Hello altogether,
we still have a UTM here in version 9.719-3. We also have the latest Connect Client. There is now one employee, at least I only know of one, who keeps getting the message “Authenticate/Decrypt packet error: packet HMAC authentication failed” when he is connected to the SSL VPN. But I can't figure out what the problem is. I have already changed the algorithm in the Cryptographic Settings in the SSL VPN to AES-256-CBC, SHA2 256 and Keysize 2048. I have also recreated the server certificate. I have also recreated the user certificate. I see the following entries in the log
2024-10-18 08:08:09 Using peer cipher 'AES-256-CBC'
2024-10-18 08:08:09 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
2024-10-18 08:08:09 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
2024-10-18 08:08:09 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
2024-10-18 08:08:09 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
The routes are then added and the error follows:
2024-10-18 08:08:14 Initialization Sequence Completed
2024-10-18 08:08:14 MANAGEMENT: >STATE:1729231694,CONNECTED,SUCCESS,xx.xxx.x.x,xxx.xxx.x.xxx,xxx,xxx.xxx.xxx.xx,53256
2024-10-18 08:27:26 Authenticate/Decrypt packet error: packet HMAC authentication failed
2024-10-18 08:27:26 Fatal decryption error (process_incoming_link), restarting
2024-10-18 08:27:26 SIGUSR1[soft,decryption-error] received, process restarting
2024-10-18 08:27:26 MANAGEMENT: >STATE:1729232846,RECONNECTING,decryption-error,,,,,
2024-10-18 08:27:26 Restart pause, 5 second(s)
Do you have any idea what the reason is or have you already experienced this?