[vpn-help] VPN client times out on Windows 7 with Killer e2200

Alexis La Goutte alexis.lagoutte at gmail.com
Wed Dec 16 02:01:11 CST 2015


Hi Claude,


Sorry but no other solution for the moment, i think there is a
incompatibility between this NIC and Shrew driver...
and there is no active dev on Shrew, i think the better solution is to
check a another VPN client...

Cheers,

On Mon, Dec 14, 2015 at 2:24 AM, DUVERGIER Claude <
vpn-help.shrew.ml at claude.duvergier.fr> wrote:

> Hello,
>
> According to attached pfSense log, it did got something and responded to
> it...
> > charon: 13[IKE] <con2|120> sending XAuth vendor ID
> > charon: 13[IKE] <con2|120> sending DPD vendor ID
> > charon: 13[IKE] <con2|120> sending Cisco Unity vendor ID
> > charon: 13[IKE] <con2|120> sending FRAGMENTATION vendor ID
> > charon: 13[IKE] <con2|120> sending NAT-T (RFC 3947) vendor ID
> > charon: 13[ENC] <con2|120> generating AGGRESSIVE response 0 [ SA KE No
> ID NAT-D NAT-D HASH V V V V V ]
> > charon: 13[NET] <con2|120> sending packet: from 10.0.0.1[500] to
> 12.34.56.78[500] (463 bytes)
> > charon: 13[IKE] <con2|120> sending retransmit 1 of response message ID
> 0, seq 1
> > charon: 13[NET] <con2|120> sending packet: from 10.0.0.1[500] to
> 12.34.56.78[500] (463 bytes)
> > charon: 06[NET] <con2|120> received packet: from 12.34.56.78[500] to
> 10.0.0.1[500] (1181 bytes)
> > charon: 06[IKE] <con2|120> received retransmit of request with ID 0,
> retransmitting response
> > charon: 06[NET] <con2|120> sending packet: from 10.0.0.1[500] to
> 12.34.56.78[500] (463 bytes)
> > charon: 13[NET] <con2|117> received packet: from 12.34.56.78[4500] to
> 10.0.0.1[4500] (92 bytes)
> > charon: 13[ENC] <con2|117> parsed INFORMATIONAL_V1 request 3503928170 [
> HASH N(DPD) ]
> > charon: 13[IKE] <con2|117> queueing ISAKMP_DPD task
> > charon: 13[IKE] <con2|117> activating new tasks
> > charon: 13[IKE] <con2|117>   activating ISAKMP_DPD task
> > charon: 13[ENC] <con2|117> generating INFORMATIONAL_V1 request
> 3209268149 [ HASH N(DPD_ACK) ]
> > charon: 13[NET] <con2|117> sending packet: from 10.0.0.1[4500] to
> 12.34.56.78[4500] (92 bytes)
> > charon: 13[IKE] <con2|117> activating new tasks
> > charon: 13[IKE] <con2|117> nothing to initiate
>
> Client's public IP = 12.34.56.78
> pfSense's LAN IP = 10.0.0.1
>
> > There is sometimes some issue with NIC (in this case, the nic have
> > TCP/IP hardware stack... may be why there is this problem !)
> As I said, I've found several topics that reports issues with VPN and
> this NIC: my message aimed to report the issue and to check for existing
> solution (tweaks, beta client, etc.).
>
> > Do you have try a another vpn client ? (like SoftEther VPN ?)
> Didn't know about that client but it seems it only speaks IPSec with a
> SoftEther VPN Server (I can't see any "IPSec" setting in the client GUI).
> Do you know any other IPSec Windows client I could try?
>
> Thanks
>
> --
> DUVERGIER Claude
>
> Le 11/12/2015 08:59, Alexis La Goutte a écrit :
> > Bonjour Claude,
> >
> > What say VPN Pfsense gateway logs ? received the packet ?
> >
> > There is sometimes some issue with NIC (in this case, the nic have
> > TCP/IP hardware stack... may be why there is this problem !)
> > Do you have try a another vpn client ? (like SoftEther VPN ?)
> >
> > Cheers
> >
> > On Sat, Nov 28, 2015 at 5:21 PM, DUVERGIER Claude
> > <vpn-help.shrew.ml at claude.duvergier.fr
> > <mailto:vpn-help.shrew.ml at claude.duvergier.fr>> wrote:
> >
> >     Hello,
> >
> >     I'm having troubles connecting to VPN using v2.2.2 client on a
> Windows 7
> >     64-bits machine that has "Killer e2200 Gigabit Ethernet Controller"
> NIC:
> >     it times out ("negotiation timout occurred").
> >
> >     The same "VPN configuration" works just fine on other Windows 7
> >     computers and even on a VMware virtual machine hosted on my "Killer
> >     e2200" machine (where it does not work natively).
> >
> >     I have found multiple occurrences of such incompatibilities between
> >     Shrew Soft and Killer e2200:
> >     *
> >
> http://www.tomshardware.co.uk/forum/36203-43-shrew-soft-wireless-windows
> >     *
> >
> http://www.techpowerup.com/forums/threads/intel-nic-network-interface-controller-vs-killer-e2200.200606/page-2#post-3163550
> >
> >     Some suggests to disable the "Microsoft Virtual Wifi Adapter" (so as
> >     your FAQ) but I don't have any.
> >
> >     I tried updating the Killer e2200 drivers to their last version, all
> the
> >     "NAT Traversal" possible values: no luck.
> >
> >     Is it a known issue? Is there a workaround?
> >
> >
> >     Client and Gateway Information:
> >     * VPN Client Version =  2.2.2
> >     * Windows OS Version = Windows 7 Pro SP1 64 bits
> >     * Gateway Make/Model = pfSense (strongSwan)
> >     * Gateway OS Version = 2.2.5
> >
> >
> >     Here are the connection window logs:
> >     -----
> >     config loaded for site 'Foobar'
> >     attached to key daemon ...
> >     peer configured
> >     iskamp proposal configured
> >     esp proposal configured
> >     client configured
> >     local id configured
> >     remote id configured
> >     pre-shared key configured
> >     bringing up tunnel ...
> >     negotiation timout occurred
> >     tunnel disabled
> >     detached from key daemon
> >     -----
> >
> >     Also see attached iked.log, here is an excerpt:
> >     -----
> >     [...]
> >     15/11/28 17:11:35 >= : cookies dff03a917b3e80f1:0000000000000000
> >     15/11/28 17:11:35 >= : message 00000000
> >     15/11/28 17:11:35 -> : send IKE packet 192.168.0.10:500
> >     <http://192.168.0.10:500> ->
> >     12.34.56.78:500 <http://12.34.56.78:500> ( 1209 bytes )
> >     15/11/28 17:11:35 DB : phase1 resend event scheduled ( ref count = 2
> )
> >     15/11/28 17:11:40 -> : resend 1 phase1 packet(s) [0/2]
> >     192.168.0.10:500 <http://192.168.0.10:500>
> >     -> 12.34.56.78:500 <http://12.34.56.78:500>
> >     15/11/28 17:11:45 -> : resend 1 phase1 packet(s) [1/2]
> >     192.168.0.10:500 <http://192.168.0.10:500>
> >     -> 12.34.56.78:500 <http://12.34.56.78:500>
> >     15/11/28 17:11:50 -> : resend 1 phase1 packet(s) [2/2]
> >     192.168.0.10:500 <http://192.168.0.10:500>
> >     -> 12.34.56.78:500 <http://12.34.56.78:500>
> >     15/11/28 17:11:55 ii : resend limit exceeded for phase1 exchange
> >     15/11/28 17:11:55 ii : phase1 removal before expire time
> >     15/11/28 17:11:55 DB : phase1 deleted ( obj count = 0 )
> >     15/11/28 17:11:55 DB : policy not found
> >     15/11/28 17:11:55 DB : policy not found
> >     15/11/28 17:11:55 DB : policy not found
> >     15/11/28 17:11:55 DB : policy not found
> >     15/11/28 17:11:55 DB : removing tunnel config references
> >     15/11/28 17:11:55 DB : removing tunnel phase2 references
> >     15/11/28 17:11:55 DB : removing tunnel phase1 references
> >     15/11/28 17:11:55 DB : tunnel deleted ( obj count = 0 )
> >     15/11/28 17:11:55 DB : removing all peer tunnel references
> >     15/11/28 17:11:55 DB : peer deleted ( obj count = 0 )
> >     15/11/28 17:11:55 ii : ipc client process thread exit ...
> >     -----
> >
> >     Regards
> >
> >
> >     --
> >     DUVERGIER Claude
> >
> >     _______________________________________________
> >     vpn-help mailing list
> >     vpn-help at lists.shrew.net <mailto:vpn-help at lists.shrew.net>
> >     https://lists.shrew.net/mailman/listinfo/vpn-help
> >
> >
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.shrew.net/pipermail/vpn-help/attachments/20151216/185627f4/attachment-0001.html>


More information about the vpn-help mailing list