This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

v17 MR5: VPN still unstable!

Hi,

 

I Upgraded to MR5 yesterday, all went great, suddenly this evening, tunnels start dropping up and down, and I am being "spammed" with notifications from my SFM that tunnels are terminated.

charon.log shows a lot of theese:

invalid ID_V1 payload length, decryption failed?                                

I have Read here:
Sophos XG Firewall: Cannot handle more than 2 concurrent Quick Mode exchanges per IKE_SA when using IKEv1

That there are issues in MR5, that will be resolved in MR6, but theese errors should read:
"invalid HASH_V1 payload length, decryption failed?"
as stated in the KB above.

I have 4 tunnels on my XG.

Are others seeing this?

A little more log:
2018-01-29 19:54:58 10[ENC] <622> invalid ID_V1 payload length, decryption fail 
ed?                                                                             
2018-01-29 19:54:58 10[ENC] <622> could not decrypt payloads                    
2018-01-29 19:54:58 10[IKE] <622> message parsing failed                        
2018-01-29 19:54:58 10[ENC] <622> generating INFORMATIONAL_V1 request 158523599 
 [ HASH N(PLD_MAL) ]                                                            
2018-01-29 19:54:58 10[NET] <622> sending packet: from x.x.x.x[500] to 5.1 
03.12.171[500] (76 bytes)                                                       
2018-01-29 19:54:58 10[IKE] <622> ID_PROT request with message ID 0 processing  
failed                                                                          
2018-01-29 19:54:58 10[DMN] <622> [GARNER-LOGGING] (child_alert) ALERT: parsing 
 IKE message from x.x.x.x[500] failed                                      
2018-01-29 19:54:58 19[JOB] <622> deleting half open IKE_SA with x.x.x.x a 
fter timeout                                                                    
2018-01-29 19:54:58 19[DMN] <622> [GARNER-LOGGING] (child_alert) ALERT: IKE_SA  
timed out before it could be established                                        
All tunnels are unstable during this, yesterday with MR3, it worked great for weeks!



This thread was automatically locked due to age.
Parents
  • (sorry I did not see your link with the way it was formatted before, I deleted my original reply to your post).

     

    Yes, I am getting these as well,  but we've had issues since   17.0   I'm hoping this fix will solve our tunnel issues we've had the past several months.   I've escalated this to support and the level 3 techs will be checking it out and hopefully implementing the work around.  

     

    What type of device do you have on the other end of the tunnel?

     

    -Scott

  • Just a FYI.   Sophos GES team was able to get into my sophos XG unit and apply the VPN fix to my unit last week Friday.  So far so good.  All SA's remain up and active.

     

    -Scott

Reply Children
  • Hi all,

    good to hear this.

    I'm having the same issue with MR5 with 2 Cisco IPsec Tunnels using Apple macOS and iOS in parallel.

    Is there a possibility to apply the fix as a home user as well?

    Thanks and best regards

    Dom Nik

  • Has anyone else applied the fix from support?   Just curious how your experience has been?   

     

    -Scott

  • Anybody else have the "fix" applied and get results one way or the other? 

     I just had one of our XG's  VPN go down last night again and the SA's did not establish themselves automatically. This was going on 6 days without an issue.   I had to manually disable/enable  the connection to bring it up again. (sigh)    I just want accurate data points,  not a bunch of bitching at sophos.  we all get it, there's issue's here,  just trying to get this issue addressed.

    -Scott

  • Have any of you using XG to XG swapped to SSL VPN?  I've had some good results with using that.  Biggest issue I have is that if you modify or create a connection, it will bounce every connection as the SSL VPN service restarts or something.  But the Site-to-Site VPNs with SSL have been stable.

  • SSL VPN works but not everyone has a Sophos XG on the other side so this isn't always an option.  The REDs have been stable for me in my testing, but I don't have any in production.

     

    I would say if you have critical VPN's you have two options with Sophos XG:

     

    1.  Downgrade to v16 where the IPSec VPN actually works, all of the promises for MR 5 are now being delayed to MR 6.  I'm going to give Sophos the benefit of the doubt on this one and hope the pattern doesn't repeat past the 5th major release, but these strongswan issues were obvious since the GA release and to have so many issues 5 revisions in is not acceptable.  I'm amazed how many people stayed on v17 with how many bugs there were, look at the issues "resolved" list for MR 5 alone.

    2.  Switch to RED or SSL VPN, of course you need a Sophos XG on the other side to support this.

     

    When is the SFM going to support v17 MR-5?  To me, I consider the Sophos XG an open-source project now.  Sophos can blame everyone's "testing procedure" all they want, but when critical bugs are being missed in QA repeatedly, it's time to step up your game Sophos.

  • Dont think that will work for us.  We need to encrypt a GRE tunnel through to a cisco device for encapsulation of routing protocols(bgp) and multicast .

     

    -Scott

  • Ashok Sethi said:
    2.  Switch to RED or SSL VPN, of course you need a Sophos XG on the other side to support this.

    SSL VPN now works with UTM 9 as well (it did not before).  But also only a Sophos product.

    Ashok Sethi said:
    When is the SFM going to support v17 MR-5?  To me, I consider the Sophos XG an open-source project now.  Sophos can blame everyone's "testing procedure" all they want, but when critical bugs are being missed in QA repeatedly, it's time to step up your game Sophos.


    I agree with your assessment here.  The UTM 9 dev team seems to have this down pat.  What happened to them, did they get cut or are they migrating to the XG dev team?  The Sophos UTM Manager is fantastic compared to the Sophos Firewall Manager for XG/SFOS.  It supports every UTM9 release as soon as they release it.

    Why is the determination on which features to add using the voting platform from the Community posts?  We were promised feature parity in SFOS v15 and we don't have anywhere near that.  The email filtering in XG is so bad, I am installing "Software UTM 9 - 10 IPs" installs in order to get workable email filtering.  Extra license costs just to do something well that I'm being charged already to do in SFOS 15, 16, 16.05, 17...

    There are only TWO REASONS I've been moving clients to the XG platform.  I can get "easy" monthly license pricing and synchronized security.  If they just added these to UTM 9 I'd go right back.

  • Scott_D_L said:
    Dont think that will work for us.  We need to encrypt a GRE tunnel through to a cisco device for encapsulation of routing protocols(bgp) and multicast .

    No SSL VPN for you!  Correct, it'll have to be IPSec.  I have a number of devices running v16.05 MR8 for this reason.

  • Hey Scott,

    My issue was due to having Ike message sent out the wrong internet connection and coming in from the far end on the correct port on the XG due to load balancing unsure if you have multiple internet connections but this may be causing your issue if you do?

  • Totally Agree, to not upgrade to V.17 or if you have better downgrade to V16. Had this issue with IPSec tunnel with vendor,  the vendor have Cisco at their end. Luckily had one more Sophos XG with V16 that saved my life.

     

    But one thing V17 works well with Cyberoam V10.6, but then again Cyberoam is Sophos now.