I have the router at central office (CO) and some routers at remote offices (TM-2, TM-3), which are IPSec peers authenticated with secret on CO. On security reason I want to use separate secret for each peer. I try achieve this using multiple ipsec identities. But it seems that only first of not disabled identities is used by OS. So peer TM-2 can be authenticated, and peer TM-3 can not. For peer TM-3 I see message in log “14:06:49 ipsec,error identity not found for server:TM-CO peer: KEYID: TM-3”. When I disable identity for TM-2, TM-3 succeeds in authentication. So playing with disable/enable I even can reach situation when both of peers authenticated and IPSec tunnels installed.
I am using the very same method on the same 6.45.7, the two remote initiators are even coming from behind the same remote IP, and it works for me. However, there is a difference, I’m using ID type fqdn, not key-id. So maybe try that way to check whether it is related and to maybe make your life easier.
Update: It doesn’t seem to be the reason. I’ve switched the ID type from fqdn to key-id at both my initiators, disabled and re-enabled the responder peer, and both initiators came happily up again.
So I have a dark suspicion - make your initiators’ IDs differ in more than the last character and see what happens when you keep both identity rows enabled and let the initiators re-establish the connections.
Yes, I tried “remote-id=fqdn:” and it didn’t work too.
Now I’ve tried to change names to AAAA and BBBB - no success
Now I’ve tried to change names to lowercase - no success
Here is my client’s config. Does it look similar to yours one?
Funny enough, I don’t set my-id in identity rows representing the individual initiators at responder side and it works anyway; however, I also do not set remote-id at initiator side.
Oops, I haven’t noticed at first reading that you’ve manually set remote-id at initiators to TM-CO; it is then even more surprising that it worked at all, given that the initiators should have terminated the connection once they’ve seen an unexpected ID of the responder (as you haven’t specified any my-id at the responder, it probably wasn’t matching the remote-id value set at the initiators, I don’t remember what the IPsec stack automatically chooses as its local ID when none is specified “manually”).
So for me, the actual bug is that the connections did establish by means of your rain spell.