Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    2.5 upgrade broke some, not all, IPSEC

    IPsec
    5
    16
    515
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      gtoger last edited by

      Updated to 2.5 on a handful of platforms, including:
      pfSense Community under VMware
      pfSense Community on bare metal
      pfSense+ on Netgate SG-1100

      Experiencing VPN trouble on all. Let's take a single instance; IPSEC from pfSense 2.5.0-RELEASE (amd64) on bare metal to pfSense+ 21.02-RELEASE (arm64) on SG-1100.

      I have tried the edit - save - stop - start suggestion as well as removing the tunnel entirely from both ends and starting from scratch.

      Output of "swanctl --list-conns"

      con200000: IKEv1, reauthentication every 25920s, dpd delay 10s
        local:  208.77.nn.nn
        remote: 67.79.nn.nn
        local pre-shared key authentication:
          id: 208.77.nn.nn
        remote pre-shared key authentication:
          id: 67.79.nn.nn
        con0: TUNNEL, rekeying every 3240s, dpd action is hold
          local:  192.168.0.0/24|/0
          remote: 192.168.1.0/24|/0
      

      output of "swanctl --load-all --file /var/etc/ipsec/swanctl.conf --debug 1"

      no authorities found, 0 unloaded
      no pools found, 0 unloaded
      loaded ike secret 'ike-0'
      loaded ike secret 'ike-1'
      loaded ike secret 'ike-2'
      loaded ike secret 'ike-3'
      loaded ike secret 'ike-4'
      loaded ike secret 'ike-5'
      loaded ike secret 'ike-6'
      loaded ike secret 'ike-7'
      loaded ike secret 'ike-8'
      loaded ike secret 'ike-9'
      loaded ike secret 'ike-10'
      loaded connection 'bypass'
      loaded connection 'con300000'
      loaded connection 'con400000'
      loaded connection 'con600000'
      loaded connection 'con700000'
      loaded connection 'con8000'
      loaded connection 'con5000'
      loaded connection 'con1000000'
      loaded connection 'con1100000'
      loaded connection 'con200000'
      successfully loaded 10 connections, 0 unloaded
      

      relevant output of "/var/etc/ipsec/swanctl.conf"

      	con200000 {
      		fragmentation = yes
      		unique = replace
      		version = 1
      		aggressive = no
      		proposals = aes128-sha256-modp2048
      		dpd_delay = 10s
      		dpd_timeout = 60s
      		reauth_time = 25920s
      		over_time = 2880s
      		rand_time = 2880s
      		encap = no
      		mobike = no
      		local_addrs = 208.77.nn.nn
      		remote_addrs = 67.79.nn.nn
      		pools = 
      		local {
      			id = 208.77.nn.nn
      			auth = psk
      		}
      		remote {
      			id = 67.79.nn.nn
      			auth = psk
      		}
      		children {
      			con0 {
      				dpd_action = trap
      				mode = tunnel
      				policies = yes
      				life_time = 3600s
      				rekey_time = 3240s
      				rand_time = 360s
      				start_action = trap
      				local_ts = 192.168.0.0/24
      				remote_ts = 192.168.1.0/24
      				esp_proposals = aes128gcm128-modp2048,aes128-sha256-modp2048
      			}
      		}
      	}
      

      Log entries:

      Feb 19 09:40:53 	charon 	65414 	07[NET] <200> received packet: from 67.79.nn.nn[500] to 208.77.nn.nn[500] (180 bytes)
      Feb 19 09:40:53 	charon 	65414 	07[ENC] <200> parsed ID_PROT request 0 [ SA V V V V V ]
      Feb 19 09:40:53 	charon 	65414 	07[IKE] <200> no IKE config found for 208.77.nn.nn...67.79.nn.nn, sending NO_PROPOSAL_CHOSEN
      Feb 19 09:40:53 	charon 	65414 	07[ENC] <200> generating INFORMATIONAL_V1 request 2737378764 [ N(NO_PROP) ]
      Feb 19 09:40:53 	charon 	65414 	07[NET] <200> sending packet: from 208.77.nn.nn[500] to 67.79.nn.nn[500] (40 bytes) 
      

      As mentioned, we have other examples of tunnels that aren't working after updates, but let's start with this and see if there are any suggestions that work for it and might be applied to others.

      1 Reply Last reply Reply Quote 0
      • jimp
        jimp Rebel Alliance Developer Netgate last edited by

        From the log message it looks like it can't match the tunnel for some reason.

        Can you show the same output from the other side as well?

        G 1 Reply Last reply Reply Quote 0
        • G
          gtoger @jimp last edited by gtoger

          Thanks @jimp . Yes, I agree with the analysis. However, I've been through it several times and I don't find a discrepancy. In case it's just my eyeballs not working, here's the requested output from the other side:

          "swanctl --list-conns"

          con100000: IKEv1, reauthentication every 25920s, dpd delay 10s
            local:  67.79.nn.nn
            remote: 208.77.nn.nn
            local pre-shared key authentication:
              id: 67.79.nn.nn
            remote pre-shared key authentication:
              id: 208.77.nn.nn
            con0: TUNNEL, rekeying every 3240s, dpd action is hold
              local:  192.168.1.0/24|/0
              remote: 192.168.0.0/24|/0
          

          output of "swanctl --load-all --file /var/etc/ipsec/swanctl.conf --debug 1"

          no authorities found, 0 unloaded
          no pools found, 0 unloaded
          loaded ike secret 'ike-0'
          loaded connection 'bypass'
          loaded connection 'con100000'
          successfully loaded 2 connections, 0 unloaded
          

          relevant output of "/var/etc/ipsec/swanctl.conf"

          	con100000 {
          		fragmentation = yes
          		unique = replace
          		version = 1
          		aggressive = no
          		proposals = aes128-sha256-modp2048
          		dpd_delay = 10s
          		dpd_timeout = 60s
          		reauth_time = 25920s
          		over_time = 2880s
          		rand_time = 2880s
          		encap = no
          		mobike = no
          		local_addrs = 67.79.nn.nn
          		remote_addrs = 208.77.nn.nn
          		pools = 
          		local {
          			id = 67.79.nn.nn
          			auth = psk
          		}
          		remote {
          			id = 208.77.nn.nn
          			auth = psk
          		}
          		children {
          			con0 {
          				dpd_action = trap
          				mode = tunnel
          				policies = yes
          				life_time = 3600s
          				rekey_time = 3240s
          				rand_time = 360s
          				start_action = trap
          				local_ts = 192.168.1.0/24
          				remote_ts = 192.168.0.0/24
          				esp_proposals = aes128gcm128-modp2048,aes128-sha256-modp2048
          			}
          		}
          	}
          

          Log entries:

          Feb 19 11:09:24 	charon 	50154 	09[KNL] creating acquire job for policy 67.77.nn.nn/32|/0 === 208.77.nn.nn/32|/0 with reqid {1}
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> queueing ISAKMP_VENDOR task
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> queueing ISAKMP_CERT_PRE task
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> queueing MAIN_MODE task
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> queueing ISAKMP_CERT_POST task
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> queueing ISAKMP_NATD task
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> queueing QUICK_MODE task
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> activating new tasks
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> activating ISAKMP_VENDOR task
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> activating ISAKMP_CERT_PRE task
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> activating MAIN_MODE task
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> activating ISAKMP_CERT_POST task
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> activating ISAKMP_NATD task
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> sending XAuth vendor ID
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> sending DPD vendor ID
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> sending FRAGMENTATION vendor ID
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> sending NAT-T (RFC 3947) vendor ID
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> sending draft-ietf-ipsec-nat-t-ike-02\n vendor ID
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> initiating Main Mode IKE_SA con100000[367] to 208.77.nn.nn
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> IKE_SA con100000[367] state change: CREATED => CONNECTING
          Feb 19 11:09:24 	charon 	50154 	06[CFG] <con100000|367> configured proposals: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
          Feb 19 11:09:24 	charon 	50154 	06[ENC] <con100000|367> generating ID_PROT request 0 [ SA V V V V V ]
          Feb 19 11:09:24 	charon 	50154 	06[NET] <con100000|367> sending packet: from 67.79.nn.nn[500] to 208.77.nn.nn[500] (180 bytes)
          Feb 19 11:09:24 	charon 	50154 	06[NET] <con100000|367> received packet: from 208.77.nn.nn[500] to 67.79.nn.nn[500] (40 bytes)
          Feb 19 11:09:24 	charon 	50154 	06[ENC] <con100000|367> parsed INFORMATIONAL_V1 request 2873590687 [ N(NO_PROP) ]
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> received NO_PROPOSAL_CHOSEN error notify
          Feb 19 11:09:24 	charon 	50154 	06[IKE] <con100000|367> IKE_SA con100000[367] state change: CONNECTING => DESTROYING 
          
          1 Reply Last reply Reply Quote 0
          • jimp
            jimp Rebel Alliance Developer Netgate last edited by

            Nothing immediately stands out there either. Can you, temporarily, disable all tunnels on the first box so that only this one is enabled? I'm curious if something else in one of the other tunnels could be conflicting or causing this one to fail.

            I'd need to see the full config from that one to know for sure though.

            G 1 Reply Last reply Reply Quote 0
            • G
              gtoger @jimp last edited by

              I disabled all the other tunnels on the system from VPN > IPsec > Tunnels and clicked the green Apply button.

              Now in status, all of the tunnels (9 total) that I disabled are showing "Established" still, while the #10 tunnel (this one in question, and the only one marked as enabled) shows "Disconnected".

              Restarting the IPsec service via GUI has no effect. If I click to stop the service, the GUI page reloads but does not indicate that the service is stopped. ie: it displays the "stop" icon button again and not the "play" icon as I would expect.

              Is there something wrong at a deeper level? I might note that this was previously a 2.4.5_1 system that was upgraded.

              LMK inf you need the full config on the system. It might take me a bit to obfuscate the relevant parts.

              1 Reply Last reply Reply Quote 0
              • jimp
                jimp Rebel Alliance Developer Netgate last edited by

                You might have to manually stop IPsec and then start it again from Status > Services to ensure the disabled parts are fully deactivated for this kind of test.

                There is a problem with the status page showing incorrectly, that's already got a fix in (https://redmine.pfsense.org/issues/11435)

                G 1 Reply Last reply Reply Quote 0
                • G
                  gtoger @jimp last edited by

                  @jimp The service doesn't stop, even if doing manually from Status > Services. I click on the stop icon, and it just refreshes to another stop icon. The service never actually stops.

                  The tunnels are verified to still be up as they're passing traffic (I can reach the private IPs on the other ends).

                  Re the status page not appearing correctly, I actually have applied the following patches already:
                  ead6515637a34ce6e170e2d2b0802e4fa1e63a00
                  57beb9ad8ca11703778fc483c7cba0f6770657ac
                  c09137ab4726dc492c658c27b6c46e25f0fbb55b

                  1 Reply Last reply Reply Quote 0
                  • jimp
                    jimp Rebel Alliance Developer Netgate last edited by

                    Do you have something like Service Watchdog setup which might be restarting it when it shouldn't be?

                    G 1 Reply Last reply Reply Quote 0
                    • G
                      gtoger @jimp last edited by

                      Nope. Nothing like that. It's pretty much a stock setup.

                      I've been informed that in addition to this IPSEC issue, SIP traffic is not passing. Unrelated items, yes. But both issues came after the update.

                      My concern is that there are things that have been mangled in the upgrade process, especially considering this box started as a MUCH earlier version of pfSense several years ago. We may have to simply export the config, spin up a fresh install and import the config across.

                      1 Reply Last reply Reply Quote 0
                      • jimp
                        jimp Rebel Alliance Developer Netgate last edited by

                        Before doing that you might want to reset your browser cache to make sure it isn't using outdated JS/CSS. Maybe something there is tripping up the service stop/start buttons.

                        G 1 Reply Last reply Reply Quote 0
                        • G
                          gtoger @jimp last edited by

                          @jimp Thanks Yeah, that wasn't it. I even switched browsers. Something is, I'm afraid, really wrong with this thing.

                          H 1 Reply Last reply Reply Quote 1
                          • H
                            hescominsoon @gtoger last edited by

                            @gtoger make a config backup and then reinstall from scratch..then try restoring the config..see if that helps.

                            G 1 Reply Last reply Reply Quote 0
                            • G
                              gtoger @hescominsoon last edited by

                              @hescominsoon It's not what I wanted to do, but I did it.

                              Did it solve the problem? Nope. Still have a failure to connect this tunnel.

                              Could it be that we're going between a pfSense CE and a pfSense+ on a Netgate device? Would seem awfully dang strange. But I'm convinced there's a bug here someplace.

                              1 Reply Last reply Reply Quote 1
                              • M
                                mmichael last edited by

                                Hello,

                                I can report the same problems with my VM - Hardware PFSense an Tunnels
                                BR
                                Martin

                                1 Reply Last reply Reply Quote 0
                                • viktor_g
                                  viktor_g Netgate last edited by

                                  Try to resave/reapply the Phase 1 parameters for your tunnels,
                                  this could be related to https://redmine.pfsense.org/issues/11455

                                  4 1 Reply Last reply Reply Quote 0
                                  • jimp
                                    jimp Rebel Alliance Developer Netgate last edited by jimp

                                    This thread is getting out of hand like the previous one. We need to keep each thread for ONE issue only, not for multiple unrelated things that happen to be in IPsec.

                                    See my previous response at https://forum.netgate.com/post/964752

                                    Before reporting any issues, please look at the list of recent IPsec issues and apply fixes/workarounds from there to eliminate known causes.

                                    You can install the System Patches package and then create entries for the following commit IDs to apply the fixes:

                                    • ead6515637a34ce6e170e2d2b0802e4fa1e63a00 #11435
                                    • 57beb9ad8ca11703778fc483c7cba0f6770657ac #11435
                                    • 10eb04259fd139c62e08df8de877b71fdd0eedc8 #11442
                                    • ded7970ba57a99767e08243103e55d8a58edfc35 #11486
                                    • afffe759c4fd19fe6b8311196f4b6d5e288ea4fb #11487
                                    • 2fe5cc52bd881ed26723a81e0eed848fd505fba6 #11488

                                    Please refrain from replying to someone else's thread with a "me too" until there is confirmation that your issues are really the same and not just similar.

                                    I'll split some of these off into their own threads if they don't already have them, but for now, this one is locked.

                                    1 Reply Last reply Reply Quote 1
                                    • First post
                                      Last post

                                    Products

                                    • Platform Overview
                                    • TNSR
                                    • pfSense
                                    • Appliances

                                    Services

                                    • Training
                                    • Professional Services

                                    Support

                                    • Subscription Plans
                                    • Contact Support
                                    • Product Lifecycle
                                    • Documentation

                                    News

                                    • Media Coverage
                                    • Press
                                    • Events

                                    Resources

                                    • Blog
                                    • FAQ
                                    • Find a Partner
                                    • Resource Library
                                    • Security Information

                                    Company

                                    • About Us
                                    • Careers
                                    • Partners
                                    • Contact Us
                                    • Legal
                                    Our Mission

                                    We provide leading-edge network security at a fair price - regardless of organizational size or network sophistication. We believe that an open-source security model offers disruptive pricing along with the agility required to quickly address emerging threats.

                                    Subscribe to our Newsletter

                                    Product information, software announcements, and special offers. See our newsletter archive to sign up for future newsletters and to read past announcements.

                                    © 2021 Rubicon Communications, LLC | Privacy Policy