Quote from: viragomann on February 06, 2026, 12:39:05 PMWhy want you define your own proposals? If I open the drop-down list, I can find any combination, I can think of. I'm missing nothing here.
To use PFS, key exchange methods may be added to the proposals for the IPsec SAs e.g.
esp_proposals = aes128-sha256-ecp384-modp3072
expected.
Why do I want to create my own proposals? Because in 95% of cases I don't control the other end of the tunnel and no other firewall I've ever seen limits the combinations available. It's a needless restriction.
PFS seemingly you can enable by selecting a DH group cipher in your phase 2/child ESP proposal
The whole point of OPNsense is to put a useful GUI overtop of the CLI processes. Including a "default" proposal just because the underlying process does, and not listing what it is anywhere other than in the actual processes docs seems insane from a UI point of view. Ironically even with full help on in the GUI, child ESP proposal has zero help and while the main connections proposal help does have something, it doesn't explain what "default" is
VPN's are almost never between two OPNsense devices and require exactly matching tens of settings, why would you make it look completely different, and name damn near every field differently from ever other product made?
"