Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Issue with 21.02 and not with 2.5.0

    Scheduled Pinned Locked Moved IPsec
    18 Posts 8 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      beejee
      last edited by

      I finally got my IPsec tunnel to work without interruption on my Netgate XG-7100 by turning of the Hardware Crypto. I think version 21.02 had something that made the IPsec become no longer able to catch up or sync with the Hardware Crypto. I believe it is a work around solution since the Hardware Crypto has to be off.

      1 Reply Last reply Reply Quote 1
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        If you are using a 5100 or 7100 your best bet is to change the hardware crypto from AES-NI to QAT.

        If you have to stay on AES-NI then you should check and see if any of your tunnels are using SHA256 and if so, change to a different hash (or ideally change over to AES-GCM without a hash).

        You could disable hardware cryptography as well but that will obviously incur a performance penalty if you are pushing significant traffic over IPsec.

        Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        L H F 3 Replies Last reply Reply Quote 1
        • L
          lst_hoe @jimp
          last edited by

          @jimp : Could you please explain why there is a problem with AES-NI and SHA256? I guess this is a very common setting for the SG5100 and heavily used as of today. I also failed to found the "QAT" setting in 2.4.5, so no chance to set this in advance?

          jimpJ 1 Reply Last reply Reply Quote 1
          • H
            hannesclp @jimp
            last edited by

            @jimp Thanks for your advice! We have hit the very same bug and did cost me some hours since have been in evaluation of pfsense and therefor a million other reasons why it could have failed. We are using XG-7100-1U devices in the eval.

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate @lst_hoe
              last edited by

              @lst_hoe said in Issue with 21.02 and not with 2.5.0:

              @jimp : Could you please explain why there is a problem with AES-NI and SHA256? I guess this is a very common setting for the SG5100 and heavily used as of today. I also failed to found the "QAT" setting in 2.4.5, so no chance to set this in advance?

              The newer AES-NI driver in 21.02/2.5.0 added support for accelerating hashing and that new feature appears to have some issues. It isn't consistently repeatable, though, so we haven't tracked down the exact cause yet.

              https://redmine.pfsense.org/issues/11524

              Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              L 1 Reply Last reply Reply Quote 1
              • L
                lst_hoe @jimp
                last edited by

                It might be a different issue for our site. I have checked the logs from the failed upgrade and with 21.02_1 (SG5100) and imported working config we got for every IKE_SA_INIT request

                no IKE config found for x.x.x.x...x.x.x.x, sending NO_PROPOSAL_CHOSEN

                all the time, so no IPSEC tunnel was working at all. We have three P1 IKEv2 configs, one for Mobile Clients (mostly Windows) and two Site-to-Site tunnels. We have indeed AES-NI enabled and SHA-256 for all Phase 1, but we never seen any tunnel succeed at all?

                I will try with the second SG5100 device and QAT, but this will take some time.

                1 Reply Last reply Reply Quote 0
                • jimpJ
                  jimp Rebel Alliance Developer Netgate
                  last edited by

                  That is likely something else, you should start your own thread with more details, but first check the existing threads which list patches to try. If it can't match the connection there could be one of several solved issues at play with the IPsec config itself.

                  Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                  Need help fast? Netgate Global Support!

                  Do not Chat/PM for help!

                  L 1 Reply Last reply Reply Quote 1
                  • L
                    lst_hoe @jimp
                    last edited by

                    Already found
                    https://redmine.pfsense.org/issues/11442
                    https://redmine.pfsense.org/issues/11555

                    The Mobile Clients use %any and the Site-to-Site FQDN as remote ID :-(

                    1 Reply Last reply Reply Quote 0
                    • jimpJ
                      jimp Rebel Alliance Developer Netgate
                      last edited by

                      You can apply the commits referenced on those issues using the system patches package as mentioned in several other threads.

                      Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      J 1 Reply Last reply Reply Quote 0
                      • J
                        JD 0 @jimp
                        last edited by

                        @jimp I swapped my 5100 over to QAT (with a reboot) and am still seeing random drops. Since the need here is non-critical I'm going to wait for the referenced patches to land in an update and re-test.

                        J 1 Reply Last reply Reply Quote 0
                        • H
                          hannesclp
                          last edited by

                          @jimp Maybe it helps since I saw you only mentioning Sha256: We had the described issue using aes 256 and sha1 on the xg7100 (refer to my above mentioned post).

                          1 Reply Last reply Reply Quote 0
                          • F
                            froussy @jimp
                            last edited by

                            @jimp Good day,

                            I did, on my 5100 change the AES-NI to QAT and it worked..

                            I will try our 7100 tonight!

                            Will keep updated

                            Frank

                            C 1 Reply Last reply Reply Quote 0
                            • C
                              cybero2912 @froussy
                              last edited by

                              but changing or disabling hardware encryption ist not a real solution!
                              it is a workaround, not more

                              1 Reply Last reply Reply Quote 0
                              • J
                                JD 0 @JD 0
                                last edited by

                                @jd-0 Wanted to followup that 21.02.2 (as well as the RC over the last month) completely resolved my random drops issue. Many thanks!

                                1 Reply Last reply Reply Quote 1
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.