Hello all,
Have any of you successfully activated v18 GA IPsec policies with IKEv2 protocol? Whichever IPsec policy I have defined with IKEv2, the tunnel will disconnect without obvious cause at the latest within 2 hours of tunnel activation. Only when I use the default IPsec IKEv2 policy does the following error message appear in stronswan.log:
2020-02-29 07:29:00 26[NET] <End_tunnel_1|226> received packet: from XX.XX.XX.XX[500] to YY.YY.YY.YY[500] (36 bytes)
2020-02-29 07:29:00 26[ENC] <End_tunnel_1|226> parsed IKE_SA_INIT response 0 [ N(NO_PROP) ]
2020-02-29 07:29:00 26[IKE] <End_tunnel_1|226> received NO_PROPOSAL_CHOSEN notify error
2020-02-29 07:29:00 26[DMN] <End_tunnel_1|226> [GARNER-LOGGING] (child_alert) ALERT: the received IKE_SA proposals did not match: IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/CURVE_25519, IKE:AES_CBC_256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/CURVE_25519, IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519, IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/ECP_521, IKE:AES_CBC_256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/ECP_521, IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_521, IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/ECP_256, IKE:AES_CBC_256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/ECP_256, IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256, IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_8192, IKE:AES_CBC_256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_8192, IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_8192, IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_4096, IKE:AES_CBC_256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_4096, IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_4096, IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_H
2020-02-29 07:29:00 26[IKE] <End_tunnel_1|226> IKE_SA NO_PROPOSAL_CHOSEN set_condition COND_START_OVER
2020-02-29 07:29:00 26[IKE] <End_tunnel_1|226> IKE_SA has_condition COND_START_OVER retry initiate in 60 sec
It is evident from the error message that the IPsec IKEv2 policy will not be negotiated and the tunnel is disconnected, but then the IPsec tunnel will automatically establish itself without the necessary intervention.
If I use another IPsec IKEv2 policy then the error message will not appear, but the whole IPsec tunnel will be disconnected again within 2 hours. The IPsec tunnel will always disconnected at the latest within two hours, regardless of the key life for Phase I and Phase II. I have tried all possible combinations of the life of both keys, but the tunnel has never been connected for more than two hours.
I defined the IPsec IKEv1 policy (for example phase I: 14400, AES256 - SHA2 256, DH2048; phase II: 3600, AES256 - SHA2 256, DH2048) then this IKEv1 tunnel is very stable (in my test about 5 days) for a long time. However, as soon as the IKEv1 IPsec policy at both ends of the tunnel is changed to IKEv2, the tunnel will reliably disconnect within 2 hours of tunnel activation.
Does anyone have a similar experience with IPsec IKEv2 tunnels? Or, what IPsec IKEv2 policy do you use and the tunnel is stable and doesn't disconnect?
Regards
alda
This thread was automatically locked due to age.