Bug #4891
closedandroid 5 can't login pfsense 2.2.4 ipsec
0%
Description
Hello,
I have upgrade to pfsense 2.2.4.But it's always can't connect it by android 5.
It's have log.
Jul 27 10:41:06 charon: 06[JOB] <con1|9> deleting half open IKE_SA after timeout
Jul 27 10:41:05 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:41:05 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:41:05 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:41:05 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:41:01 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:41:01 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:41:01 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:41:01 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:41:00 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:41:00 charon: 06[IKE] <con1|9> sending retransmit 3 of response message ID 0, seq 1
Jul 27 10:41:00 charon: 06[IKE] <con1|9> sending retransmit 3 of response message ID 0, seq 1
Jul 27 10:40:58 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:58 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:58 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:58 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:55 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:55 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:55 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:55 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:52 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:52 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:52 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:52 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:48 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:48 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:48 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:48 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:47 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:47 charon: 06[IKE] <con1|9> sending retransmit 2 of response message ID 0, seq 1
Jul 27 10:40:47 charon: 06[IKE] <con1|9> sending retransmit 2 of response message ID 0, seq 1
Jul 27 10:40:45 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:45 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:45 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:45 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:42 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:42 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:42 charon: 06[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:42 charon: 06[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:40 charon: 06[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:40 charon: 06[IKE] <con1|9> sending retransmit 1 of response message ID 0, seq 1
Jul 27 10:40:40 charon: 06[IKE] <con1|9> sending retransmit 1 of response message ID 0, seq 1
Jul 27 10:40:39 charon: 11[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:39 charon: 11[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:39 charon: 11[IKE] <con1|9> received retransmit of request with ID 0, retransmitting response
Jul 27 10:40:39 charon: 11[NET] <con1|9> received packet: from 203.xxx.xxx.xxx500 to 219.xxx.xxx.xxx500 (655 bytes)
Jul 27 10:40:36 charon: 11[NET] <con1|9> sending packet: from 219.xxx.xxx.xxx500 to 203.xxx.xxx.xxx500 (432 bytes)
Jul 27 10:40:36 charon: 11[ENC] <con1|9> generating AGGRESSIVE response 0 [ SA KE No ID NAT-D NAT-D HASH V V V V V ]
Jul 27 10:40:36 charon: 11[CFG] <9> selected peer config "con1"
Jul 27 10:40:36 charon: 11[CFG] <9> looking for XAuthInitPSK peer configs matching 219.xxx.xxx.xxx...203.xxx.xxx.xxx[pfsense.aspa.idv.tw]
How to fix it?
My mobile is use android system.
Files
Updated by Jim Pingle about 10 years ago
- Status changed from New to Feedback
Not enough detail here. Should be discussed in a forum thread first to narrow down a specific issue before opening a bug report. At a minimum, you need to provide detail about the specific version you were running before the upgrade and the specific type/setup of mobile IPsec in use.
Updated by Jim Pingle about 10 years ago
What version were you on before the upgrade, when it was working?
Updated by akong wu about 10 years ago
I was upgrade from 2.2.3,it's version also can't connect ipsec by android 5.
I never connect ipsec by android 5.I can connect ipsec by win7 and use shrew soft.
Updated by Jim Pingle about 10 years ago
- Status changed from Feedback to Rejected
That's a bug in the Android client with strongSwan -- appeal to one or the other to fix it: https://wiki.strongswan.org/issues/255
May be possible to work around it using a different setup (main mode, no group ID on Android) but there is no bug here that we can do anything for. Post on the forum for assistance/discussion.