Bug #4891
closedandroid 5 can't login pfsense 2.2.4 ipsec
0%
Description
Hello,
I have upgrade to pfsense 2.2.4.But it's always can't connect it by android 5.
It's have log.
Jul 27 10:41:06 charon: 06[JOB] <con1|9> deleting half open IKE_SA after timeout
Jul 27 10:41:05 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:41:05 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:41:05 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:41:05 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:41:01 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:41:01 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:41:01 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:41:01 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:41:00 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:41:00 charon: 06[IKE] <con1|9> sending retransmit 3 of response message ID 0, seq 1
Jul 27 10:41:00 charon: 06[IKE] <con1|9> sending retransmit 3 of response message ID 0, seq 1
Jul 27 10:40:58 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:58 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:58 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:58 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:55 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:55 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:55 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:55 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:52 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:52 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:52 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:52 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:48 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:48 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:48 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:48 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:47 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:47 charon: 06[IKE] <con1|9> sending retransmit 2 of response message ID 0, seq 1
Jul 27 10:40:47 charon: 06[IKE] <con1|9> sending retransmit 2 of response message ID 0, seq 1
Jul 27 10:40:45 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:45 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:45 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:45 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:42 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:42 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:42 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:42 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:40 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:40 charon: 06[IKE] <con1|9> sending retransmit 1 of response message ID 0, seq 1
Jul 27 10:40:40 charon: 06[IKE] <con1|9> sending retransmit 1 of response message ID 0, seq 1
Jul 27 10:40:39 charon: 11[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:39 charon: 11[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:39 charon: 11[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:39 charon: 11[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:36 charon: 11[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:36 charon: 11[ENC] <con1|9> generating AGGRESSIVE response 0 [ SA KE No ID NAT-D NAT-D HASH V V V V V ]
Jul 27 10:40:36 charon: 11[CFG] <9> selected peer config "con1"
Jul 27 10:40:36 charon: 11[CFG] <9> looking for XAuthInitPSK peer configs matching 219.xxx.xxx.xxx...203.xxx.xxx.xxx[pfsense.aspa.idv.tw]
How to fix it?
My mobile is use android system.
Files
Updated by Jim Pingle over 9 years ago
- Status changed from New to Feedback
Not enough detail here. Should be discussed in a forum thread first to narrow down a specific issue before opening a bug report. At a minimum, you need to provide detail about the specific version you were running before the upgrade and the specific type/setup of mobile IPsec in use.
Updated by Jim Pingle over 9 years ago
What version were you on before the upgrade, when it was working?
Updated by akong wu over 9 years ago
I was upgrade from 2.2.3,it's version also can't connect ipsec by android 5.
I never connect ipsec by android 5.I can connect ipsec by win7 and use shrew soft.
Updated by Jim Pingle over 9 years ago
- Status changed from Feedback to Rejected
That's a bug in the Android client with strongSwan -- appeal to one or the other to fix it: https://wiki.strongswan.org/issues/255
May be possible to work around it using a different setup (main mode, no group ID on Android) but there is no bug here that we can do anything for. Post on the forum for assistance/discussion.