I'm trying to establish IPSEC tunnel (for future usage with npppd
L2TP) between -snapshot and OS X El Captain 10.11.5 and have issues
when establishing phase1.
I searched in archives and suggestions doesn't work for me. I tried
main/quick combinations from dumps (below), which make sense.
Current config is:
ipsec.conf
ike passive esp proto from x.x.x.x to any port 1701 \
main auth hmac-sha1 enc 3des group modp1024 \
quick auth hmac-sha1 enc 3des \
psk "XXX"
x.x.x.x - openbsd server IP
y.y.y.y - client IP
When connecting in daemon logs:
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
GROUP_DESCRIPTION: got MODP_2048, expected MODP_3072
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got SHA2_256, expected SHA
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
ENCRYPTION_ALGORITHM: got AES_CBC, expected 3DES_CBC
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got SHA2_256, expected SHA
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got SHA, expected SHA2_256
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
GROUP_DESCRIPTION: got MODP_2048, expected MODP_3072
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
ENCRYPTION_ALGORITHM: got AES_CBC, expected 3DES_CBC
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
GROUP_DESCRIPTION: got MODP_2048, expected MODP_1024
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got MD5, expected SHA2_256
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got MD5, expected SHA
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
ENCRYPTION_ALGORITHM: got AES_CBC, expected 3DES_CBC
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got MD5, expected SHA
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got SHA2_512, expected SHA2_256
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got SHA2_512, expected SHA
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
ENCRYPTION_ALGORITHM: got AES_CBC, expected 3DES_CBC
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got SHA2_512, expected SHA
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
GROUP_DESCRIPTION: got MODP_1536, expected MODP_3072
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got SHA2_256, expected SHA
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
ENCRYPTION_ALGORITHM: got AES_CBC, expected 3DES_CBC
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got SHA2_256, expected SHA
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got SHA, expected SHA2_256
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
GROUP_DESCRIPTION: got MODP_1536, expected MODP_3072
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
ENCRYPTION_ALGORITHM: got AES_CBC, expected 3DES_CBC
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
GROUP_DESCRIPTION: got MODP_1536, expected MODP_1024
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got MD5, expected SHA2_256
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got MD5, expected SHA
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
ENCRYPTION_ALGORITHM: got AES_CBC, expected 3DES_CBC
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got MD5, expected SHA
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
GROUP_DESCRIPTION: got MODP_1024, expected MODP_3072
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got SHA2_256, expected SHA
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
ENCRYPTION_ALGORITHM: got AES_CBC, expected 3DES_CBC
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got SHA2_256, expected SHA
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
HASH_ALGORITHM: got SHA, expected SHA2_256
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
GROUP_DESCRIPTION: got MODP_1024, expected MODP_3072
Jul 9 17:25:43 vpn isakmpd[88568]: attribute_unacceptable:
ENCRYPTION_ALGORITHM: got AES_CBC, expected 3DES_CBC
Jul 9 17:25:43 vpn isakmpd[88568]: message_parse_payloads: reserved
field non-zero: 8a
Jul 9 17:25:43 vpn isakmpd[88568]: dropped message from y.y.y.y port
36990 due to notification type PAYLOAD_MALFORMED
Jul 9 17:25:46 vpn isakmpd[88568]: message_parse_payloads: reserved
field non-zero: 8a
Jul 9 17:25:46 vpn isakmpd[88568]: dropped message from y.y.y.y port
36990 due to notification type PAYLOAD_MALFORMED
Jul 9 17:25:49 vpn isakmpd[88568]: message_parse_payloads: reserved
field non-zero: 8a
Jul 9 17:25:49 vpn isakmpd[88568]: dropped message from y.y.y.y port
36990 due to notification type PAYLOAD_MALFORMED
Jul 9 17:25:53 vpn isakmpd[88568]: message_parse_payloads: reserved
field non-zero: 8a
Jul 9 17:25:53 vpn isakmpd[88568]: dropped message from y.y.y.y port
36990 due to notification type PAYLOAD_MALFORMED
I did traffic capture for isakmp traffic and I see these proposals
sent from OS X client to server:
Internet Security Association and Key Management Protocol
Initiator SPI: 07fbd2b3a059ff70
Responder SPI: 0000000000000000
Next payload: Security Association (1)
Version: 1.0
Exchange type: Identity Protection (Main Mode) (2)
Flags: 0x00
Message ID: 0x00000000
Length: 788
Type Payload: Security Association (1)
Next payload: Vendor ID (13)
Payload length: 516
Domain of interpretation: IPSEC (1)
Situation: 00000001
Type Payload: Proposal (2) # 1
Next payload: NONE / No Next Payload (0)
Payload length: 504
Proposal number: 1
Protocol ID: ISAKMP (1)
SPI Size: 0
Proposal transforms: 14
Type Payload: Transform (3) # 1
Next payload: Transform (3)
Payload length: 36
Transform number: 1
Transform ID: KEY_IKE (1)
Transform IKE Attribute Type (t=11,l=2) Life-Type : Seconds
Transform IKE Attribute Type (t=12,l=2) Life-Duration : 3600
Transform IKE Attribute Type (t=1,l=2)
Encryption-Algorithm : AES-CBC
Transform IKE Attribute Type (t=14,l=2) Key-Length : 256
Transform IKE Attribute Type (t=3,l=2)
Authentication-Method : PSK
Transform IKE Attribute Type (t=2,l=2) Hash-Algorithm : SHA2-256
Transform IKE Attribute Type (t=4,l=2)
Group-Description : 2048 bit MODP group
Type Payload: Transform (3) # 2
Next payload: Transform (3)
Payload length: 36
Transform number: 2
Transform ID: KEY_IKE (1)
Transform IKE Attribute Type (t=11,l=2) Life-Type : Seconds
Transform IKE Attribute Type (t=12,l=2) Life-Duration : 3600
Transform IKE Attribute Type (t=1,l=2)
Encryption-Algorithm : AES-CBC
Transform IKE Attribute Type (t=14,l=2) Key-Length : 256
Transform IKE Attribute Type (t=3,l=2)
Authentication-Method : PSK
Transform IKE Attribute Type (t=2,l=2) Hash-Algorithm : SHA
Transform IKE Attribute Type (t=4,l=2)
Group-Description : 2048 bit MODP group
Type Payload: Transform (3) # 3
Next payload: Transform (3)
Payload length: 36
Transform number: 3
Transform ID: KEY_IKE (1)
Transform IKE Attribute Type (t=11,l=2) Life-Type : Seconds
Transform IKE Attribute Type (t=12,l=2) Life-Duration : 3600
Transform IKE Attribute Type (t=1,l=2)
Encryption-Algorithm : AES-CBC
Transform IKE Attribute Type (t=14,l=2) Key-Length : 256
Transform IKE Attribute Type (t=3,l=2)
Authentication-Method : PSK
Transform IKE Attribute Type (t=2,l=2) Hash-Algorithm : MD5
Transform IKE Attribute Type (t=4,l=2)
Group-Description : 2048 bit MODP group
Type Payload: Transform (3) # 4
Next payload: Transform (3)
Payload length: 36
Transform number: 4
Transform ID: KEY_IKE (1)
Transform IKE Attribute Type (t=11,l=2) Life-Type : Seconds
Transform IKE Attribute Type (t=12,l=2) Life-Duration : 3600
Transform IKE Attribute Type (t=1,l=2)
Encryption-Algorithm : AES-CBC
Transform IKE Attribute Type (t=14,l=2) Key-Length : 256
Transform IKE Attribute Type (t=3,l=2)
Authentication-Method : PSK
Transform IKE Attribute Type (t=2,l=2) Hash-Algorithm : SHA2-512
Transform IKE Attribute Type (t=4,l=2)
Group-Description : 2048 bit MODP group
Type Payload: Transform (3) # 5
Next payload: Transform (3)
Payload length: 36
Transform number: 5
Transform ID: KEY_IKE (1)
Transform IKE Attribute Type (t=11,l=2) Life-Type : Seconds
Transform IKE Attribute Type (t=12,l=2) Life-Duration : 3600
Transform IKE Attribute Type (t=1,l=2)
Encryption-Algorithm : AES-CBC
Transform IKE Attribute Type (t=14,l=2) Key-Length : 256
Transform IKE Attribute Type (t=3,l=2)
Authentication-Method : PSK
Transform IKE Attribute Type (t=2,l=2) Hash-Algorithm : SHA2-256
Transform IKE Attribute Type (t=4,l=2)
Group-Description : 1536 bit MODP group
Type Payload: Transform (3) # 6
Next payload: Transform (3)
Payload length: 36
Transform number: 6
Transform ID: KEY_IKE (1)
Transform IKE Attribute Type (t=11,l=2) Life-Type : Seconds
Transform IKE Attribute Type (t=12,l=2) Life-Duration : 3600
Transform IKE Attribute Type (t=1,l=2)
Encryption-Algorithm : AES-CBC
Transform IKE Attribute Type (t=14,l=2) Key-Length : 256
Transform IKE Attribute Type (t=3,l=2)
Authentication-Method : PSK
Transform IKE Attribute Type (t=2,l=2) Hash-Algorithm : SHA
Transform IKE Attribute Type (t=4,l=2)
Group-Description : 1536 bit MODP group
Type Payload: Transform (3) # 7
Next payload: Transform (3)
Payload length: 36
Transform number: 7
Transform ID: KEY_IKE (1)
Transform IKE Attribute Type (t=11,l=2) Life-Type : Seconds
Transform IKE Attribute Type (t=12,l=2) Life-Duration : 3600
Transform IKE Attribute Type (t=1,l=2)
Encryption-Algorithm : AES-CBC
Transform IKE Attribute Type (t=14,l=2) Key-Length : 256
Transform IKE Attribute Type (t=3,l=2)
Authentication-Method : PSK
Transform IKE Attribute Type (t=2,l=2) Hash-Algorithm : MD5
Transform IKE Attribute Type (t=4,l=2)
Group-Description : 1536 bit MODP group
Type Payload: Transform (3) # 8
Next payload: Transform (3)
Payload length: 36
Transform number: 8
Transform ID: KEY_IKE (1)
Transform IKE Attribute Type (t=11,l=2) Life-Type : Seconds
Transform IKE Attribute Type (t=12,l=2) Life-Duration : 3600
Transform IKE Attribute Type (t=1,l=2)
Encryption-Algorithm : AES-CBC
Transform IKE Attribute Type (t=14,l=2) Key-Length : 256
Transform IKE Attribute Type (t=3,l=2)
Authentication-Method : PSK
Transform IKE Attribute Type (t=2,l=2) Hash-Algorithm : SHA2-256
Transform IKE Attribute Type (t=4,l=2)
Group-Description : Alternate 1024-bit MODP group
Type Payload: Transform (3) # 9
Next payload: Transform (3)
Payload length: 36
Transform number: 9
Transform ID: KEY_IKE (1)
Transform IKE Attribute Type (t=11,l=2) Life-Type : Seconds
Transform IKE Attribute Type (t=12,l=2) Life-Duration : 3600
Transform IKE Attribute Type (t=1,l=2)
Encryption-Algorithm : AES-CBC
Transform IKE Attribute Type (t=14,l=2) Key-Length : 256
Transform IKE Attribute Type (t=3,l=2)
Authentication-Method : PSK
Transform IKE Attribute Type (t=2,l=2) Hash-Algorithm : SHA
Transform IKE Attribute Type (t=4,l=2)
Group-Description : Alternate 1024-bit MODP group
Type Payload: Transform (3) # 10
Next payload: Transform (3)
Payload length: 36
Transform number: 10
Transform ID: KEY_IKE (1)
Transform IKE Attribute Type (t=11,l=2) Life-Type : Seconds
Transform IKE Attribute Type (t=12,l=2) Life-Duration : 3600
Transform IKE Attribute Type (t=1,l=2)
Encryption-Algorithm : AES-CBC
Transform IKE Attribute Type (t=14,l=2) Key-Length : 256
Transform IKE Attribute Type (t=3,l=2)
Authentication-Method : PSK
Transform IKE Attribute Type (t=2,l=2) Hash-Algorithm : MD5
Transform IKE Attribute Type (t=4,l=2)
Group-Description : Alternate 1024-bit MODP group
Type Payload: Transform (3) # 11
Next payload: Transform (3)
Payload length: 36
Transform number: 11
Transform ID: KEY_IKE (1)
Transform IKE Attribute Type (t=11,l=2) Life-Type : Seconds
Transform IKE Attribute Type (t=12,l=2) Life-Duration : 3600
Transform IKE Attribute Type (t=1,l=2)
Encryption-Algorithm : AES-CBC
Transform IKE Attribute Type (t=14,l=2) Key-Length : 128
Transform IKE Attribute Type (t=3,l=2)
Authentication-Method : PSK
Transform IKE Attribute Type (t=2,l=2) Hash-Algorithm : SHA
Transform IKE Attribute Type (t=4,l=2)
Group-Description : Alternate 1024-bit MODP group
Type Payload: Transform (3) # 12
Next payload: Transform (3)
Payload length: 36
Transform number: 12
Transform ID: KEY_IKE (1)
Transform IKE Attribute Type (t=11,l=2) Life-Type : Seconds
Transform IKE Attribute Type (t=12,l=2) Life-Duration : 3600
Transform IKE Attribute Type (t=1,l=2)
Encryption-Algorithm : AES-CBC
Transform IKE Attribute Type (t=14,l=2) Key-Length : 128
Transform IKE Attribute Type (t=3,l=2)
Authentication-Method : PSK
Transform IKE Attribute Type (t=2,l=2) Hash-Algorithm : MD5
Transform IKE Attribute Type (t=4,l=2)
Group-Description : Alternate 1024-bit MODP group
Type Payload: Transform (3) # 13
Next payload: Transform (3)
Payload length: 32
Transform number: 13
Transform ID: KEY_IKE (1)
Transform IKE Attribute Type (t=11,l=2) Life-Type : Seconds
Transform IKE Attribute Type (t=12,l=2) Life-Duration : 3600
Transform IKE Attribute Type (t=1,l=2)
Encryption-Algorithm : 3DES-CBC
Transform IKE Attribute Type (t=3,l=2)
Authentication-Method : PSK
Transform IKE Attribute Type (t=2,l=2) Hash-Algorithm : SHA
Transform IKE Attribute Type (t=4,l=2)
Group-Description : Alternate 1024-bit MODP group
Type Payload: Transform (3) # 14
Next payload: NONE / No Next Payload (0)
Payload length: 32
Transform number: 14
Transform ID: KEY_IKE (1)
Transform IKE Attribute Type (t=11,l=2) Life-Type : Seconds
Transform IKE Attribute Type (t=12,l=2) Life-Duration : 3600
Transform IKE Attribute Type (t=1,l=2)
Encryption-Algorithm : 3DES-CBC
Transform IKE Attribute Type (t=3,l=2)
Authentication-Method : PSK
Transform IKE Attribute Type (t=2,l=2) Hash-Algorithm : MD5
Transform IKE Attribute Type (t=4,l=2)
Group-Description : Alternate 1024-bit MODP group
Type Payload: Vendor ID (13) : RFC 3947 Negotiation of
NAT-Traversal in the IKE
Next payload: Vendor ID (13)
Payload length: 20
Vendor ID: 4a131c81070358455c5728f20e95452f
Vendor ID: RFC 3947 Negotiation of NAT-Traversal in the IKE
Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike
Next payload: Vendor ID (13)
Payload length: 20
Vendor ID: 4df37928e9fc4fd1b3262170d515c662
Vendor ID: draft-ietf-ipsec-nat-t-ike
Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-08
Next payload: Vendor ID (13)
Payload length: 20
Vendor ID: 8f8d83826d246b6fc7a8a6a428c11de8
Vendor ID: draft-ietf-ipsec-nat-t-ike-08
Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-07
Next payload: Vendor ID (13)
Payload length: 20
Vendor ID: 439b59f8ba676c4c7737ae22eab8f582
Vendor ID: draft-ietf-ipsec-nat-t-ike-07
Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-06
Next payload: Vendor ID (13)
Payload length: 20
Vendor ID: 4d1e0e136deafa34c4f3ea9f02ec7285
Vendor ID: draft-ietf-ipsec-nat-t-ike-06
Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-05
Next payload: Vendor ID (13)
Payload length: 20
Vendor ID: 80d0bb3def54565ee84645d4c85ce3ee
Vendor ID: draft-ietf-ipsec-nat-t-ike-05
Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-04
Next payload: Vendor ID (13)
Payload length: 20
Vendor ID: 9909b64eed937c6573de52ace952fa6b
Vendor ID: draft-ietf-ipsec-nat-t-ike-04
Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-03
Next payload: Vendor ID (13)
Payload length: 20
Vendor ID: 7d9419a65310ca6f2c179d9215529d56
Vendor ID: draft-ietf-ipsec-nat-t-ike-03
Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-02
Next payload: Vendor ID (13)
Payload length: 20
Vendor ID: cd60464335df21f87cfdb2fc68b6a448
Vendor ID: draft-ietf-ipsec-nat-t-ike-02
Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-02\n
Next payload: Vendor ID (13)
Payload length: 20
Vendor ID: 90cb80913ebb696e086381b5ec427b1f
Vendor ID: draft-ietf-ipsec-nat-t-ike-02\n
Type Payload: Vendor ID (13) : Microsoft L2TP/IPSec VPN Client
Next payload: Vendor ID (13)
Payload length: 24
Vendor ID: 4048b7d56ebce88525e7de7f00d6c2d380000000
Vendor ID: Microsoft L2TP/IPSec VPN Client
Type Payload: Vendor ID (13) : RFC 3706 DPD (Dead Peer Detection)
Next payload: NONE / No Next Payload (0)
Payload length: 20
Vendor ID: afcad71368a1f1c96b8696fc77570100
Vendor ID: RFC 3706 DPD (Dead Peer Detection)
And response from server to OS X client:
Internet Security Association and Key Management Protocol
Initiator SPI: 07fbd2b3a059ff70
Responder SPI: f16491404417b09a
Next payload: Security Association (1)
Version: 1.0
Exchange type: Identity Protection (Main Mode) (2)
Flags: 0x00
Message ID: 0x00000000
Length: 184
Type Payload: Security Association (1)
Next payload: Vendor ID (13)
Payload length: 56
Domain of interpretation: IPSEC (1)
Situation: 00000001
Type Payload: Proposal (2) # 1
Next payload: NONE / No Next Payload (0)
Payload length: 44
Proposal number: 1
Protocol ID: ISAKMP (1)
SPI Size: 0
Proposal transforms: 1
Type Payload: Transform (3) # 9
Next payload: NONE / No Next Payload (0)
Payload length: 36
Transform number: 9
Transform ID: KEY_IKE (1)
Transform IKE Attribute Type (t=11,l=2) Life-Type : Seconds
Transform IKE Attribute Type (t=12,l=2) Life-Duration : 3600
Transform IKE Attribute Type (t=1,l=2)
Encryption-Algorithm : AES-CBC
Transform IKE Attribute Type (t=14,l=2) Key-Length : 256
Transform IKE Attribute Type (t=3,l=2)
Authentication-Method : PSK
Transform IKE Attribute Type (t=2,l=2) Hash-Algorithm : SHA
Transform IKE Attribute Type (t=4,l=2)
Group-Description : Alternate 1024-bit MODP group
Type Payload: Vendor ID (13) : Unknown Vendor ID
Next payload: Vendor ID (13)
Payload length: 20
Vendor ID: b8f26eaa4cbf1b9a150a3f12dd64d183
Vendor ID: Unknown Vendor ID
Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-02\n
Next payload: Vendor ID (13)
Payload length: 20
Vendor ID: 90cb80913ebb696e086381b5ec427b1f
Vendor ID: draft-ietf-ipsec-nat-t-ike-02\n
Type Payload: Vendor ID (13) : draft-ietf-ipsec-nat-t-ike-03
Next payload: Vendor ID (13)
Payload length: 20
Vendor ID: 7d9419a65310ca6f2c179d9215529d56
Vendor ID: draft-ietf-ipsec-nat-t-ike-03
Type Payload: Vendor ID (13) : RFC 3947 Negotiation of
NAT-Traversal in the IKE
Next payload: Vendor ID (13)
Payload length: 20
Vendor ID: 4a131c81070358455c5728f20e95452f
Vendor ID: RFC 3947 Negotiation of NAT-Traversal in the IKE
Type Payload: Vendor ID (13) : RFC 3706 DPD (Dead Peer Detection)
Next payload: NONE / No Next Payload (0)
Payload length: 20
Vendor ID: afcad71368a1f1c96b8696fc77570100
Vendor ID: RFC 3706 DPD (Dead Peer Detection)
I tried all proposals from dump I got from both client packets and
server site with no luck.
Anybody have success with OS X client and isakmpd? It will be nice to
see working main and quick config parts.
--
--
With regards,
Evgeniy Sudyr