] <con1000|289> closing CHILD_SA con1000{395} with SPIs c8c66c98_i (14792 bytes) d000df9e_o (31252 bytes) and TS 192.168.31.0/24|/0 === 10.0.4.0/24|/0
                  May 6 07:58:42 charon 12[CHD] <con1000|289> CHILD_SA con1000{395} state change: INSTALLED => DELETING
                  May 6 07:58:42 charon 12[IKE] <con1000|289> activating QUICK_DELETE task
                  May 6 07:58:42 charon 12[IKE] <con1000|289> activating new tasks
                  May 6 07:58:42 charon 12[IKE] <con1000|289> queueing ISAKMP_DELETE task
                  May 6 07:58:42 charon 12[IKE] <con1000|289> queueing QUICK_DELETE task
                  May 6 07:58:42 charon 16[CFG] received stroke: terminate 'con1000[289]'

                  1 Reply Last reply Reply Quote 0
                  • H
                    hdservices
                    last edited by

                    Do you have time to look at my logs ;-)?

                    1 Reply Last reply Reply Quote 0
                    • H
                      hdservices
                      last edited by

                      Anytime already ? Regards Marco

                      1 Reply Last reply Reply Quote 0
                      • jimpJ
                        jimp Rebel Alliance Developer Netgate
                        last edited by

                        @hdservices said in KeyID tag issue since 2.4.5:

                        May 6 07:58:47	charon		08[CFG] <290> candidate "bypasslan", match: 1/1/24 (me/other/ike)
                        May 6 07:58:47	charon		08[CFG] <290> looking for pre-shared key peer configs matching x.x.x.x...x.x.x.x[192.168.1.60]
                        May 6 07:58:47	charon		08[ENC] <290> parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
                        May 6 07:58:47	charon		08[NET] <290> received packet: from x.x.x.x[4500] to x.x.x.x[4500] (108 bytes)
                        May 6 07:58:47	charon		08[NET] <290> sending packet: from x.x.x.x[500] to x.x.x.x[500] (396 bytes)
                        May 6 07:58:47	charon		08[ENC] <290> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
                        May 6 07:58:47	charon		08[CFG] <290> candidate "con1000", match: 1/1/3100 (me/other/ike)
                        May 6 07:58:47	charon		08[CFG] <290> candidate "bypasslan", match: 1/1/24 (me/other/ike)
                        

                        It's selecting bypasslan which means the P1 info didn't match. Either you didn't match up the ID (Looks like the remote is sending 192.168.1.60 as its ID) or the Pre-Shared key for 192.168.1.60 could not be found.

                        Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                        Need help fast? Netgate Global Support!

                        Do not Chat/PM for help!

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.