Bug ID 1087621: IKEv2: IPsec CREATE_CHILD_SA (IKE) fails due to bad ECP payload

Last Modified: May 29, 2024

Affected Product(s):
BIG-IP TMOS(all modules)

Known Affected Versions:
15.1.0, 15.1.0.1, 15.1.0.2, 15.1.0.3, 15.1.0.4, 15.1.0.5, 15.1.1, 15.1.2, 15.1.2.1, 15.1.3, 15.1.3.1, 15.1.4, 15.1.4.1, 15.1.5, 15.1.5.1, 15.1.6, 16.0.0, 16.0.0.1, 16.0.1, 16.0.1.1, 16.0.1.2, 16.1.0, 16.1.1, 16.1.2, 16.1.2.1, 16.1.2.2, 16.1.3, 17.0.0

Fixed In:
17.1.0, 17.0.0.1, 16.1.3.1, 15.1.6.1

Opened: Mar 17, 2022

Severity: 3-Major

Symptoms

The tunnel stops working after initially starting with no problem. The BIG-IP will send a bad KE (Key Exchange) Payload when rekeying the IKE SA with ECP.

Impact

IPsec tunnels stop working for periods of time.

Conditions

-- IKEv2 -- ECP PFS -- Peer attempts to re-key IKE SA (CREATE_CHILD SA) over existing IKE SA.

Workaround

Do not use ECP for PFS.

Fix Information

ECP will work correctly when rekeying.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips