Hello,
I upgraded 5 mikrotiks from version 6.44.xx to 6.45.5(6) and got the same error on all mikrotiks in LOG, got fatal error INVALID_SYNTAX, but IPSEC is working well, no problems, connections UP, everything is working. Some mikrotiks are connected to StrongSWAN on second side, some to Fortigate. Please could I ask you to see attached LOG and let me know where could be a mistake. On the first start everythig is without error, but then I have error in LOG every 30minutes - lifetime
ok, there is a part of LOG file on strongswan side. How I wrote, I have errors on 5 mikrotiks after firmware upgrade to 6.45.5 ( and 6), no errors before, 2 mikrotiks are connected to strongswan, 3 to fortigate gateway, no configuration changes on strongswan and fortigate.
Sep 16 10:46:12 ares charon: 06[NET] received packet: from yyy.yyy.yyy.yyy[4500] to xxx.xxx.xxx.xxx[4500]
Sep 16 10:46:12 ares charon: 06[NET] waiting for data on sockets
Sep 16 10:46:12 ares charon: 14[NET] received packet: from yyy.yyy.yyy.yyy[4500] to xxx.xxx.xxx.xxx[4500] (576 bytes)
Sep 16 10:46:12 ares charon: 14[ENC] parsed CREATE_CHILD_SA request 16 [ SA KE No ]
Sep 16 10:46:12 ares charon: 14[IKE] yyy.yyy.yyy.yyy is initiating an IKE_SA
Sep 16 10:46:12 ares charon: 14[IKE] IKE_SA ipsec-tunel[1380] state change: CREATED => CONNECTING
Sep 16 10:46:12 ares charon: 14[CFG] selecting proposal:
Sep 16 10:46:12 ares charon: 14[CFG] proposal matches
Sep 16 10:46:12 ares charon: 14[CFG] received proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Sep 16 10:46:12 ares charon: 14[CFG] configured proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Sep 16 10:46:12 ares charon: 14[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Sep 16 10:46:12 ares charon: 14[LIB] size of DH secret exponent: 2047 bits
Sep 16 10:46:12 ares charon: 14[IKE] IKE_SA ipsec-tunel[1375] state change: ESTABLISHED => REKEYING
Sep 16 10:46:12 ares charon: 14[ENC] generating CREATE_CHILD_SA response 16 [ SA No KE ]
Sep 16 10:46:12 ares charon: 14[NET] sending packet: from xxx.xxx.xxx.xxx[4500] to yyy.yyy.yyy.yyy[4500] (432 bytes)
Sep 16 10:46:12 ares charon: 02[NET] sending packet: from xxx.xxx.xxx.xxx[4500] to yyy.yyy.yyy.yyy[4500]
Sep 16 10:46:12 ares charon: 06[NET] received packet: from yyy.yyy.yyy.yyy[4500] to xxx.xxx.xxx.xxx[4500]
Sep 16 10:46:12 ares charon: 06[NET] waiting for data on sockets
Sep 16 10:46:12 ares charon: 05[NET] received packet: from yyy.yyy.yyy.yyy[4500] to xxx.xxx.xxx.xxx[4500] (112 bytes)
Sep 16 10:46:12 ares charon: 05[ENC] DELETE verification failed
Sep 16 10:46:12 ares charon: 05[ENC] could not decrypt payloads
Sep 16 10:46:12 ares charon: 05[IKE] message verification failed
Sep 16 10:46:12 ares charon: 05[ENC] generating INFORMATIONAL response 17 [ N(INVAL_SYN) ]
Sep 16 10:46:12 ares charon: 05[NET] sending packet: from xxx.xxx.xxx.xxx[4500] to yyy.yyy.yyy.yyy[4500] (80 bytes)
Sep 16 10:46:12 ares charon: 05[IKE] INFORMATIONAL request with message ID 17 processing failed
Sep 16 10:46:12 ares charon: 02[NET] sending packet: from xxx.xxx.xxx.xxx[4500] to yyy.yyy.yyy.yyy[4500]
Please post your ‘/ip ipsec export hide-sensitive’ command output. Make sure you have pfs-group set to none under IPsec Proposals for this specific peer.
Having a lifetime of 30 minutes in ipsec proposal should be not problem. If you set Lifetime in ipsec profile to 30 minutes then you can get this error. NordVPN is offering 24 hours. Obey would enforce the 24 hours (NordVPN) but maybe RouterOS is still trying to renew. You could try strict as proposal check.
The issue that OP reported will be fixed in the next beta. It was introduced by the phase 1 rekeying support for IKEv2 in 6.45.
As far as I know, proposal-check will only work for IKEv1. IKEv2 both sides act independently and will rekey and reauthenticate based on their own configured values.
Currently as a workaround, you can try setting the lifetime value under IPsec Profile to zero (0) to disable rekeying.