<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="de">
	<id>https://wiki.ixheim.de/index.php?action=history&amp;feed=atom&amp;title=Strongswan_errors</id>
	<title>Strongswan errors - Versionsgeschichte</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ixheim.de/index.php?action=history&amp;feed=atom&amp;title=Strongswan_errors"/>
	<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Strongswan_errors&amp;action=history"/>
	<updated>2026-05-14T23:02:57Z</updated>
	<subtitle>Versionsgeschichte dieser Seite in Xinux Wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://wiki.ixheim.de/index.php?title=Strongswan_errors&amp;diff=13825&amp;oldid=prev</id>
		<title>Thomas: /* Source */</title>
		<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Strongswan_errors&amp;diff=13825&amp;oldid=prev"/>
		<updated>2017-09-07T08:25:48Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Source&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;de&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Nächstältere Version&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Version vom 7. September 2017, 08:25 Uhr&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l316&quot; &gt;Zeile 316:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Zeile 316:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Source==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Source==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*https://doc.pfsense.org/index.php/IPsec_Troubleshooting&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;#Common_Errors_.28strongSwan.2C_pfSense_.3E.3D_2.2.x.29&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*https://doc.pfsense.org/index.php/IPsec_Troubleshooting&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key my_wiki:diff::1.12:old-13824:rev-13825 --&gt;
&lt;/table&gt;</summary>
		<author><name>Thomas</name></author>
	</entry>
	<entry>
		<id>https://wiki.ixheim.de/index.php?title=Strongswan_errors&amp;diff=13824&amp;oldid=prev</id>
		<title>Thomas am 6. September 2017 um 18:15 Uhr</title>
		<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Strongswan_errors&amp;diff=13824&amp;oldid=prev"/>
		<updated>2017-09-06T18:15:17Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;de&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Nächstältere Version&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Version vom 6. September 2017, 18:15 Uhr&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l314&quot; &gt;Zeile 314:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Zeile 314:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  net.inet.ipsec.directdispatch=0&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  net.inet.ipsec.directdispatch=0&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;==Source==&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;*https://doc.pfsense.org/index.php/IPsec_Troubleshooting#Common_Errors_.28strongSwan.2C_pfSense_.3E.3D_2.2.x.29&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Thomas</name></author>
	</entry>
	<entry>
		<id>https://wiki.ixheim.de/index.php?title=Strongswan_errors&amp;diff=13823&amp;oldid=prev</id>
		<title>Thomas: Die Seite wurde neu angelegt: „Category:Troubleshooting Category:IPsec == Renegotiation Errors == If a tunnel comes up initially, but then fails after a Phase 1 or Phase 2 expiration…“</title>
		<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Strongswan_errors&amp;diff=13823&amp;oldid=prev"/>
		<updated>2017-09-06T18:14:08Z</updated>

		<summary type="html">&lt;p&gt;Die Seite wurde neu angelegt: „&lt;a href=&quot;/index.php/Kategorie:Troubleshooting&quot; title=&quot;Kategorie:Troubleshooting&quot;&gt;Category:Troubleshooting&lt;/a&gt; &lt;a href=&quot;/index.php/Kategorie:IPsec&quot; title=&quot;Kategorie:IPsec&quot;&gt;Category:IPsec&lt;/a&gt; == Renegotiation Errors == If a tunnel comes up initially, but then fails after a Phase 1 or Phase 2 expiration…“&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Neue Seite&lt;/b&gt;&lt;/p&gt;&lt;div&gt;[[Category:Troubleshooting]]&lt;br /&gt;
[[Category:IPsec]]&lt;br /&gt;
== Renegotiation Errors ==&lt;br /&gt;
If a tunnel comes up initially, but then fails after a Phase 1 or Phase 2 expiration, try changing the following settings on both ends of the tunnel:&lt;br /&gt;
&lt;br /&gt;
* '''System &amp;gt; Advanced''', '''Miscellaneous''' tab: *uncheck* '''Prefer Old IPsec SA''' (No longer exists on pfSense 2.2.3+)&lt;br /&gt;
* On the IPsec Phase 1 settings, disable '''NAT Traversal''' (NAT-T)&lt;br /&gt;
* On the IPsec Phase 1 settings, enable '''DPD'''&lt;br /&gt;
* On the IPsec Phase 2 settings, enter an '''Automaitcally Ping Host''' in the remote Phase 2 subnet.&lt;br /&gt;
&lt;br /&gt;
== Common Errors (strongSwan, pfSense &amp;gt;= 2.2.x) ==&lt;br /&gt;
&lt;br /&gt;
The following examples have logs edited for brevity but significant messages remain.&lt;br /&gt;
&lt;br /&gt;
Logging for IPsec is configured at '''VPN &amp;gt; IPsec''', '''Advanced Settings''' tab. The most useful logging settings for diagnosing tunnel issues with strongSwan on pfSense 2.2.x are:&lt;br /&gt;
* '''IKE SA''', '''IKE Child SA''', and '''Configuration Backend''' on ''Diag''&lt;br /&gt;
* All others on ''Control''&lt;br /&gt;
&lt;br /&gt;
Other notable behaviors:&lt;br /&gt;
* If there is an ''Aggressive''/''Main'' mode mismatch and the side set for ''Main'' initiates, the tunnel will still establish&lt;br /&gt;
* '''Lifetime''' mismatches do not cause a failure in Phase 1 or Phase 2&lt;br /&gt;
&lt;br /&gt;
===Normal / OK Connection===&lt;br /&gt;
'''Initiator'''&lt;br /&gt;
 charon: 09[IKE] IKE_SA con2000[11] established between 192.0.2.90[192.0.2.90]...192.0.2.74[192.0.2.74]&lt;br /&gt;
 charon: 09[IKE] CHILD_SA con2000{2} established with SPIs cf4973bf_i c1cbfdf2_o and TS 192.168.48.0/24|/0 === 10.42.42.0/24|/0&lt;br /&gt;
&lt;br /&gt;
'''Responder'''&lt;br /&gt;
 charon: 03[IKE] IKE_SA con1000[19] established between 192.0.2.74[192.0.2.74]...192.0.2.90[192.0.2.90]&lt;br /&gt;
 charon: 16[IKE] CHILD_SA con1000{1} established with SPIs c1cbfdf2_i cf4973bf_o and TS 10.42.42.0/24|/0 === 192.168.48.0/24|/0&lt;br /&gt;
&lt;br /&gt;
===Phase 1 Main / Aggressive Mismatch===&lt;br /&gt;
'''Initiator''' (Aggressive set, responder on Main)&lt;br /&gt;
 charon: 15[IKE] initiating Aggressive Mode IKE_SA con2000[1] to 192.0.2.74&lt;br /&gt;
 charon: 15[IKE] received AUTHENTICATION_FAILED error notify&lt;br /&gt;
 charon: 13[ENC] parsed INFORMATIONAL_V1 request 1215317906 [ N(AUTH_FAILED) ]&lt;br /&gt;
 charon: 13[IKE] received AUTHENTICATION_FAILED error notify&lt;br /&gt;
&lt;br /&gt;
'''Responder'''&lt;br /&gt;
 charon: 13[IKE] Aggressive Mode PSK disabled for security reasons&lt;br /&gt;
 charon: 13[ENC] generating INFORMATIONAL_V1 request 2940146627 [ N(AUTH_FAILED) ]&lt;br /&gt;
&lt;br /&gt;
===Phase 1 Identifier Mismatch===&lt;br /&gt;
'''Initiator'''&lt;br /&gt;
 charon: 10[ENC] parsed INFORMATIONAL_V1 request 4216246776 [ HASH N(AUTH_FAILED) ]&lt;br /&gt;
 charon: 10[IKE] received AUTHENTICATION_FAILED error notify&lt;br /&gt;
&lt;br /&gt;
'''Responder'''&lt;br /&gt;
 charon: 12[CFG] looking for pre-shared key peer configs matching 192.0.2.74...192.0.2.90[someid]&lt;br /&gt;
 charon: 12[IKE] no peer config found&lt;br /&gt;
 charon: 12[ENC] generating INFORMATIONAL_V1 request 4216246776 [ HASH N(AUTH_FAILED) ]&lt;br /&gt;
&lt;br /&gt;
===Phase 1 Pre-Shared Key Mismatch===&lt;br /&gt;
'''Initiator'''&lt;br /&gt;
 charon: 09[ENC] invalid HASH_V1 payload length, decryption failed?&lt;br /&gt;
 charon: 09[ENC] could not decrypt payloads&lt;br /&gt;
 charon: 09[IKE] message parsing failed&lt;br /&gt;
&lt;br /&gt;
'''Responder'''&lt;br /&gt;
 charon: 09[ENC] invalid ID_V1 payload length, decryption failed?&lt;br /&gt;
 charon: 09[ENC] could not decrypt payloads&lt;br /&gt;
 charon: 09[IKE] message parsing failed&lt;br /&gt;
&lt;br /&gt;
===Phase 1 Encryption Algorithm Mismatch===&lt;br /&gt;
'''Initiator'''&lt;br /&gt;
 charon: 14[ENC] parsed INFORMATIONAL_V1 request 3851683074 [ N(NO_PROP) ]&lt;br /&gt;
 charon: 14[IKE] received NO_PROPOSAL_CHOSEN error notify&lt;br /&gt;
&lt;br /&gt;
'''Responder'''&lt;br /&gt;
 charon: 14[CFG] received proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024&lt;br /&gt;
 charon: 14[CFG] configured proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024&lt;br /&gt;
 charon: 14[IKE] no proposal found&lt;br /&gt;
 charon: 14[ENC] generating INFORMATIONAL_V1 request 3851683074 [ N(NO_PROP) ]&lt;br /&gt;
&lt;br /&gt;
===Phase 1 Hash Algorithm Mismatch===&lt;br /&gt;
'''Initiator'''&lt;br /&gt;
 charon: 10[ENC] parsed INFORMATIONAL_V1 request 2774552374 [ N(NO_PROP) ]&lt;br /&gt;
 charon: 10[IKE] received NO_PROPOSAL_CHOSEN error notify&lt;br /&gt;
&lt;br /&gt;
'''Responder'''&lt;br /&gt;
 charon: 14[CFG] received proposals: IKE:AES_CBC_256/MODP_1024&lt;br /&gt;
 charon: 14[CFG] configured proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024&lt;br /&gt;
 charon: 14[IKE] no proposal found&lt;br /&gt;
 charon: 14[ENC] generating INFORMATIONAL_V1 request 2774552374 [ N(NO_PROP) ]&lt;br /&gt;
&lt;br /&gt;
===Phase 1 DH Group Mismatch===&lt;br /&gt;
'''Initiator'''&lt;br /&gt;
 charon: 11[ENC] parsed INFORMATIONAL_V1 request 316473468 [ N(NO_PROP) ]&lt;br /&gt;
 charon: 11[IKE] received NO_PROPOSAL_CHOSEN error notify&lt;br /&gt;
&lt;br /&gt;
'''Responder'''&lt;br /&gt;
 charon: 14[CFG] received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_8192&lt;br /&gt;
 charon: 14[CFG] configured proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024&lt;br /&gt;
 charon: 14[IKE] no proposal found&lt;br /&gt;
 charon: 14[ENC] generating INFORMATIONAL_V1 request 316473468 [ N(NO_PROP) ]&lt;br /&gt;
&lt;br /&gt;
===Phase 2 Network Mismatch===&lt;br /&gt;
'''Initiator'''&lt;br /&gt;
 charon: 08[CFG] proposing traffic selectors for us:&lt;br /&gt;
 charon: 08[CFG] 192.168.48.0/24|/0&lt;br /&gt;
 charon: 08[CFG] proposing traffic selectors for other:&lt;br /&gt;
 charon: 08[CFG] 10.42.43.0/24|/0&lt;br /&gt;
 charon: 08[ENC] generating QUICK_MODE request 316948142 [ HASH SA No ID ID ]&lt;br /&gt;
 charon: 08[NET] sending packet: from 192.0.2.90[500] to 192.0.2.74[500] (236 bytes)&lt;br /&gt;
 charon: 08[NET] received packet: from 192.0.2.74[500] to 192.0.2.90[500] (76 bytes)&lt;br /&gt;
 charon: 08[ENC] parsed INFORMATIONAL_V1 request 460353720 [ HASH N(INVAL_ID) ]&lt;br /&gt;
 charon: 08[IKE] received INVALID_ID_INFORMATION error notify&lt;br /&gt;
&lt;br /&gt;
'''Responder'''&lt;br /&gt;
 charon: 08[ENC] parsed QUICK_MODE request 2732380262 [ HASH SA No ID ID ]&lt;br /&gt;
 charon: 08[CFG] looking for a child config for 10.42.43.0/24|/0 === 192.168.48.0/24|/0&lt;br /&gt;
 charon: 08[CFG] proposing traffic selectors for us:&lt;br /&gt;
 charon: 08[CFG] 10.42.42.0/24|/0&lt;br /&gt;
 charon: 08[CFG] proposing traffic selectors for other:&lt;br /&gt;
 charon: 08[CFG] 192.168.48.0/24|/0&lt;br /&gt;
 charon: 08[IKE] no matching CHILD_SA config found&lt;br /&gt;
 charon: 08[IKE] queueing INFORMATIONAL task&lt;br /&gt;
 charon: 08[IKE] activating new tasks&lt;br /&gt;
 charon: 08[IKE] activating INFORMATIONAL task&lt;br /&gt;
 charon: 08[ENC] generating INFORMATIONAL_V1 request 1136605099 [ HASH N(INVAL_ID) ]&lt;br /&gt;
&lt;br /&gt;
===Phase 2 Encryption Algorithm Mismatch===&lt;br /&gt;
'''Initiator'''&lt;br /&gt;
 charon: 14[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ&lt;br /&gt;
 charon: 14[ENC] generating QUICK_MODE request 759760112 [ HASH SA No ID ID ]&lt;br /&gt;
 charon: 14[NET] sending packet: from 192.0.2.90[500] to 192.0.2.74[500] (188 bytes)&lt;br /&gt;
 charon: 14[NET] received packet: from 192.0.2.74[500] to 192.0.2.90[500] (76 bytes)&lt;br /&gt;
 charon: 14[ENC] parsed INFORMATIONAL_V1 request 1275272345 [ HASH N(NO_PROP) ]&lt;br /&gt;
 charon: 14[IKE] received NO_PROPOSAL_CHOSEN error notify&lt;br /&gt;
&lt;br /&gt;
'''Responder'''&lt;br /&gt;
 charon: 13[CFG] selecting proposal:&lt;br /&gt;
 charon: 13[CFG] no acceptable ENCRYPTION_ALGORITHM found&lt;br /&gt;
 charon: 13[CFG] received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ&lt;br /&gt;
 charon: 13[CFG] configured proposals: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ&lt;br /&gt;
 charon: 13[IKE] no matching proposal found, sending NO_PROPOSAL_CHOSEN&lt;br /&gt;
 charon: 13[IKE] queueing INFORMATIONAL task&lt;br /&gt;
 charon: 13[IKE] activating new tasks&lt;br /&gt;
 charon: 13[IKE] activating INFORMATIONAL task&lt;br /&gt;
 charon: 13[ENC] generating INFORMATIONAL_V1 request 1275272345 [ HASH N(NO_PROP) ]&lt;br /&gt;
&lt;br /&gt;
===Phase 2 Hash Algorithm Mismatch===&lt;br /&gt;
'''Initiator'''&lt;br /&gt;
 charon: 10[CFG] configured proposals: ESP:AES_CBC_256/HMAC_SHA2_512_256/NO_EXT_SEQ&lt;br /&gt;
 charon: 10[ENC] generating QUICK_MODE request 2648029707 [ HASH SA No ID ID ]&lt;br /&gt;
 charon: 10[NET] sending packet: from 192.0.2.90[500] to 192.0.2.74[500] (188 bytes)&lt;br /&gt;
 charon: 10[NET] received packet: from 192.0.2.74[500] to 192.0.2.90[500] (76 bytes)&lt;br /&gt;
 charon: 10[ENC] parsed INFORMATIONAL_V1 request 757918402 [ HASH N(NO_PROP) ]&lt;br /&gt;
 charon: 10[IKE] received NO_PROPOSAL_CHOSEN error notify&lt;br /&gt;
&lt;br /&gt;
'''Responder'''&lt;br /&gt;
 charon: 11[CFG] selecting proposal:&lt;br /&gt;
 charon: 11[CFG] no acceptable INTEGRITY_ALGORITHM found&lt;br /&gt;
 charon: 11[CFG] received proposals: ESP:AES_CBC_256/HMAC_SHA2_512_256/NO_EXT_SEQ&lt;br /&gt;
 charon: 11[CFG] configured proposals: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ&lt;br /&gt;
 charon: 11[IKE] no matching proposal found, sending NO_PROPOSAL_CHOSEN&lt;br /&gt;
 charon: 11[IKE] queueing INFORMATIONAL task&lt;br /&gt;
 charon: 11[IKE] activating new tasks&lt;br /&gt;
 charon: 11[IKE] activating INFORMATIONAL task&lt;br /&gt;
 charon: 11[ENC] generating INFORMATIONAL_V1 request 757918402 [ HASH N(NO_PROP) ]&lt;br /&gt;
&lt;br /&gt;
===Phase 2 PFS Mismatch===&lt;br /&gt;
'''Initiator'''&lt;br /&gt;
 charon: 06[ENC] generating QUICK_MODE request 909980434 [ HASH SA No KE ID ID ]&lt;br /&gt;
 charon: 06[NET] sending packet: from 192.0.2.90[500] to 192.0.2.74[500] (444 bytes)&lt;br /&gt;
 charon: 06[NET] received packet: from 192.0.2.74[500] to 192.0.2.90[500] (76 bytes)&lt;br /&gt;
 charon: 06[ENC] parsed INFORMATIONAL_V1 request 3861985833 [ HASH N(NO_PROP) ]&lt;br /&gt;
 charon: 06[IKE] received NO_PROPOSAL_CHOSEN error notify&lt;br /&gt;
&lt;br /&gt;
'''Responder'''&lt;br /&gt;
 charon: 08[CFG] selecting proposal:&lt;br /&gt;
 charon: 08[CFG] no acceptable DIFFIE_HELLMAN_GROUP found&lt;br /&gt;
 charon: 08[CFG] received proposals: ESP:AES_CBC_256/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ&lt;br /&gt;
 charon: 08[CFG] configured proposals: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ&lt;br /&gt;
 charon: 08[IKE] no matching proposal found, sending NO_PROPOSAL_CHOSEN&lt;br /&gt;
 charon: 08[ENC] generating INFORMATIONAL_V1 request 3861985833 [ HASH N(NO_PROP) ]&lt;br /&gt;
&lt;br /&gt;
===Mismatched Identifier with NAT===&lt;br /&gt;
In this case, strongSwan is set for a '''Peer Identifier''' of ''Peer IP address'', but the remote router is actually behind NAT. In this case strongSwan expects the actual private before-NAT IP address as the identifier. The racoon daemon was much more relaxed and would match either address, but strongSwan is more formal/correct.&lt;br /&gt;
&lt;br /&gt;
'''Responder'''&lt;br /&gt;
 charon: 10[IKE] remote host is behind NAT&lt;br /&gt;
 charon: 10[IKE] IDir '192.0.2.10' does not match to '203.0.113.245'&lt;br /&gt;
 [...]&lt;br /&gt;
 charon: 10[CFG] looking for pre-shared key peer configs matching 198.51.100.50...203.0.113.245[192.0.2.10]&lt;br /&gt;
&lt;br /&gt;
To correct this condition, change the '''Peer Identifier''' setting to ''IP Address'' and then enter the pre-NAT IP address, which in this example is ''192.0.2.10''.&lt;br /&gt;
&lt;br /&gt;
===Incorrect Destination Address===&lt;br /&gt;
When multiple WAN IP addresses are available, such as with CARP VIPs or IP Alias VIPs, an additional failure mode can occur where the connection appears in the logs but matches bypasslan or &amp;quot;%any...%any&amp;quot;. In this case, IPsec is configured to listen to one IP address but the client is connecting to another address. For example, an IPsec Phase 1 entry may be configured to use the WAN IP address but clients are connecting to a CARP VIP. In this case, the destination address in the logs will be the VIP address and not the interface address. Confirm by checking the logs against &amp;quot;ipsec statusall&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
===Disappearing Traffic===&lt;br /&gt;
If IPsec traffic arrives but never appears on the IPsec interface (enc0), check for conflicting routes/interface IP addresses. For example, if an IPsec tunnel is configured with a remote network of 192.0.2.0/24 and there is a local OpenVPN server with a tunnel network of 192.0.2.0/24 then the ESP traffic may arrive, strongSwan may process the packets, but they never show up on enc0 as arriving to the OS for delivery.&lt;br /&gt;
&lt;br /&gt;
Resolve the duplicate interface/route and the traffic will begin to flow.&lt;br /&gt;
&lt;br /&gt;
===IPsec Status Page Issues===&lt;br /&gt;
If the IPsec status page prints errors such as:&lt;br /&gt;
 Warning: Illegal string offset 'type' in /etc/inc/xmlreader.inc on line 116&lt;br /&gt;
&lt;br /&gt;
That is a sign that the incomplete xmlreader XML parser is active, which is triggered by the presence of the file ''/cf/conf/use_xmlreader''. This alternate parser can be faster for reading large config.xml files, but lacks certain features necessary for other areas to function well. Removing ''/cf/conf/use_xmlreader'' will return the system to the default parser immediately, which will correct the display of the IPsec status page.&lt;br /&gt;
&lt;br /&gt;
== Common Errors (racoon, pfSense &amp;lt;= 2.1.x) ==&lt;br /&gt;
=== Mismatched Local/Remote Subnets ===&lt;br /&gt;
 Feb 20 10:33:41  racoon: ERROR: failed to pre-process packet.&lt;br /&gt;
 Feb 20 10:33:41  racoon: ERROR: failed to get sainfo.&lt;br /&gt;
This can result from mismatched subnet masks in the IPsec tunnel definitions. Check to be sure that the local and remote subnet masks match up on each side, typically they should be &amp;quot;''/24''&amp;quot; and not &amp;quot;''/32''&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Failed pfkey align ===&lt;br /&gt;
 racoon: ERROR: libipsec failed pfkey align (Invalid sadb message)&lt;br /&gt;
Check to make sure that the Phase 2 timeouts match up on both ends of the tunnel. Some people still see this periodically with no ill effect. It shows up at intervals equal to the Phase 2 timeout, but nowhere near the actual expiration time.&lt;br /&gt;
&lt;br /&gt;
=== pfkey Delete ===&lt;br /&gt;
 ERROR: pfkey DELETE received&lt;br /&gt;
This message may be seen repeatedly as Phase 2 is renegotiated between two endpoints (for multiple subnets). The tunnels still work, but traffic may be delayed while the tunnel is switched/reestablished. (more research needed for possible solutions)&lt;br /&gt;
&lt;br /&gt;
=== REGISTER message ===&lt;br /&gt;
 racoon: INFO: unsupported PF_KEY message REGISTER&lt;br /&gt;
This is a normal log message. It is not indicative of any problem. &lt;br /&gt;
&lt;br /&gt;
=== Stuck/Broken Phase 1 ===&lt;br /&gt;
Client:&lt;br /&gt;
 racoon: ERROR: none message must be encrypted&lt;br /&gt;
Server:&lt;br /&gt;
 racoon: ERROR: can't start the quick mode, there is no ISAKMP-SA&lt;br /&gt;
Or also:&lt;br /&gt;
 racoon: INFO: request for establishing IPsec-SA was queued due to no phase1 found.&lt;br /&gt;
&lt;br /&gt;
Try to stop and restart racoon on the client/opposite side. This can turn up if one side still thinks Phase 1 is good/active, and the other side thinks it is gone. &lt;br /&gt;
&lt;br /&gt;
=== Unsupported Cipher Key Length for Cryptographic Accelerator ===&lt;br /&gt;
If a cryptographic accelerator chip such as glxsb is enabled and an unsupported cipher key length is configured, the following errors may be displayed:&lt;br /&gt;
 Mar 27 16:31:44   racoon: ERROR: pfkey ADD failed: Invalid argument&lt;br /&gt;
 Mar 27 16:31:44   racoon: ERROR: pfkey UPDATE failed: Invalid argument&lt;br /&gt;
 Mar 27 16:31:44   racoon: WARNING: attribute has been modified.&lt;br /&gt;
&lt;br /&gt;
The reason for this is that the crypto(9) framework in FreeBSD specifies support by family, such as AES, not not just by key length. The glxsb chip only accelerates AES 128, so if another key length is chosen such as AES 256, the operation will fail.&lt;br /&gt;
&lt;br /&gt;
To remedy this, either use a supported key length for the configured chip (e.g. AES 128) or disable the accelerator and reboot the device to ensure its modules are unloaded. Physically removing the device may be required for certain add-in boards.&lt;br /&gt;
&lt;br /&gt;
This is a problem in crypto(9) in FreeBSD upstream and it is not likely to be fixed.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
1: [http://redmine.pfsense.org/issues/2324 Ticket #2324]&lt;br /&gt;
&lt;br /&gt;
2: [http://www.freebsd.org/cgi/query-pr.cgi?pr=166508 FreeBSD PR kern/166508]&lt;br /&gt;
&lt;br /&gt;
=== Send Errors ===&lt;br /&gt;
 Sep 18 11:48:10 racoon: ERROR: sendto (Operation not permitted)&lt;br /&gt;
 Sep 18 11:48:10 racoon: ERROR: sendfromto failed&lt;br /&gt;
 Sep 18 11:48:10 racoon: ERROR: phase1 negotiation failed due to send error.&lt;br /&gt;
&lt;br /&gt;
Errors such as those above are due to something preventing racoon from sending packets out. Typically this is related to states, but could also be from an improperly crafted floating rule.&lt;br /&gt;
&lt;br /&gt;
First, check '''Diagnostics &amp;gt; States'''. Filter on the remote peer address. If there is a NAT state for an internal client, the default static port outbound NAT rule could be preventing racoon from building its own tunnel as the IP:port pairing on both sides is already in use. Locate and stop the internal client, clear the states, and then reconnect. If a state is present but there is no NAT involved, clear the state(s) that are seen for the remote IP and port 500, 4500, and ESP. Check if that brings it back online.&lt;br /&gt;
&lt;br /&gt;
Also ensure a proper route or default route to reach the remote side is present.&lt;br /&gt;
&lt;br /&gt;
If that doesn't apply, check the floating rules and be sure they are not blocking traffic from racoon.&lt;br /&gt;
&lt;br /&gt;
If those are both OK, ensure the PPTP server address is not set to a valid/in-use IP address such as the WAN address. If that is set to the WAN address, when a PPTP client disconnects it can cause problems with racoon's ability to make connections.&lt;br /&gt;
&lt;br /&gt;
=== INVALID-PAYLOAD-TYPE ===&lt;br /&gt;
If a message containing INVALID-PAYLOAD-TYPE appears in the logs, try disabling NAT Traversal (NAT-T) in Phase 1, and optionally restart racoon.&lt;br /&gt;
&lt;br /&gt;
=== NAT Problems ===&lt;br /&gt;
If the tunnel can initiate one way but not the other, and the settings match, the problem could also be with outbound NAT. If outbound NAT rules are present with a source of &amp;quot;''any''&amp;quot; (''*''), that will also match outbound traffic from the firewall itself. At best this will rewrite the source port and at worst it could change the outbound IP entirely depending on the NAT rule settings.&lt;br /&gt;
&lt;br /&gt;
Check '''Diagnostics &amp;gt; States''', filtered on the remote peer IP, or &amp;quot;:500&amp;quot;. If a NAT state is present that includes the WAN address of the firewall as the source, then fix the NAT rules and clear the offending states.&lt;br /&gt;
&lt;br /&gt;
== IPsec Debugging ==&lt;br /&gt;
On pfSense 2.2, the logging options for the IPsec daemon are located under '''VPN &amp;gt; IPsec''' on the '''Advanced Settings''' tab and may be adjusted live without affecting the operation of IPsec tunnels. As mentioned above, the recommended setting for most common debugging is to set '''IKE SA''', '''IKE Child SA''', and '''Configuration Backend''' on ''Diag'' and set all others on ''Control''.&lt;br /&gt;
&lt;br /&gt;
Debug mode for racoon on pfSense 2.1.x and before may be enabled by checking the option for it under '''System &amp;gt; Advanced''' on the '''Miscellaneous''' tab on pfSense 2.1.x and earlier. This change is disruptive in that racoon is restarted and all tunnels are reset.&lt;br /&gt;
&lt;br /&gt;
== Shrew Soft VPN Client Debugging ==&lt;br /&gt;
Open the Trace app. Stop the IKE Service, and go to File, Options. Change the log output level to debug and click OK. Start the IKE Service and attempt to connect.&lt;br /&gt;
&lt;br /&gt;
== Packet Loss with Certain Protocols ==&lt;br /&gt;
If packet loss is experienced only when using specific protocols (SMB, RDP, etc), MSS clamping may be required to reduce the effective MTU of the VPN. IPsec does not handle fragmented packets very well, and a reduced MTU will ensure that the packets traversing the tunnel are all of a size which can be transmitted whole. A good starting point would be 1300, and if that works, slowly increase the MSS until the breaking point is located, then back off a little from there.&lt;br /&gt;
&lt;br /&gt;
MSS clamping is configured under '''System &amp;gt; Advanced''' on the '''Miscellaneous''' tab on pfSense 2.1.x and before. On pfSense 2.2, it is under '''VPN &amp;gt; IPsec''' on the '''Advanced Settings''' tab. Check the box to enable MSS Clamping for VPNs, and fill in the appropriate value.&lt;br /&gt;
&lt;br /&gt;
== Some Hosts Work, Others Do Not ==&lt;br /&gt;
If some hosts can communicate across a VPN tunnel and others cannot, it typically means that for some reason the packets from that client system are not being routed to pfSense. This could happen for a number of reasons, but the two most common are:&lt;br /&gt;
* Incorrect gateway on client system: pfSense needs to be the gateway, or the gateway must have a static route for tunnel traffic which forwards those packets to pfSense&lt;br /&gt;
* Incorrect subnet mask on the client system: If the VPN subnets are close, say 192.168.0.x and 192.168.1.x, ensure that the subnet mask is 255.255.255.0 on the client systems. If one of them has an incorrect mask, such as 255.255.0.0, it will try to reach the remote systems locally and not send the packets out via the gateway.&lt;br /&gt;
&lt;br /&gt;
== Dropping Tunnels on ALIX/embedded ==&lt;br /&gt;
If tunnels are dropped during periods of high IPsec throughput on an ALIX or other embedded hardware, it may be necessary to disable DPD on the tunnel. When the CPU on an ALIX is tied up with sending IPsec traffic, it may not take the time to respond to a DPD request on the tunnel. As a consequence, the tunnel will fail a DPD check and be disconnected.&lt;br /&gt;
&lt;br /&gt;
== Crash/Panic in NIC driver with IPsec in Backtrace ==&lt;br /&gt;
If a crash occurs and the backtrace shows signs of both the NIC driver and IPsec in the backtrace, such as the following edited example:&lt;br /&gt;
&lt;br /&gt;
 Sleeping thread (tid 100066, pid 12) owns a non-sleepable lock&lt;br /&gt;
 [...]&lt;br /&gt;
 igb_mq_start_locked() at igb_mq_start_locked+0xe4/frame 0xfffffe001c39cda0&lt;br /&gt;
 igb_mq_start() at igb_mq_start+0x224/frame 0xfffffe001c39ce10&lt;br /&gt;
 ether_output() at ether_output+0x58d/frame 0xfffffe001c39ce80&lt;br /&gt;
 [...]&lt;br /&gt;
 ipsec4_common_input_cb() at ipsec4_common_input_cb+0x20d/frame 0xfffffe001c39d410&lt;br /&gt;
 esp_input_cb() at esp_input_cb+0x4ce/frame 0xfffffe001c39d4a0&lt;br /&gt;
 swcr_process() at swcr_process+0x89/frame 0xfffffe001c39d6d0&lt;br /&gt;
 crypto_dispatch() at crypto_dispatch+0x6e/frame 0xfffffe001c39d700&lt;br /&gt;
 esp_input() at esp_input+0x5a9/frame 0xfffffe001c39d790&lt;br /&gt;
 ipsec_common_input() at ipsec_common_input+0x29a/frame 0xfffffe001c39d800&lt;br /&gt;
 ipsec4_common_input() at ipsec4_common_input+0x91/frame 0xfffffe001c39d860&lt;br /&gt;
 [...]&lt;br /&gt;
 igb_rxeof() at igb_rxeof+0x698/frame 0xfffffe001c39dad0&lt;br /&gt;
 igb_msix_que() at igb_msix_que+0x16d/frame 0xfffffe001c39db20&lt;br /&gt;
&lt;br /&gt;
Try adding the following tunable to '''System &amp;gt; Advanced''', '''System Tunables tab''':&lt;br /&gt;
&lt;br /&gt;
 net.inet.ipsec.directdispatch=0&lt;/div&gt;</summary>
		<author><name>Thomas</name></author>
	</entry>
</feed>