| Description | This article describes an expected behavior where the FortiGate loses DH Groups 1, 2, and 5 in the IPsec tunnel configuration when upgrading a FIPS-enabled FortiGate from the v7.0 FIPS specialty firmware to the v7.2/7.4 versions of this firmware. Additionally, the iked daemon can be observed crashing with Signal 6 (Aborted) after the firmware upgrade is completed. |
| Scope | FortiGate FIPS-CC. |
| Solution |
First, refer to the following KB article regarding the FIPS 140-2/140-3 transition for FortiOS: Technical Tip: Key considerations when upgrading FIPS FortiGates from FIPS 140-2 (v7.0 and earlier) ....
As part of the new FIPS 140-3 standard, algorithms used for Diffie-Hellman (DH) key exchange have now been limited to a minimum of 2048 bits for Finite Field Cryptography (FFC) and 224 bits for Elliptic Curve Cryptography (ECC). Refer to Appendix D in the following NIST document for more information: NIST SP 800-56A.
For IPsec on the FortiGate, these new restrictions mean that the following DH Groups are no longer allowed when FIPS-CC mode is enabled on FortiGates targeting the FIPS 140-3 standard:
Furthermore, after upgrading a FortiGate from an earlier FIPS 140-2 based firmware to the newer FIPS 140-3 based firmware, two main behaviors/issues will be observed:
To confirm if this scenario is occurring, run the command diagnose debug crashlog read and check for the following indicators:
FortiGate # diagnose debug crashlog read [...] 473: 2026-01-15 14:05:39 <00399> firmware FortiGate-61F v7.2.8,build9543b1639,250502 (FIPS-CC-72-4) Crash log interval is 3600 seconds
Another validation method is to run the following iked debug commands and check for the presence of a repeated message similar to 'ike addspspec:1132: unknown dhgrp 0':
diagnose debug application ike -1 diagnose debug enable
Recommendations for users upgrading from earlier FIPS Certified/CVE-Patched FortiOS versions: Before executing the upgrade, review the existing IPsec VPN configuration to see if DH Groups 1, 2, or 5 are currently in-use and modify the dhgrp setting to only utilize DH Groups that meet the FIPS 140-3 requirement. For reference, Groups 14 through 21 and 27 through 32 are allowed to be used with FIPS 140-3.
A quick way to check the existing DH Group settings from the CLI is the command show vpn ipsec phase1-interface | grep -f dhgrp, which will show each VPN tunnel and highlight the DH Group currently set in the Phase1 settings.
If the upgrade has already been executed and the iked Signal 6 crashes are occurring, then one of the following options can be implemented to resolve the issue:
Option 1: Change to a different dhgrp setting OR manually re-apply the setting. As an example, consider the case where the VPN tunnel has set dhgrp 14 5 applied before the firmware upgrade. After the upgrade, the setting will visually show set dhgrp 14, but the iked crashing is occurring because the system has an incorrect count for the number of configured DH Groups set.
To resolve this, either change away to a different DH Group (such as DH Group 20) or change away and then change back to the original DH Group:
FortiGate # config vpn ipsec phase1-interface FortiGate (phase1-inteface) # edit Example_VPN FortiGate (Example_VPN) # show | grep dhgrp set dhgrp 14 <--- dhgrp was originally 14 5 before upgrade, now visually shows 14. FortiGate (Example_VPN) # set dhgrp 20 <--- Can stop here if the remote VPN peer is also using DH Group 20. FortiGate (Example_VPN) # next FortiGate (phase1-interface) # edit Example_VPN FortiGate (Example_VPN) # show | grep dhgrp set dhgrp 20 FortiGate (Example_VPN) # set dhgrp 14 <--- Changing back to DH Group 14 FortiGate (Example_VPN) # end FortiGate #
Note: Simply re-applying the same DH Groups (i.e., set dhgrp 14) is not sufficient to resolve the issue. The DH Groups must actually change for the fix to apply.
Option 2: Rebooting the FortiGate. This iked crashing issue only occurs immediately after a firmware upgrade is performed. If the FortiGate is rebooted again, then the configuration is freshly reloaded with the correand the crashes will no longer occur
Related articles: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.