I've spent several days debugging the problem and it turned out that the previously working proposal or AES-GCM started to fail in phase 2 negotiations
The only way to make the tunnel work again was to revert to AES-CBC ciphers witch is quite unfortunate.
Originally the proposals were configured as:
Code: Select all
add auth-algorithms=sha256,null enc-algorithms=aes-128-gcm lifetime=20m name=GCM-proposal pfs-group=ec2n185
Code: Select all
ipsec invalid encryption algorithm 20.
Code: Select all
ipsec pfkey update failed.
switching to CBC immediately established phase 2
also during the debug I've noticed another strange thing in phase 2 in the logs:
Code: Select all
21:49:03 ipsec,debug (trns_id=AES-GCM-ICV16 encklen=128 authtype=254)
21:49:03 ipsec,debug (trns_id=AES-GCM-ICV16 encklen=160 authtype=254)
Can anybody help with setting up GCM ciphers in 6.41+ software or advise on bug fixes timeframes?
Regards,
Alex