Encryption options for every P2 on a given P1 are written to each P2 individually inside ipsec.conf with multiple P2 entries + split conn entries
When multiple Phase 2 entries exist, the encryption options for every P2 inside a given P1 are added to every split connection entries (IKEv1 or IKEv2 with split connections active)
For example, with three P2 entries all set for AES256-GCM-128, ipsec.conf has this in each conn entry:
esp = aes256gcm128,aes256gcm128,aes256gcm128!
The same identical option is written on each connection.
If different options are used for P2s within the same tunnel, all of them are written to each P2. So each split conn entry contains all possible P2 algorithms for any P2 on the P1, not just the selected algorithm for that specific P2 entry.
#6 Updated by Cullen Trey 3 months ago
we had problems with one of our IPSecs. Sometimes it can connect, sometimes not. After a reboot of pfsense, pfsense can mostly connect.
When I read about this bug, I disabled all P2 entries except one. Now it always works...
Could it really be, that the entry with the same encryption multiple times (esp = aes256gcm128,aes256gcm128,aes256gcm128!) is making problems with the remote site? In our setup, only we establish the ipsec connection.
We be greate to see this fixed, as it can not do anything good.
thanks for your work!