Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IKEv2 IPSEC VPN - Randomly stopped working

    Scheduled Pinned Locked Moved IPsec
    25 Posts 3 Posters 4.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mamawe @brswattt
      last edited by

      @brswattt said in IKEv2 IPSEC VPN - Randomly stopped working:

      @mamawe What is the benefit with and without? I'm not sure if I do need it exactly, I just want the client to connect after the lifetime expires, thats all.

      The benefit depends on what your situation is.

      Basically rekeying means replacing only the session keys while reauthentication means tearing down the IKE session and creating a new one from scratch. With IKEv2, rekeying can be done for Child SAs (ESP) as well as for the IKE SAs (IKE itself) by exchanging CREATE_CHILD_SA messages. IKEv1 supports only reauthentication of the IKE SA.

      I personally haven't been in a situation where I needed reauthentication with IKEv2.

      This page from the Strongswan Wiki may explain the topic better than I can do it.

      M 1 Reply Last reply Reply Quote 1
      • M
        mamawe @mamawe
        last edited by

        @mamawe Regarding rekeying, if you follow the link to interoperability issues with Windows on the Strongswan Wiki page, you can find that at least with Windows 7 clients rekeying of the IKE SA does only work with DH group modp1024.

        I don't know if that applies to your client.

        B 1 Reply Last reply Reply Quote 0
        • B
          brswattt @mamawe
          last edited by

          @mamawe it's a Windows 10 machine. Definitely a Windows issue as my Android phone had no problem rekeying both phases.

          B 1 Reply Last reply Reply Quote 0
          • B
            brswattt @brswattt
            last edited by brswattt

            @brswattt Looks like that bug reaches out to windows 10 as well. I triggered a manual rekey with 04ee86a4-40a7-488a-8f9b-7cce6e4b0b0b-image.png these algorithim settings (windows default), and I can rekey just fine.

            go back to this: 828faf6f-2ed2-47ca-a076-674d7c824e63-image.png and rekey fails 100% of the time.

            I dont understand how in 2022 windows 10 is still forcing you to use less secure parameters
            Even setting the Group to DH2 with the AESGCM256, it still doesn't work, so I'm forced to use AES/SHA1/DH2 which isn't secure at all. Thanks Microsoft.

            That algorithm works on Android though. Very stupid.

            1 Reply Last reply Reply Quote 0
            • B
              brswattt
              last edited by

              I added/changed it to AES/SHA256/DH14 in my router and client settings and rekey works! Way better than SHA1/DH2. I can live with this..

              1 Reply Last reply Reply Quote 2
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.