Symptom:
User running OSPFv3 between two routers. Without IPsec authentication routers can able to form neighboship between them and exchange routes but when he employ the interface command:
ipv6 ospf authentication ipsec spi 111 sha1 <key>/ipv6 ospf authentication ipsec md5 <key> , neighbors go down. If you do "debug ipv6 ospf hello", you can see on the hellos coming in and going out.
 
OSPFv3 Authentication Steps:
 
Authentication is accomplished with one line command. IOS requires IPsec for OSPFv3 be configured separate from the normal configuration of an IPsec policy. IPsec authentication can be configured either per-interface or per-area. Below configuration shows per-interface authentication between R1 and R2.
 
R1:
 
ipv6 unicast-routing
ipv6 cef
 
interface FastEthernet1/0
no ip address
duplex auto
speed auto
ipv6 enable
ipv6 ospf 100 area 0
ipv6 ospf authentication ipsec spi 512 md5 1234567890ABCDEF1234567890ABCDEF
!
ipv6 router ospf 100
router-id 1.1.1.1
log-adjacency-changes
 
R2:
 
ipv6 unicast-routing
ipv6 cef
 
interface FastEthernet1/0
no ip address
duplex auto
speed auto
ipv6 enable
ipv6 ospf 100 area 0
ipv6 ospf authentication ipsec spi 512 md5 1234567890ABCDEF1234567890ABCDEF
!
ipv6 router ospf 100
router-id 2.2.2.2
log-adjacency-changes
 
Verification:
 
After configuring authentication on FastEthernet1/0 at both routers, you may notice the OSPFv3 adjacency drop and reform. The OSPFv3 interface display verifies that MD5 authentication is in use as below:
 
R1#sh ipv6 ospf int fa1/0
FastEthernet1/0 is up, line protocol is up
  Link Local Address FE80::C80D:18FF:FE4C:1C, Interface ID 4
  Area 0, Process ID 100, Instance ID 0, Router ID 1.1.1.1
  Network Type BROADCAST, Cost: 1
  MD5 authentication SPI 512, secure socket UP (errors: 0)
  Transmit Delay is 1 sec, State BDR, Priority 1
  Designated Router (ID) 2.2.2.2, local address FE80::C20E:28FF:FE68:0
  Backup Designated router (ID) 1.1.1.1, local address FE80::C80D:18FF:FE4C:1C
  Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
    Hello due in 00:00:02
  Graceful restart helper support enabled
  Index 1/1/1, flood queue length 0
  Next 0x0(0)/0x0(0)/0x0(0)
  Last flood scan length is 1, maximum is 1
  Last flood scan time is 0 msec, maximum is 0 msec
  Neighbor Count is 1, Adjacent neighbor count is 1
    Adjacent with neighbor 2.2.2.2  (Designated Router)
  Suppress hello for 0 neighbor(s)
R1#
 
You can also use "show crypto ipsec sa" command to verify
 
R1# show crypto ipsec sa
 
interface: FastEthernet1/0
    Crypto map tag: (none), local addr FE80::C80D:18FF:FE4C:1C
 
   IPsecv6 policy name: OSPFv3-100-512
   IPsecv6-created ACL name: FastEthernet1/0-ipsecv6-ACL
 
   protected vrf: (none)
   local  ident (addr/mask/prot/port): (FE80::/10/89/0)
   remote ident (addr/mask/prot/port): (::/0/89/0)
   current_peer :: port 500
     PERMIT, flags={origin_is_acl,}
    #pkts encaps: 77, #pkts encrypt: 77, #pkts digest: 77
    #pkts decaps: 72, #pkts decrypt: 72, #pkts verify: 72
    #pkts compressed: 0, #pkts decompressed: 0
    #pkts not compressed: 0, #pkts compr. failed: 0
    #pkts not decompressed: 0, #pkts decompress failed: 0
    #send errors 0, #recv errors 0
 
     local crypto endpt.: FE80::C80D:18FF:FE4C:1C,
     remote crypto endpt.: ::
     path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet1/0
     current outbound spi: 0x200(512)
     PFS (Y/N): N, DH group: none
 
     inbound esp sas:
 
     inbound ah sas:
      spi: 0x200(512)
        transform: ah-md5-hmac ,
        in use settings ={Transport, }
        conn id: 1, flow_id: SW:1, sibling_flags 80000001, crypto map: (none)
        no sa timing
        replay detection support: N
        Status: ACTIVE
 
     inbound pcp sas:
 
     outbound esp sas:
 
     outbound ah sas:
      spi: 0x200(512)
        transform: ah-md5-hmac ,
        in use settings ={Transport, }
        conn id: 2, flow_id: SW:2, sibling_flags 80000001, crypto map: (none)
        no sa timing
        replay detection support: N
        Status: ACTIVE
 
     outbound pcp sas:
R1#
 
If your key strings are same on both side and your router shows desired output and showing above symptoms as mentioned above then you might be hitting bug CSCtc72699
 
Workaround:
 
There is a workaround of setting "no crypto engine onboard 0" and then "clear crypto sa" .You could try this and see if it works.
 
Source Information:
This document is created from source discussion "IPv6 OSPFv3 authentication (MD5) not working"