Thanks for your responses.

Try adding some non-modp2048 options. Maybe look at the SA installed
from the initial negotiation (ipsecctl -vvsa) for ideas.

I think this is the right answer. The log tells you what the other side sent:

spi=0x0a131729beeb819a: ikev2_log_proposal: ESP #1 ENCR=AES_CBC-256
spi=0x0a131729beeb819a: ikev2_log_proposal: ESP #1 INTEGR=HMAC_SHA2_256_128
spi=0x0a131729beeb819a: ikev2_log_proposal: ESP #1 INTEGR=HMAC_SHA1_96
spi=0x0a131729beeb819a: ikev2_log_proposal: ESP #1 ESN=NONE

There isn't any DH group for PFS here, so drop the modp2048 or add it on the
other side.

I tried countless different childsa lines, without success. Modp2048 didn't show up because I deactivated PFS. I didn't knew this was correlated. Now it shows up:
ikev2_log_proposal: ESP #1 DH=MODP_2048

I than removed SHA1 and AES-CBC-256 from the IKE-/Child-SA hash/chiper list on the VPN-router. Having now only:
DH group: DH14 (MODP-2048)
PFS: Yes
IKE-/Child-SA: Chiper: AES-GCM-256, Hash: SHA-256
(Available settings are described here https://www.lancom-systems.com/docs/LCOS/Refmanual/EN/#topics/lanconfig_vpn_ikev2-ipsec_encryption.html )

And this line in iked.conf:
childsa enc aes-256-gcm group modp2048 \


At first it looks ok. iked reports:
spi=0xf3e9aaf0b7009e4e: recv CREATE_CHILD_SA req 0 peer 88.14.XXX.YYY:4500 local 192.168.1.210:4500, 461 bytes, policy 'rathaus' spi=0xf3e9aaf0b7009e4e: send CREATE_CHILD_SA res 0 peer 88.14.XXX.YYY:4500 local 192.168.1.210:4500, 497 bytes, NAT-T spi=0xf3e9aaf0b7009e4e: ikev2_childsa_enable: loaded SPIs: 0x2f843f59, 0x18f271c6 (enc aes-256-gcm group modp2048)


But the VPN-Router has a IKE-I-General-failure 0x21ff. All of the sudden it's a problem that I only want to route specific networks?! IPSec is so exhausting.


For those who are interested, this is what the VPN-router reports:
...
[VPN-Status] 2023/02/25 02:01:49,268  Devicetime: 2023/02/25 02:01:49,040
Peer O2 [responder]: Received an CREATE_CHILD_SA-RESPONSE of 497 bytes (encrypted)
Gateways: 88.14.XXX.YYY:4500<--84.17.XXX.ZZZ:4500
SPIs: 0xF3E9AAF0B7009E4E6A017F990A97DF8F, Message-ID 0
  Determining best intersection for TSi
  Expected TS :(  0,     0-65535,         0.0.0.0-255.255.255.255)
  Received TS :(  0,     0-65535,         0.0.0.0-255.255.255.255)
  Intersection:(  0,     0-65535,         0.0.0.0-255.255.255.255)
  Determining best intersection for TSi
  Expected TS :(  0,     0-65535,         0.0.0.0-255.255.255.255)
  Received TS :(  0,     0-65535,     192.168.0.0-192.168.0.255  )
  Intersection:(  0,     0-65535,     192.168.0.0-192.168.0.255  )
  Determining best intersection for TSi
  Expected TS :(  0,     0-65535,         0.0.0.0-255.255.255.255)
  Received TS :(  0,     0-65535,   192.168.11.55-192.168.11.55  )
  Intersection:(  0,     0-65535,   192.168.11.55-192.168.11.55  )
  Best        :(  0,     0-65535,         0.0.0.0-255.255.255.255)
  Determining best intersection for TSr
  Expected TS :(  0,     0-65535,   192.168.0.206-192.168.0.206  )
  Received TS :(  0,     0-65535,     192.168.0.0-192.168.0.255  )
  Intersection:(  0,     0-65535,   192.168.0.206-192.168.0.206  )
  Determining best intersection for TSr
  Expected TS :(  0,     0-65535,   192.168.0.206-192.168.0.206  )
  Received TS :(  0,     0-65535,         0.0.0.0-0.0.0.0        )
  -No intersection
  Best        :(  0,     0-65535,   192.168.0.206-192.168.0.206  )
-Received Traffic selectors are super set of proposed traffic selectors -> abort
Proposed TSi: (  0,     0-65535,         0.0.0.0-255.255.255.255)
Proposed TSr: (  0,     0-65535,   192.168.0.206-192.168.0.206  )

[VPN-Status] 2023/02/25 02:01:49,268  Devicetime: 2023/02/25 02:01:49,041
Hard lifetime event occurred for '' (initiator  flags 0x0000400800000000)
  CHILD_SA ESP
No IKE_SA found for

[VPN-Status] 2023/02/25 02:01:49,268  Devicetime: 2023/02/25 02:01:49,041
VPN: policy manager error indication: O2 (84.17.XXX.ZZZ), cause: 8703

[VPN-Status] 2023/02/25 02:01:49,268  Devicetime: 2023/02/25 02:01:49,048
VPN: Error: IKE-I-General-failure (0x21ff) for O2 (84.17.XXX.ZZZ) IKEv2

Reply via email to