Have anybody setup IPSEC using GCM encryption on Mikrotiks (in my case - to encode GRE tunnels)?
I succesfully setup AES-CBC, AES-CTR but failed with AES-GCM - I am getting the “failed to pre-process ph2 packet” error on both sides and stuck whre to look further…
PS: from debug log I see only this error:
Aug/06/2016 20:12:38 ipsec,debug,packet IPSEC:: call pfkey_send_update_nat
Aug/06/2016 20:12:38 ipsec,debug IPSEC:: libipsec failed send update_nat (Success)
Aug/06/2016 20:12:38 ipsec,debug IPSEC:: pfkey update failed.
Aug/06/2016 20:12:38 ipsec,debug IPSEC:: failed to process packet.
Aug/06/2016 20:12:38 ipsec,debug IPSEC:: phase2 negotiation failed.
Aug/06/2016 20:12:38 ipsec,debug,packet IPSEC:: an undead schedule has been deleted.
GCM works well, but but is not hardware accelerated. only the AES-CBC cyphers are accelerated.
Enable ipsec debug logging to see what is wrong with the phase 2
Problem with CBC that it seems to be coded in one thread. I tested encrypted VPNs betweens CCRs, 100M channels and ping 40ms between them - one connection using AES-256-CBC gives only… 2-3Mbit! Of course using more connection gives more speed … but not in the case of Samba sharing. Switching to Camelia-256 or AES-256-CTR gives ~30Mbit for single connection. It is closer to the maximum possible ~50M (taking in the mind the TCPWindowSize issue). Of course they are not hardware coded but hardware coding seems to be the bottleneck…Becuase I remember time when AES-256-CBC gave the same speed (somewhere in 6.7…6.11).
GCM I think should give more speed. I hope.
PS: or does exist any way to switch off harware “acceleration” except changing the encryption methods?