Thanks for the input. In the end, I just deleted the .yaml file with the config; it was the fastest solution.
Now AdGuard is up and running again.
Now AdGuard is up and running again.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: franco on October 30, 2023, 10:48:04 AM
keymap issue? Depending on which device you use to type the password for Login and for the tester... In 99.9% of cases incorrect passwords are just that.
Quote from: franco on October 30, 2023, 09:41:01 AM
Did you maybe run into this issue? https://forum.opnsense.org/index.php?topic=36528.0
The fix for that is included in 23.7.7, but it hinges on having integrated auth disabled in the first place to produce this issue.
Cheers,
Franco
Quote from: newsense on October 30, 2023, 06:26:23 AM
Can you ssh in with the observer account ? Try to su - from there and change the root password
Quote2021-09-17T17:15:00 charon[65375] 13[IKE] <con1|260> sending DELETE for ESP CHILD_SA with SPI c5bac60c
2021-09-17T17:15:00 charon[65375] 13[IKE] <con1|260> failed to establish CHILD_SA, keeping IKE_SA
2021-09-17T17:15:00 charon[65375] 13[IKE] <con1|260> no acceptable proposal found
2021-09-17T17:15:00 charon[65375] 13[CFG] <con1|260> configured proposals: ESP:AES_CBC_256/HMAC_SHA2_256_128/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_SHA2_384_192/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_192/HMAC_SHA2_256_128/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_192/HMAC_SHA2_384_192/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA2_256_128/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA2_384_192/MODP_2048/NO_EXT_SEQ, ESP:AES_GCM_16_256/MODP_2048/NO_EXT_SEQ, ESP:AES_GCM_16_256/MODP_2048/NO_EXT_SEQ
2021-09-17T17:15:00 charon[65375] 13[CFG] <con1|260> received proposals: ESP:AES_CBC_256/HMAC_SHA2_256_128/NO_EXT_SEQ
2021-09-17T17:15:00 charon[65375] 13[ENC] <con1|260> parsed CREATE_CHILD_SA response 864 [ SA No TSi TSr ]
2021-09-17T17:15:00 charon[65375] 13[NET] <con1|260> received packet: from 93.195.52.31[4500] to 192.168.1.48[4500] (192 bytes)
2021-09-17T17:15:00 charon[65375] 13[NET] <con1|260> sending packet: from 192.168.1.48[4500] to 93.195.52.31[4500] (768 bytes)
2021-09-17T17:15:00 charon[65375] 13[ENC] <con1|260> generating CREATE_CHILD_SA request 864 [ N(REKEY_SA) N(ESP_TFC_PAD_N) SA No KE TSi TSr ]
2021-09-17T17:15:00 charon[65375] 13[IKE] <con1|260> establishing CHILD_SA con1{147} reqid 1
2021-09-17T17:15:00 charon[65375] 11[KNL] creating rekey job for CHILD_SA ESP/0xc3269189/192.168.1.48[/size]
Quote from: fraenki on December 13, 2020, 09:45:04 PM
If anyone is still affected by IPsec instability, please test the following:
Change the following setting...
System: Settings: Miscellaneous -> Hardware acceleration
...from "AES-NI CPU-based" to "none" and save the change. Be sure to reboot the firewall afterwards.
Please report back.
Thanks
- Frank