Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - Body

#1
Hallo zusammen,

leider bekomme ich es nicht hin mit meinem iPhone 12 Pro eine IKE2 VPN zur OpnSense i.d. neusten Version herzustellen.
Ich bin nach diesem Link vorgegangen:

https://docs.opnsense.org/manual/how-tos/ipsec-swanctl-rw-ikev2-eap-mschapv2.html

Meine Opnsense ist hinter einer FritzBox!, bei der FritzBox! sind alle entsprechenden Ports freigegeben.

Meine Logs der Firewall sagen folgendes:

2025-07-20T14:07:16   Informational   charon    16[IKE] <2ae66195-b865-4427-bb71-6463efb28cd5|72> sending keep alive to 212.117.xx.xx[4500]
2025-07-20T14:07:14   Informational   charon    16[JOB] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> deleting half open IKE_SA with 80.187.xx.xx after timeout
2025-07-20T14:07:14   Informational   charon    16[JOB] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> deleting half open IKE_SA with 80.187.xx.xx after timeout
2025-07-20T14:07:04   Informational   charon    11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> sending keep alive to 80.187.xx.xx[10041]
2025-07-20T14:07:04   Informational   charon    11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> sending keep alive to 80.187.xx.xx[10041]
2025-07-20T14:06:56   Informational   charon    11[ENC] <2ae66195-b865-4427-bb71-6463efb28cd5|72> parsed INFORMATIONAL response 135 [ N(NATD_S_IP) N(NATD_D_IP) ]
2025-07-20T14:06:56   Informational   charon    11[NET] <2ae66195-b865-4427-bb71-6463efb28cd5|72> received packet: from 212.117.xxx.xxx[4500] to 192.168.178.2[4500] (128 bytes)
2025-07-20T14:06:56   Informational   charon    11[NET] <2ae66195-b865-4427-bb71-6463efb28cd5|72> sending packet: from 192.168.178.2[4500] to 212.117.xxx.xxx[4500] (128 bytes)
2025-07-20T14:06:56   Informational   charon    11[ENC] <2ae66195-b865-4427-bb71-6463efb28cd5|72> generating INFORMATIONAL request 135 [ N(NATD_S_IP) N(NATD_D_IP) ]
2025-07-20T14:06:56   Informational   charon    11[IKE] <2ae66195-b865-4427-bb71-6463efb28cd5|72> sending DPD request
2025-07-20T14:06:46   Informational   charon    11[IKE] <2ae66195-b865-4427-bb71-6463efb28cd5|72> sending keep alive to 212.117.93.203[4500]
2025-07-20T14:06:44   Informational   charon    11[NET] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> sending packet: from 192.168.178.2[4500] to 80.187.xxx.xxx[10041] (452 bytes)
2025-07-20T14:06:44   Informational   charon    11[NET] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> sending packet: from 192.168.178.2[4500] to 80.187.xxx.xxx[10041] (1236 bytes)
2025-07-20T14:06:44   Informational   charon    11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> generating IKE_AUTH response 1 [ EF(2/2) ]
2025-07-20T14:06:44   Informational   charon    11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> generating IKE_AUTH response 1 [ EF(1/2) ]
2025-07-20T14:06:44   Informational   charon    11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> splitting IKE message (1616 bytes) into 2 fragments
2025-07-20T14:06:44   Informational   charon    11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> generating IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ]
2025-07-20T14:06:44   Informational   charon    11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> sending end entity cert "C=DE, xxxx
2025-07-20T14:06:44   Informational   charon    11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> authentication of 'MEIN FQDN' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
2025-07-20T14:06:44   Informational   charon    11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
2025-07-20T14:06:44   Informational   charon    11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> peer supports MOBIKE
2025-07-20T14:06:44   Informational   charon    11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> initiating EAP_IDENTITY method (id 0x00)
2025-07-20T14:06:44   Informational   charon    11[CFG] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|74> selected peer config '8a3834e7-9448-47ce-a1c1-747a4e0f206f'
2025-07-20T14:06:44   Informational   charon    11[CFG] <74> looking for peer configs matching 192.168.178.2[XXXXx]...80.187.xx.xx[username@test.de]
2025-07-20T14:06:44   Informational   charon    11[ENC] <74> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr CPRQ(ADDR MASK DHCP DNS ADDR6 DHCP6 DNS6 DOMAIN) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr N(MOBIKE_SUP) ]
2025-07-20T14:06:44   Informational   charon    11[ENC] <74> unknown attribute type INTERNAL_DNS_DOMAIN
2025-07-20T14:06:44   Informational   charon    11[NET] <74> received packet: from 80.187.xx.xx[10041] to 192.168.178.2[4500] (400 bytes)
2025-07-20T14:06:44   Informational   charon    11[NET] <74> sending packet: from 192.168.178.2[500] to 80.187.xx.xx[500] (325 bytes)
2025-07-20T14:06:44   Informational   charon    11[ENC] <74> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
2025-07-20T14:06:44   Informational   charon    11[IKE] <74> sending cert request for
2025-07-20T14:06:44   Informational   charon    11[IKE] <74> sending cert request for
2025-07-20T14:06:44   Informational   charon    11[IKE] <74> remote host is behind NAT
2025-07-20T14:06:44   Informational   charon    11[IKE] <74> local host is behind NAT, sending keep alives
2025-07-20T14:06:44   Informational   charon    11[CFG] <74> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
2025-07-20T14:06:44   Informational   charon    11[IKE] <74> 80.187.123.49 is initiating an IKE_SA
2025-07-20T14:06:44   Informational   charon    11[ENC] <74> parsed IKE_SA_INIT request 0 [ SAxx KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
2025-07-20T14:06:44   Informational   charon    11[NET] <74> received packet: from 80.187.xxx.xx[500] to 192.168.178.2[500] (370 bytes)
2025-07-20T14:06:44   Informational   charon    11[NET] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> sending packet: from 192.168.178.2[4500] to 80.187.xx.xx[10041] (452 bytes)
2025-07-20T14:06:44   Informational   charon    11[NET] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> sending packet: from 192.168.178.2[4500] to 80.187.xx.xx[10041] (1236 bytes)
2025-07-20T14:06:44   Informational   charon    11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> generating IKE_AUTH response 1 [ EF(2/2) ]
2025-07-20T14:06:44   Informational   charon    11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> generating IKE_AUTH response 1 [ EF(1/2) ]
2025-07-20T14:06:44   Informational   charon    11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> splitting IKE message (1616 bytes) into 2 fragments
2025-07-20T14:06:44   Informational   charon    11[ENC] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> generating IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ]
2025-07-20T14:06:44   Informational   charon    11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> sending end entity cert "C=DE,
2025-07-20T14:06:44   Informational   charon    11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> authentication of 'FQDN' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
2025-07-20T14:06:44   Informational   charon    11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
2025-07-20T14:06:44   Informational   charon    11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> peer supports MOBIKE
2025-07-20T14:06:44   Informational   charon    11[IKE] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> initiating EAP_IDENTITY method (id 0x00)
2025-07-20T14:06:44   Informational   charon    11[CFG] <8a3834e7-9448-47ce-a1c1-747a4e0f206f|73> selected peer config '8a3834e7-9448-47ce-a1c1-747a4e0f206f'
2025-07-20T14:06:44   Informational   charon    11[CFG] <73> looking for peer configs matching 192.168.178.2xxxx
2025-07-20T14:06:44   Informational   charon    11[ENC] <73> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr CPRQ(ADDR MASK DHCP DNS ADDR6 DHCP6 DNS6 DOMAIN) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr N(MOBIKE_SUP) ]
2025-07-20T14:06:44   Informational   charon    11[ENC] <73> unknown attribute type INTERNAL_DNS_DOMAIN
2025-07-20T14:06:44   Informational   charon    11[NET] <73> received packet: from 80.187.xx.xx[10041] to 192.168.178.2[4500] (400 bytes)
2025-07-20T14:06:44   Informational   charon    11[NET] <73> sending packet: from 192.168.178.2[500] to 80.187.xx.xx[500] (325 bytes)
2025-07-20T14:06:44   Informational   charon    11[ENC] <73> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
2025-07-20T14:06:44   Informational   charon    11[IKE] <73> sending cert request for "C=DE,
2025-07-20T14:06:44   Informational   charon    11[IKE] <73> sending cert request for "C=DE,
2025-07-20T14:06:44   Informational   charon    11[IKE] <73> remote host is behind NAT
2025-07-20T14:06:44   Informational   charon    11[IKE] <73> local host is behind NAT, sending keep alives
2025-07-20T14:06:44   Informational   charon    11[CFG] <73> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
2025-07-20T14:06:44   Informational   charon    11[IKE] <73> 80.187.123.49 is initiating an IKE_SA
2025-07-20T14:06:44   Informational   charon    11[ENC] <73> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
2025-07-20T14:06:44   Informational   charon    11[NET] <73> received packet: from 80.187.xx.xx[500] to 192.168.178.2[500] (370 bytes)


Einer eine Idee woran es liegen kann?

Grüße