Project

General

Profile

Actions

Bug #4891

closed

android 5 can't login pfsense 2.2.4 ipsec

Added by akong wu over 9 years ago. Updated over 9 years ago.

Status:
Rejected
Priority:
Normal
Assignee:
-
Category:
-
Target version:
-
Start date:
07/27/2015
Due date:
% Done:

0%

Estimated time:
Plus Target Version:
Release Notes:
Affected Version:
Affected Architecture:

Description

Hello,
I have upgrade to pfsense 2.2.4.But it's always can't connect it by android 5.
It's have log.

Jul 27 10:41:06 charon: 06[JOB] <con1|9> deleting half open IKE_SA after timeout
Jul 27 10:41:05 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:41:05 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:41:05 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:41:05 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:41:01 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:41:01 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:41:01 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:41:01 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:41:00 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:41:00 charon: 06[IKE] <con1|9> sending retransmit 3 of response message ID 0, seq 1
Jul 27 10:41:00 charon: 06[IKE] <con1|9> sending retransmit 3 of response message ID 0, seq 1
Jul 27 10:40:58 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:58 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:58 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:58 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:55 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:55 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:55 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:55 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:52 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:52 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:52 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:52 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:48 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:48 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:48 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:48 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:47 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:47 charon: 06[IKE] <con1|9> sending retransmit 2 of response message ID 0, seq 1
Jul 27 10:40:47 charon: 06[IKE] <con1|9> sending retransmit 2 of response message ID 0, seq 1
Jul 27 10:40:45 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:45 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:45 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:45 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:42 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:42 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:42 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:42 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:40 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:40 charon: 06[IKE] <con1|9> sending retransmit 1 of response message ID 0, seq 1
Jul 27 10:40:40 charon: 06[IKE] <con1|9> sending retransmit 1 of response message ID 0, seq 1
Jul 27 10:40:39 charon: 11[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:39 charon: 11[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:39 charon: 11[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:39 charon: 11[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:36 charon: 11[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:36 charon: 11[ENC] <con1|9> generating AGGRESSIVE response 0 [ SA KE No ID NAT-D NAT-D HASH V V V V V ]
Jul 27 10:40:36 charon: 11[CFG] <9> selected peer config "con1"
Jul 27 10:40:36 charon: 11[CFG] <9> looking for XAuthInitPSK peer configs matching 219.xxx.xxx.xxx...203.xxx.xxx.xxx[pfsense.aspa.idv.tw]

How to fix it?
My mobile is use android system.


Files

1.png (26.3 KB) 1.png akong wu, 07/27/2015 10:52 AM
2.png (22.3 KB) 2.png akong wu, 07/27/2015 10:52 AM
3.png (11.6 KB) 3.png akong wu, 07/27/2015 10:52 AM
4.png (22.3 KB) 4.png akong wu, 07/27/2015 10:52 AM
Actions #1

Updated by Jim Pingle over 9 years ago

  • Status changed from New to Feedback

Not enough detail here. Should be discussed in a forum thread first to narrow down a specific issue before opening a bug report. At a minimum, you need to provide detail about the specific version you were running before the upgrade and the specific type/setup of mobile IPsec in use.

Actions #2

Updated by akong wu over 9 years ago

I use pfsense 2.2.4.The client use Android 5.
I screenshot some pic.You can see some config.

Actions #3

Updated by Jim Pingle over 9 years ago

What version were you on before the upgrade, when it was working?

Actions #4

Updated by akong wu over 9 years ago

I was upgrade from 2.2.3,it's version also can't connect ipsec by android 5.
I never connect ipsec by android 5.I can connect ipsec by win7 and use shrew soft.

Actions #5

Updated by Jim Pingle over 9 years ago

  • Status changed from Feedback to Rejected

That's a bug in the Android client with strongSwan -- appeal to one or the other to fix it: https://wiki.strongswan.org/issues/255

May be possible to work around it using a different setup (main mode, no group ID on Android) but there is no bug here that we can do anything for. Post on the forum for assistance/discussion.

Actions

Also available in: Atom PDF