Hello Tobias, thank you very much for your reply. Below is the output of ipsecctl -s all and the verbose output of iked #-------------------------------- When the first client connects: (1.2.3.4 is the servers public IP, 5.6.7.8 is the public IP of the DSL modem) FLOWS: flow esp in from 10.75.0.0/16 to 10.21.0.0/16 peer 5.6.7.8 type use flow esp in from 10.75.0.0/16 to 172.22.1.0/24 peer 5.6.7.8 type use flow esp in from 10.75.0.0/16 to 192.168.0.0/16 peer 5.6.7.8 type use flow esp out from 10.21.0.0/16 to 10.75.0.0/16 peer 5.6.7.8 type require flow esp out from 172.22.1.0/24 to 10.75.0.0/16 peer 5.6.7.8 type require flow esp out from 192.168.0.0/16 to 10.75.0.0/16 peer 5.6.7.8 type require flow esp out from ::/0 to ::/0 type deny
SAD: esp tunnel from 1.2.3.4 to 5.6.7.8 spi 0x5c684cc6 enc aes-256-gcm esp tunnel from 5.6.7.8 to 1.2.3.4 spi 0x6e88e50f enc aes-256-gcm Now, when the second client connects: FLOWS: flow esp in from 10.75.0.0/16 to 10.21.0.0/16 peer 5.6.7.8 type use flow esp in from 10.75.0.0/16 to 172.22.1.0/24 peer 5.6.7.8 type use flow esp in from 10.75.0.0/16 to 192.168.0.0/16 peer 5.6.7.8 type use flow esp out from 10.21.0.0/16 to 10.75.0.0/16 peer 5.6.7.8 type require flow esp out from 172.22.1.0/24 to 10.75.0.0/16 peer 5.6.7.8 type require flow esp out from 192.168.0.0/16 to 10.75.0.0/16 peer 5.6.7.8 type require flow esp out from ::/0 to ::/0 type deny SAD: esp tunnel from 1.2.3.4 to 5.6.7.8 spi 0x7e6472b8 enc aes-256-gcm esp tunnel from 5.6.7.8 to 1.2.3.4 spi 0x8dd119e5 enc aes-256-gcm esp tunnel from 5.6.7.8 to 1.2.3.4 spi 0xb4a852b3 enc aes-256-gcm esp tunnel from 1.2.3.4 to 5.6.7.8 spi 0xb558afcc enc aes-256-gcm esp tunnel from 1.2.3.4 to 5.6.7.8 spi 0xc6147a48 enc aes-256-gcm esp tunnel from 5.6.7.8 to 1.2.3.4 spi 0xefc8b43d enc aes-256-gcm Additionally I found out that the connection only works when the public key of the client certificates lies under /etc/iked/pubkeys/fqdn/<CN> (Where <CN> is the common name in the client certificate) #-------------------------------- The complete log (iked -dvv) of both events #-------------------------------- Jul 15 11:06:43 server iked[77044]: set_policy_auth_method: using rsa for peer /etc/iked/pubkeys/fqdn/client1.example.com Jul 15 11:06:43 server iked[77044]: set_policy: found pubkey for /etc/iked/pubkeys/fqdn/client1.example.com Jul 15 11:06:43 server iked[77044]: set_policy: could not find pubkey for /etc/iked/pubkeys/fqdn/client2.example.com Jul 15 11:06:43 server iked[77044]: set_policy_auth_method: using rfc7427 for peer /etc/iked/pubkeys/fqdn/client2.example.com Jul 15 11:06:43 server iked[77044]: /etc/iked.conf: loaded 2 configuration rules Jul 15 11:06:43 server iked[77044]: ca_privkey_serialize: type RSA_KEY length 1192 Jul 15 11:06:43 server iked[77044]: ca_pubkey_serialize: type RSA_KEY length 270 Jul 15 11:06:43 server iked[36135]: ca_privkey_to_method: type RSA_KEY method RSA_SIG Jul 15 11:06:43 server iked[12701]: config_getpolicy: received policy Jul 15 11:06:43 server iked[36135]: ca_getkey: received private key type RSA_KEY length 1192 Jul 15 11:06:43 server iked[36135]: ca_getkey: received public key type RSA_KEY length 270 Jul 15 11:06:43 server iked[36135]: ca_dispatch_parent: config reset Jul 15 11:06:43 server iked[12701]: config_getpolicy: received policy Jul 15 11:06:43 server iked[12701]: config_getpfkey: received pfkey fd 3 Jul 15 11:06:43 server iked[12701]: config_getcompile: compilation done Jul 15 11:06:43 server iked[12701]: config_getsocket: received socket fd 4 Jul 15 11:06:43 server iked[12701]: config_getsocket: received socket fd 5 Jul 15 11:06:43 server iked[12701]: config_getsocket: received socket fd 6 Jul 15 11:06:43 server iked[12701]: config_getsocket: received socket fd 7 Jul 15 11:06:43 server iked[12701]: config_getmobike: mobike Jul 15 11:06:43 server iked[36135]: ca_reload: loaded ca file ca.crt Jul 15 11:06:43 server iked[36135]: ca_reload: loaded crl file ca.crl Jul 15 11:06:43 server iked[36135]: ca_reload: /C=DE/ST=Lower Saxony/L=Hanover/O=OpenBSD/OU=iked/CN=VPN CA 2019/[email protected] Jul 15 11:06:43 server iked[36135]: ca_reload: loaded 1 ca certificate Jul 15 11:06:43 server iked[36135]: ca_reload: loaded cert file 1.2.3.4.crt Jul 15 11:06:43 server iked[36135]: ca_validate_cert: /C=DE/ST=Lower Saxony/L=Hanover/O=OpenBSD/OU=iked/CN=1.2.3.4/[email protected] ok Jul 15 11:06:43 server iked[36135]: ca_reload: local cert type X509_CERT Jul 15 11:06:43 server iked[36135]: config_getocsp: ocsp_url none Jul 15 11:06:43 server iked[12701]: ikev2_dispatch_cert: updated local CERTREQ type X509_CERT length 20 Jul 15 11:06:43 server iked[12701]: ikev2_dispatch_cert: updated local CERTREQ type X509_CERT length 20 Jul 15 11:06:45 server iked[12701]: ikev2_recv: IKE_SA_INIT request from initiator 5.6.7.8:500 to 1.2.3.4:500 policy 'clientA' id 0, 544 bytes Jul 15 11:06:45 server iked[12701]: ikev2_recv: ispi 0x34e559c5289dff7c rspi 0x0000000000000000 Jul 15 11:06:45 server iked[12701]: ikev2_policy2id: srcid IPV4/1.2.3.4 length 8 Jul 15 11:06:45 server iked[12701]: ikev2_pld_parse: header ispi 0x34e559c5289dff7c rspi 0x0000000000000000 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 544 response 0 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48 Jul 15 11:06:45 server iked[12701]: ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0 xforms 4 spi 0 Jul 15 11:06:45 server iked[12701]: ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC Jul 15 11:06:45 server iked[12701]: ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 Jul 15 11:06:45 server iked[12701]: ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 Jul 15 11:06:45 server iked[12701]: ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 Jul 15 11:06:45 server iked[12701]: ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ke: dh group MODP_2048 reserved 0 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 52 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 8 Jul 15 11:06:45 server iked[12701]: ikev2_pld_notify: protoid NONE spisize 0 type FRAGMENTATION_SUPPORTED Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 Jul 15 11:06:45 server iked[12701]: ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP Jul 15 11:06:45 server iked[12701]: ikev2_nat_detection: peer source 0x34e559c5289dff7c 0x0000000000000000 5.6.7.8:500 Jul 15 11:06:45 server iked[12701]: ikev2_pld_notify: NAT_DETECTION_SOURCE_IP detected NAT, enabling UDP encapsulation Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload NOTIFY nextpayload VENDOR critical 0x00 length 28 Jul 15 11:06:45 server iked[12701]: ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP Jul 15 11:06:45 server iked[12701]: ikev2_nat_detection: peer destination 0x34e559c5289dff7c 0x0000000000000000 1.2.3.4:500 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload VENDOR nextpayload VENDOR critical 0x00 length 24 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload VENDOR nextpayload VENDOR critical 0x00 length 20 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload VENDOR nextpayload VENDOR critical 0x00 length 20 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload VENDOR nextpayload NONE critical 0x00 length 24 Jul 15 11:06:45 server iked[12701]: sa_state: INIT -> SA_INIT Jul 15 11:06:45 server iked[12701]: ikev2_sa_negotiate: score 4 Jul 15 11:06:45 server iked[12701]: sa_stateok: SA_INIT flags 0x0000, require 0x0000 Jul 15 11:06:45 server iked[12701]: sa_stateflags: 0x0000 -> 0x0020 sa (required 0x0000 ) Jul 15 11:06:45 server iked[12701]: ikev2_sa_keys: DHSECRET with 256 bytes Jul 15 11:06:45 server iked[12701]: ikev2_sa_keys: SKEYSEED with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_sa_keys: S with 96 bytes Jul 15 11:06:45 server iked[12701]: ikev2_prfplus: T1 with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_prfplus: T2 with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_prfplus: T3 with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_prfplus: T4 with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_prfplus: T5 with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_prfplus: T6 with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_prfplus: T7 with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_prfplus: Tn with 224 bytes Jul 15 11:06:45 server iked[12701]: ikev2_sa_keys: SK_d with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_sa_keys: SK_ai with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_sa_keys: SK_ar with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_sa_keys: SK_ei with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_sa_keys: SK_er with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_sa_keys: SK_pi with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_sa_keys: SK_pr with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_add_proposals: length 44 Jul 15 11:06:45 server iked[12701]: ikev2_next_payload: length 48 nextpayload KE Jul 15 11:06:45 server iked[12701]: ikev2_next_payload: length 264 nextpayload NONCE Jul 15 11:06:45 server iked[12701]: ikev2_next_payload: length 36 nextpayload NOTIFY Jul 15 11:06:45 server iked[12701]: ikev2_nat_detection: local source 0x34e559c5289dff7c 0x72d3506f27e53f52 1.2.3.4:500 Jul 15 11:06:45 server iked[12701]: ikev2_next_payload: length 28 nextpayload NOTIFY Jul 15 11:06:45 server iked[12701]: ikev2_nat_detection: local destination 0x34e559c5289dff7c 0x72d3506f27e53f52 5.6.7.8:500 Jul 15 11:06:45 server iked[12701]: ikev2_next_payload: length 28 nextpayload CERTREQ Jul 15 11:06:45 server iked[12701]: ikev2_add_certreq: type X509_CERT length 21 Jul 15 11:06:45 server iked[12701]: ikev2_next_payload: length 25 nextpayload CERTREQ Jul 15 11:06:45 server iked[12701]: ikev2_add_certreq: type RSA_KEY length 1 Jul 15 11:06:45 server iked[12701]: ikev2_next_payload: length 5 nextpayload NONE Jul 15 11:06:45 server iked[12701]: ikev2_pld_parse: header ispi 0x34e559c5289dff7c rspi 0x72d3506f27e53f52 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 462 response 1 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48 Jul 15 11:06:45 server iked[12701]: ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0 xforms 4 spi 0 Jul 15 11:06:45 server iked[12701]: ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC Jul 15 11:06:45 server iked[12701]: ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 Jul 15 11:06:45 server iked[12701]: ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 Jul 15 11:06:45 server iked[12701]: ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 Jul 15 11:06:45 server iked[12701]: ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ke: dh group MODP_2048 reserved 0 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 Jul 15 11:06:45 server iked[12701]: ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload NOTIFY nextpayload CERTREQ critical 0x00 length 28 Jul 15 11:06:45 server iked[12701]: ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload CERTREQ nextpayload CERTREQ critical 0x00 length 25 Jul 15 11:06:45 server iked[12701]: ikev2_pld_certreq: type X509_CERT length 20 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload CERTREQ nextpayload NONE critical 0x00 length 5 Jul 15 11:06:45 server iked[12701]: ikev2_pld_certreq: type RSA_KEY length 0 Jul 15 11:06:45 server iked[12701]: ikev2_msg_send: IKE_SA_INIT response from 1.2.3.4:500 to 5.6.7.8:500 msgid 0, 462 bytes Jul 15 11:06:45 server iked[12701]: config_free_proposals: free 0x159dea7c3200 Jul 15 11:06:45 server iked[12701]: ikev2_recv: IKE_AUTH request from initiator 5.6.7.8:4500 to 1.2.3.4:4500 policy 'clientA' id 1, 2624 bytes Jul 15 11:06:45 server iked[12701]: ikev2_recv: ispi 0x34e559c5289dff7c rspi 0x72d3506f27e53f52 Jul 15 11:06:45 server iked[12701]: ikev2_recv: updated SA to peer 5.6.7.8:4500 local 1.2.3.4:4500 Jul 15 11:06:45 server iked[12701]: ikev2_pld_parse: header ispi 0x34e559c5289dff7c rspi 0x72d3506f27e53f52 nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 2624 response 0 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 2596 Jul 15 11:06:45 server iked[12701]: ikev2_msg_decrypt: IV length 16 Jul 15 11:06:45 server iked[12701]: ikev2_msg_decrypt: encrypted payload length 2560 Jul 15 11:06:45 server iked[12701]: ikev2_msg_decrypt: integrity checksum length 16 Jul 15 11:06:45 server iked[12701]: ikev2_msg_decrypt: integrity check succeeded Jul 15 11:06:45 server iked[12701]: ikev2_msg_decrypt: decrypted payload length 2560/2560 padding 2 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload IDi nextpayload CERT critical 0x00 length 169 Jul 15 11:06:45 server iked[12701]: ikev2_pld_id: id ASN1_DN//C=DE/ST=Lower Saxony/L=Hanover/O=OpenBSD/OU=iked/CN=client1.example.com/[email protected] length 165 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload CERT nextpayload CERTREQ critical 0x00 length 1051 Jul 15 11:06:45 server iked[12701]: ikev2_pld_cert: type X509_CERT length 1046 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload CERTREQ nextpayload AUTH critical 0x00 length 865 Jul 15 11:06:45 server iked[12701]: ikev2_pld_certreq: type X509_CERT length 860 Jul 15 11:06:45 server iked[12701]: ikev2_policy2id: srcid IPV4/1.2.3.4 length 8 Jul 15 11:06:45 server iked[12701]: sa_stateflags: 0x0020 -> 0x0024 certreq,sa (required 0x0000 ) Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload AUTH nextpayload NOTIFY critical 0x00 length 264 Jul 15 11:06:45 server iked[12701]: ikev2_pld_auth: method RSA_SIG length 256 Jul 15 11:06:45 server iked[12701]: sa_state: SA_INIT -> AUTH_REQUEST Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload NOTIFY nextpayload CP critical 0x00 length 8 Jul 15 11:06:45 server iked[12701]: ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload CP nextpayload SA critical 0x00 length 36 Jul 15 11:06:45 server iked[12701]: ikev2_pld_cp: type REQUEST length 28 Jul 15 11:06:45 server iked[12701]: ikev2_pld_cp: INTERNAL_IP4_ADDRESS 0x0001 length 0 Jul 15 11:06:45 server iked[12701]: ikev2_pld_cp: INTERNAL_IP4_DNS 0x0003 length 0 Jul 15 11:06:45 server iked[12701]: ikev2_pld_cp: INTERNAL_IP4_NBNS 0x0004 length 0 Jul 15 11:06:45 server iked[12701]: ikev2_pld_cp: INTERNAL_IP4_SERVER 0x5ba0 length 0 Jul 15 11:06:45 server iked[12701]: ikev2_pld_cp: INTERNAL_IP6_ADDRESS 0x0008 length 0 Jul 15 11:06:45 server iked[12701]: ikev2_pld_cp: INTERNAL_IP6_DNS 0x000a length 0 Jul 15 11:06:45 server iked[12701]: ikev2_pld_cp: INTERNAL_IP6_SERVER 0x5ba1 length 0 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 36 Jul 15 11:06:45 server iked[12701]: ikev2_pld_sa: more 0 reserved 0 length 32 proposal #1 protoid ESP spisize 4 xforms 2 spi 0x8d09c5c0 Jul 15 11:06:45 server iked[12701]: ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16 Jul 15 11:06:45 server iked[12701]: ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 Jul 15 11:06:45 server iked[12701]: ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 64 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: count 2 length 56 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: type IPV6_ADDR_RANGE protoid 0 length 40 startport 0 endport 65535 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: start :: end ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 64 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: count 2 length 56 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: type IPV6_ADDR_RANGE protoid 0 length 40 startport 0 endport 65535 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: start :: end ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff Jul 15 11:06:45 server iked[12701]: sa_stateok: SA_INIT flags 0x0000, require 0x0000 Jul 15 11:06:45 server iked[12701]: policy_lookup: peerid '/C=DE/ST=Lower Saxony/L=Hanover/O=OpenBSD/OU=iked/CN=client1.example.com/[email protected]' Jul 15 11:06:45 server iked[12701]: ikev2_msg_auth: responder auth data length 542 Jul 15 11:06:45 server iked[12701]: ca_setauth: auth length 542 Jul 15 11:06:45 server iked[12701]: ikev2_msg_auth: initiator auth data length 608 Jul 15 11:06:45 server iked[12701]: ikev2_msg_authverify: method RSA_SIG keylen 1046 type X509_CERT Jul 15 11:06:45 server iked[12701]: ikev2_msg_authverify: authentication successful Jul 15 11:06:45 server iked[12701]: sa_state: AUTH_REQUEST -> AUTH_SUCCESS Jul 15 11:06:45 server iked[12701]: sa_stateflags: 0x0024 -> 0x0034 certreq,authvalid,sa (required 0x003b cert,certvalid,auth,authvalid,sa) Jul 15 11:06:45 server iked[12701]: ikev2_sa_negotiate: score 3 Jul 15 11:06:45 server iked[12701]: sa_stateflags: 0x0034 -> 0x0034 certreq,authvalid,sa (required 0x003b cert,certvalid,auth,authvalid,sa) Jul 15 11:06:45 server iked[12701]: sa_stateok: VALID flags 0x0030, require 0x003b cert,certvalid,auth,authvalid,sa Jul 15 11:06:45 server iked[12701]: sa_state: cannot switch: AUTH_SUCCESS -> VALID Jul 15 11:06:45 server iked[12701]: config_free_proposals: free 0x159d92bc5400 Jul 15 11:06:45 server iked[36135]: ca_getreq: found CA /C=DE/ST=Lower Saxony/L=Hanover/O=OpenBSD/OU=iked/CN=VPN CA 2019/[email protected] Jul 15 11:06:45 server iked[36135]: ca_x509_subjectaltname: IPV4/1.2.3.4 Jul 15 11:06:45 server iked[36135]: ca_getreq: found local certificate /C=DE/ST=Lower Saxony/L=Hanover/O=OpenBSD/OU=iked/CN=1.2.3.4/[email protected] Jul 15 11:06:45 server iked[36135]: ca_setauth: auth length 256 Jul 15 11:06:45 server iked[12701]: ikev2_getimsgdata: imsg 20 rspi 0x72d3506f27e53f52 ispi 0x34e559c5289dff7c initiator 0 sa valid type 4 data length 1004 Jul 15 11:06:45 server iked[12701]: ikev2_dispatch_cert: cert type X509_CERT length 1004, ok Jul 15 11:06:45 server iked[12701]: sa_stateflags: 0x0034 -> 0x0035 cert,certreq,authvalid,sa (required 0x003b cert,certvalid,auth,authvalid,sa) Jul 15 11:06:45 server iked[12701]: sa_stateok: VALID flags 0x0031, require 0x003b cert,certvalid,auth,authvalid,sa Jul 15 11:06:45 server iked[12701]: sa_state: cannot switch: AUTH_SUCCESS -> VALID Jul 15 11:06:45 server iked[12701]: ikev2_getimsgdata: imsg 25 rspi 0x72d3506f27e53f52 ispi 0x34e559c5289dff7c initiator 0 sa valid type 1 data length 256 Jul 15 11:06:45 server iked[12701]: ikev2_dispatch_cert: AUTH type 1 len 256 Jul 15 11:06:45 server iked[12701]: sa_stateflags: 0x0035 -> 0x003d cert,certreq,auth,authvalid,sa (required 0x003b cert,certvalid,auth,authvalid,sa) Jul 15 11:06:45 server iked[12701]: sa_stateok: VALID flags 0x0039, require 0x003b cert,certvalid,auth,authvalid,sa Jul 15 11:06:45 server iked[12701]: sa_state: cannot switch: AUTH_SUCCESS -> VALID Jul 15 11:06:45 server iked[36135]: ca_validate_pubkey: unsupported public key type ASN1_DN Jul 15 11:06:45 server iked[36135]: ca_validate_cert: /C=DE/ST=Lower Saxony/L=Hanover/O=OpenBSD/OU=iked/CN=client1.example.com/[email protected] ok Jul 15 11:06:45 server iked[12701]: ikev2_dispatch_cert: peer certificate is valid Jul 15 11:06:45 server iked[12701]: sa_stateflags: 0x003d -> 0x003f cert,certvalid,certreq,auth,authvalid,sa (required 0x003b cert,certvalid,auth,authvalid,sa) Jul 15 11:06:45 server iked[12701]: sa_stateok: VALID flags 0x003b, require 0x003b cert,certvalid,auth,authvalid,sa Jul 15 11:06:45 server iked[12701]: sa_state: AUTH_SUCCESS -> VALID Jul 15 11:06:45 server iked[12701]: sa_stateok: VALID flags 0x003b, require 0x003b cert,certvalid,auth,authvalid,sa Jul 15 11:06:45 server iked[12701]: sa_stateok: VALID flags 0x003b, require 0x003b cert,certvalid,auth,authvalid,sa Jul 15 11:06:45 server iked[12701]: ikev2_sa_tag: clientA-CN=client1.example.com (34) Jul 15 11:06:45 server iked[12701]: ikev2_childsa_negotiate: proposal 1 Jul 15 11:06:45 server iked[12701]: ikev2_childsa_negotiate: key material length 72 Jul 15 11:06:45 server iked[12701]: ikev2_prfplus: T1 with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_prfplus: T2 with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_prfplus: T3 with 32 bytes Jul 15 11:06:45 server iked[12701]: ikev2_prfplus: Tn with 96 bytes Jul 15 11:06:45 server iked[12701]: pfkey_sa_getspi: spi 0x7efacb39 Jul 15 11:06:45 server iked[12701]: pfkey_sa_init: new spi 0x7efacb39 Jul 15 11:06:45 server iked[12701]: ikev2_next_payload: length 12 nextpayload CERT Jul 15 11:06:45 server iked[12701]: ikev2_next_payload: length 1009 nextpayload AUTH Jul 15 11:06:45 server iked[12701]: ikev2_next_payload: length 264 nextpayload CP Jul 15 11:06:45 server iked[12701]: ikev2_next_payload: length 60 nextpayload NOTIFY Jul 15 11:06:45 server iked[12701]: ikev2_add_mobike: done Jul 15 11:06:45 server iked[12701]: ikev2_next_payload: length 8 nextpayload SA Jul 15 11:06:45 server iked[12701]: ikev2_add_proposals: length 32 Jul 15 11:06:45 server iked[12701]: ikev2_next_payload: length 36 nextpayload TSi Jul 15 11:06:45 server iked[12701]: ikev2_next_payload: length 56 nextpayload TSr Jul 15 11:06:45 server iked[12701]: ikev2_next_payload: length 56 nextpayload NONE Jul 15 11:06:45 server iked[12701]: ikev2_msg_encrypt: decrypted length 1501 Jul 15 11:06:45 server iked[12701]: ikev2_msg_encrypt: padded length 1504 Jul 15 11:06:45 server iked[12701]: ikev2_msg_encrypt: length 1502, padding 2, output length 1536 Jul 15 11:06:45 server iked[12701]: ikev2_next_payload: length 1540 nextpayload IDr Jul 15 11:06:45 server iked[12701]: ikev2_msg_integr: message length 1568 Jul 15 11:06:45 server iked[12701]: ikev2_msg_integr: integrity checksum length 16 Jul 15 11:06:45 server iked[12701]: ikev2_pld_parse: header ispi 0x34e559c5289dff7c rspi 0x72d3506f27e53f52 nextpayload SK version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 1568 response 1 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00 length 1540 Jul 15 11:06:45 server iked[12701]: ikev2_msg_decrypt: IV length 16 Jul 15 11:06:45 server iked[12701]: ikev2_msg_decrypt: encrypted payload length 1504 Jul 15 11:06:45 server iked[12701]: ikev2_msg_decrypt: integrity checksum length 16 Jul 15 11:06:45 server iked[12701]: ikev2_msg_decrypt: integrity check succeeded Jul 15 11:06:45 server iked[12701]: ikev2_msg_decrypt: decrypted payload length 1504/1504 padding 2 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload IDr nextpayload CERT critical 0x00 length 12 Jul 15 11:06:45 server iked[12701]: ikev2_pld_id: id IPV4/1.2.3.4 length 8 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload CERT nextpayload AUTH critical 0x00 length 1009 Jul 15 11:06:45 server iked[12701]: ikev2_pld_cert: type X509_CERT length 1004 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload AUTH nextpayload CP critical 0x00 length 264 Jul 15 11:06:45 server iked[12701]: ikev2_pld_auth: method RSA_SIG length 256 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload CP nextpayload NOTIFY critical 0x00 length 60 Jul 15 11:06:45 server iked[12701]: ikev2_pld_cp: type REPLY length 52 Jul 15 11:06:45 server iked[12701]: ikev2_pld_cp: INTERNAL_IP4_ADDRESS 0x0001 length 4 Jul 15 11:06:45 server iked[12701]: ikev2_pld_cp: INTERNAL_IP4_NETMASK 0x0002 length 4 Jul 15 11:06:45 server iked[12701]: ikev2_pld_cp: INTERNAL_IP4_DNS 0x0003 length 4 Jul 15 11:06:45 server last message repeated 2 times Jul 15 11:06:45 server iked[12701]: ikev2_pld_cp: INTERNAL_IP4_SUBNET 0x000d length 8 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA critical 0x00 length 8 Jul 15 11:06:45 server iked[12701]: ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 36 Jul 15 11:06:45 server iked[12701]: ikev2_pld_sa: more 0 reserved 0 length 32 proposal #1 protoid ESP spisize 4 xforms 2 spi 0x7efacb39 Jul 15 11:06:45 server iked[12701]: ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16 Jul 15 11:06:45 server iked[12701]: ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 Jul 15 11:06:45 server iked[12701]: ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 56 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: count 3 length 48 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: start 10.75.0.0 end 10.75.255.255 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: start 10.75.0.0 end 10.75.255.255 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: start 10.75.0.0 end 10.75.255.255 Jul 15 11:06:45 server iked[12701]: ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 56 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: count 3 length 48 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: start 10.21.0.0 end 10.21.255.255 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: start 192.168.0.0 end 192.168.255.255 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 Jul 15 11:06:45 server iked[12701]: ikev2_pld_ts: start 172.22.1.0 end 172.22.1.255 Jul 15 11:06:45 server iked[12701]: ikev2_msg_send: IKE_AUTH response from 1.2.3.4:4500 to 5.6.7.8:4500 msgid 1, 1568 bytes, NAT-T Jul 15 11:06:45 server iked[12701]: pfkey_sa_add: update spi 0x7efacb39 Jul 15 11:06:45 server iked[12701]: pfkey_sa: udpencap port 4500 Jul 15 11:06:45 server iked[12701]: ikev2_childsa_enable: loaded CHILD SA spi 0x7efacb39 Jul 15 11:06:45 server iked[12701]: pfkey_sa_add: add spi 0x8d09c5c0 Jul 15 11:06:45 server iked[12701]: pfkey_sa: udpencap port 4500 Jul 15 11:06:45 server iked[12701]: ikev2_childsa_enable: loaded CHILD SA spi 0x8d09c5c0 Jul 15 11:06:45 server iked[12701]: ikev2_childsa_enable: loaded flow 0x159d73b64400 Jul 15 11:06:45 server iked[12701]: ikev2_childsa_enable: loaded flow 0x159da9a0d800 Jul 15 11:06:45 server iked[12701]: ikev2_childsa_enable: loaded flow 0x159e392c1800 Jul 15 11:06:45 server iked[12701]: ikev2_childsa_enable: loaded flow 0x159e392c1c00 Jul 15 11:06:45 server iked[12701]: ikev2_childsa_enable: loaded flow 0x159da9a0c000 Jul 15 11:06:45 server iked[12701]: ikev2_childsa_enable: loaded flow 0x159d683de400 Jul 15 11:06:45 server iked[12701]: ikev2_childsa_enable: remember SA peer 5.6.7.8:4500 Jul 15 11:06:45 server iked[12701]: sa_state: VALID -> ESTABLISHED from 5.6.7.8:4500 to 1.2.3.4:4500 policy 'clientA' Jul 15 11:06:49 server iked[12701]: ikev2_recv: IKE_SA_INIT request from initiator 5.6.7.8:60 to 1.2.3.4:500 policy 'clientA' id 0, 544 bytes Jul 15 11:06:49 server iked[12701]: ikev2_recv: ispi 0x8a6401ca230f832f rspi 0x0000000000000000 Jul 15 11:06:49 server iked[12701]: ikev2_policy2id: srcid IPV4/1.2.3.4 length 8 Jul 15 11:06:49 server iked[12701]: ikev2_pld_parse: header ispi 0x8a6401ca230f832f rspi 0x0000000000000000 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 544 response 0 Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48 Jul 15 11:06:49 server iked[12701]: ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0 xforms 4 spi 0 Jul 15 11:06:49 server iked[12701]: ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC Jul 15 11:06:49 server iked[12701]: ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 Jul 15 11:06:49 server iked[12701]: ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 Jul 15 11:06:49 server iked[12701]: ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 Jul 15 11:06:49 server iked[12701]: ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048 Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 Jul 15 11:06:49 server iked[12701]: ikev2_pld_ke: dh group MODP_2048 reserved 0 Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 52 Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 8 Jul 15 11:06:49 server iked[12701]: ikev2_pld_notify: protoid NONE spisize 0 type FRAGMENTATION_SUPPORTED Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 Jul 15 11:06:49 server iked[12701]: ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP Jul 15 11:06:49 server iked[12701]: ikev2_nat_detection: peer source 0x8a6401ca230f832f 0x0000000000000000 5.6.7.8:60 Jul 15 11:06:49 server iked[12701]: ikev2_pld_notify: NAT_DETECTION_SOURCE_IP detected NAT, enabling UDP encapsulation Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload NOTIFY nextpayload VENDOR critical 0x00 length 28 Jul 15 11:06:49 server iked[12701]: ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP Jul 15 11:06:49 server iked[12701]: ikev2_nat_detection: peer destination 0x8a6401ca230f832f 0x0000000000000000 1.2.3.4:500 Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload VENDOR nextpayload VENDOR critical 0x00 length 24 Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload VENDOR nextpayload VENDOR critical 0x00 length 20 Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload VENDOR nextpayload VENDOR critical 0x00 length 20 Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload VENDOR nextpayload NONE critical 0x00 length 24 Jul 15 11:06:49 server iked[12701]: sa_state: INIT -> SA_INIT Jul 15 11:06:49 server iked[12701]: ikev2_sa_negotiate: score 4 Jul 15 11:06:49 server iked[12701]: sa_stateok: SA_INIT flags 0x0000, require 0x0000 Jul 15 11:06:49 server iked[12701]: sa_stateflags: 0x0000 -> 0x0020 sa (required 0x0000 ) Jul 15 11:06:49 server iked[12701]: ikev2_sa_keys: DHSECRET with 256 bytes Jul 15 11:06:49 server iked[12701]: ikev2_sa_keys: SKEYSEED with 32 bytes Jul 15 11:06:49 server iked[12701]: ikev2_sa_keys: S with 96 bytes Jul 15 11:06:49 server iked[12701]: ikev2_prfplus: T1 with 32 bytes Jul 15 11:06:49 server iked[12701]: ikev2_prfplus: T2 with 32 bytes Jul 15 11:06:49 server iked[12701]: ikev2_prfplus: T3 with 32 bytes Jul 15 11:06:49 server iked[12701]: ikev2_prfplus: T4 with 32 bytes Jul 15 11:06:49 server iked[12701]: ikev2_prfplus: T5 with 32 bytes Jul 15 11:06:49 server iked[12701]: ikev2_prfplus: T6 with 32 bytes Jul 15 11:06:49 server iked[12701]: ikev2_prfplus: T7 with 32 bytes Jul 15 11:06:49 server iked[12701]: ikev2_prfplus: Tn with 224 bytes Jul 15 11:06:49 server iked[12701]: ikev2_sa_keys: SK_d with 32 bytes Jul 15 11:06:49 server iked[12701]: ikev2_sa_keys: SK_ai with 32 bytes Jul 15 11:06:49 server iked[12701]: ikev2_sa_keys: SK_ar with 32 bytes Jul 15 11:06:49 server iked[12701]: ikev2_sa_keys: SK_ei with 32 bytes Jul 15 11:06:49 server iked[12701]: ikev2_sa_keys: SK_er with 32 bytes Jul 15 11:06:49 server iked[12701]: ikev2_sa_keys: SK_pi with 32 bytes Jul 15 11:06:49 server iked[12701]: ikev2_sa_keys: SK_pr with 32 bytes Jul 15 11:06:49 server iked[12701]: ikev2_add_proposals: length 44 Jul 15 11:06:49 server iked[12701]: ikev2_next_payload: length 48 nextpayload KE Jul 15 11:06:49 server iked[12701]: ikev2_next_payload: length 264 nextpayload NONCE Jul 15 11:06:49 server iked[12701]: ikev2_next_payload: length 36 nextpayload NOTIFY Jul 15 11:06:49 server iked[12701]: ikev2_nat_detection: local source 0x8a6401ca230f832f 0xfb7ec7c3268b8596 1.2.3.4:500 Jul 15 11:06:49 server iked[12701]: ikev2_next_payload: length 28 nextpayload NOTIFY Jul 15 11:06:49 server iked[12701]: ikev2_nat_detection: local destination 0x8a6401ca230f832f 0xfb7ec7c3268b8596 5.6.7.8:60 Jul 15 11:06:49 server iked[12701]: ikev2_next_payload: length 28 nextpayload CERTREQ Jul 15 11:06:49 server iked[12701]: ikev2_add_certreq: type X509_CERT length 21 Jul 15 11:06:49 server iked[12701]: ikev2_next_payload: length 25 nextpayload CERTREQ Jul 15 11:06:49 server iked[12701]: ikev2_add_certreq: type RSA_KEY length 1 Jul 15 11:06:49 server iked[12701]: ikev2_next_payload: length 5 nextpayload NONE Jul 15 11:06:49 server iked[12701]: ikev2_pld_parse: header ispi 0x8a6401ca230f832f rspi 0xfb7ec7c3268b8596 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 462 response 1 Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48 Jul 15 11:06:49 server iked[12701]: ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0 xforms 4 spi 0 Jul 15 11:06:49 server iked[12701]: ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC Jul 15 11:06:49 server iked[12701]: ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 Jul 15 11:06:49 server iked[12701]: ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 Jul 15 11:06:49 server iked[12701]: ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 Jul 15 11:06:49 server iked[12701]: ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048 Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 Jul 15 11:06:49 server iked[12701]: ikev2_pld_ke: dh group MODP_2048 reserved 0 Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36 Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 Jul 15 11:06:49 server iked[12701]: ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload NOTIFY nextpayload CERTREQ critical 0x00 length 28 Jul 15 11:06:49 server iked[12701]: ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload CERTREQ nextpayload CERTREQ critical 0x00 length 25 Jul 15 11:06:49 server iked[12701]: ikev2_pld_certreq: type X509_CERT length 20 Jul 15 11:06:49 server iked[12701]: ikev2_pld_payloads: payload CERTREQ nextpayload NONE critical 0x00 length 5 Jul 15 11:06:49 server iked[12701]: ikev2_pld_certreq: type RSA_KEY length 0 Jul 15 11:06:49 server iked[12701]: ikev2_msg_send: IKE_SA_INIT response from 1.2.3.4:500 to 5.6.7.8:60 msgid 0, 462 bytes Jul 15 11:06:49 server iked[12701]: config_free_proposals: free 0x159dea7c3280 Jul 15 11:06:50 server iked[12701]: ikev2_recv: IKE_AUTH request from initiator 5.6.7.8:1083 to 1.2.3.4:4500 policy 'clientA' id 1, 2464 bytes Jul 15 11:06:50 server iked[12701]: ikev2_recv: ispi 0x8a6401ca230f832f rspi 0xfb7ec7c3268b8596 Jul 15 11:06:50 server iked[12701]: ikev2_recv: updated SA to peer 5.6.7.8:1083 local 1.2.3.4:4500 Jul 15 11:06:50 server iked[12701]: ikev2_pld_parse: header ispi 0x8a6401ca230f832f rspi 0xfb7ec7c3268b8596 nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 2464 response 0 Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 2436 Jul 15 11:06:50 server iked[12701]: ikev2_msg_decrypt: IV length 16 Jul 15 11:06:50 server iked[12701]: ikev2_msg_decrypt: encrypted payload length 2400 Jul 15 11:06:50 server iked[12701]: ikev2_msg_decrypt: integrity checksum length 16 Jul 15 11:06:50 server iked[12701]: ikev2_msg_decrypt: integrity check succeeded Jul 15 11:06:50 server iked[12701]: ikev2_msg_decrypt: decrypted payload length 2400/2400 padding 2 Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload IDi nextpayload CERT critical 0x00 length 169 Jul 15 11:06:50 server iked[12701]: ikev2_pld_id: id ASN1_DN//C=DE/ST=Lower Saxony/L=Hanover/O=OpenBSD/OU=iked/CN=client2.example.com/[email protected] length 165 Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload CERT nextpayload CERTREQ critical 0x00 length 1051 Jul 15 11:06:50 server iked[12701]: ikev2_pld_cert: type X509_CERT length 1046 Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload CERTREQ nextpayload AUTH critical 0x00 length 705 Jul 15 11:06:50 server iked[12701]: ikev2_pld_certreq: type X509_CERT length 700 Jul 15 11:06:50 server iked[12701]: ikev2_policy2id: srcid IPV4/1.2.3.4 length 8 Jul 15 11:06:50 server iked[12701]: sa_stateflags: 0x0020 -> 0x0024 certreq,sa (required 0x0000 ) Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload AUTH nextpayload NOTIFY critical 0x00 length 264 Jul 15 11:06:50 server iked[12701]: ikev2_pld_auth: method RSA_SIG length 256 Jul 15 11:06:50 server iked[12701]: sa_state: SA_INIT -> AUTH_REQUEST Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload NOTIFY nextpayload CP critical 0x00 length 8 Jul 15 11:06:50 server iked[12701]: ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload CP nextpayload SA critical 0x00 length 36 Jul 15 11:06:50 server iked[12701]: ikev2_pld_cp: type REQUEST length 28 Jul 15 11:06:50 server iked[12701]: ikev2_pld_cp: INTERNAL_IP4_ADDRESS 0x0001 length 0 Jul 15 11:06:50 server iked[12701]: ikev2_pld_cp: INTERNAL_IP4_DNS 0x0003 length 0 Jul 15 11:06:50 server iked[12701]: ikev2_pld_cp: INTERNAL_IP4_NBNS 0x0004 length 0 Jul 15 11:06:50 server iked[12701]: ikev2_pld_cp: INTERNAL_IP4_SERVER 0x5ba0 length 0 Jul 15 11:06:50 server iked[12701]: ikev2_pld_cp: INTERNAL_IP6_ADDRESS 0x0008 length 0 Jul 15 11:06:50 server iked[12701]: ikev2_pld_cp: INTERNAL_IP6_DNS 0x000a length 0 Jul 15 11:06:50 server iked[12701]: ikev2_pld_cp: INTERNAL_IP6_SERVER 0x5ba1 length 0 Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 36 Jul 15 11:06:50 server iked[12701]: ikev2_pld_sa: more 0 reserved 0 length 32 proposal #1 protoid ESP spisize 4 xforms 2 spi 0x844224ca Jul 15 11:06:50 server iked[12701]: ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16 Jul 15 11:06:50 server iked[12701]: ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 Jul 15 11:06:50 server iked[12701]: ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 64 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: count 2 length 56 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: type IPV6_ADDR_RANGE protoid 0 length 40 startport 0 endport 65535 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: start :: end ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 64 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: count 2 length 56 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: start 0.0.0.0 end 255.255.255.255 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: type IPV6_ADDR_RANGE protoid 0 length 40 startport 0 endport 65535 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: start :: end ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff Jul 15 11:06:50 server iked[12701]: sa_stateok: SA_INIT flags 0x0000, require 0x0000 Jul 15 11:06:50 server iked[12701]: policy_lookup: peerid '/C=DE/ST=Lower Saxony/L=Hanover/O=OpenBSD/OU=iked/CN=client2.example.com/[email protected]' Jul 15 11:06:50 server iked[12701]: ikev2_msg_auth: responder auth data length 542 Jul 15 11:06:50 server iked[12701]: ca_setauth: auth length 542 Jul 15 11:06:50 server iked[12701]: ikev2_msg_auth: initiator auth data length 608 Jul 15 11:06:50 server iked[12701]: ikev2_msg_authverify: method RSA_SIG keylen 1046 type X509_CERT Jul 15 11:06:50 server iked[12701]: ikev2_msg_authverify: authentication successful Jul 15 11:06:50 server iked[12701]: sa_state: AUTH_REQUEST -> AUTH_SUCCESS Jul 15 11:06:50 server iked[12701]: sa_stateflags: 0x0024 -> 0x0034 certreq,authvalid,sa (required 0x003b cert,certvalid,auth,authvalid,sa) Jul 15 11:06:50 server iked[12701]: ikev2_sa_negotiate: score 3 Jul 15 11:06:50 server iked[12701]: sa_stateflags: 0x0034 -> 0x0034 certreq,authvalid,sa (required 0x003b cert,certvalid,auth,authvalid,sa) Jul 15 11:06:50 server iked[12701]: sa_stateok: VALID flags 0x0030, require 0x003b cert,certvalid,auth,authvalid,sa Jul 15 11:06:50 server iked[12701]: sa_state: cannot switch: AUTH_SUCCESS -> VALID Jul 15 11:06:50 server iked[12701]: config_free_proposals: free 0x159dea7c3880 Jul 15 11:06:50 server iked[36135]: ca_getreq: found CA /C=DE/ST=Lower Saxony/L=Hanover/O=OpenBSD/OU=iked/CN=VPN CA 2019/[email protected] Jul 15 11:06:50 server iked[36135]: ca_x509_subjectaltname: IPV4/1.2.3.4 Jul 15 11:06:50 server iked[36135]: ca_getreq: found local certificate /C=DE/ST=Lower Saxony/L=Hanover/O=OpenBSD/OU=iked/CN=1.2.3.4/[email protected] Jul 15 11:06:50 server iked[36135]: ca_setauth: auth length 256 Jul 15 11:06:50 server iked[12701]: ikev2_getimsgdata: imsg 20 rspi 0xfb7ec7c3268b8596 ispi 0x8a6401ca230f832f initiator 0 sa valid type 4 data length 1004 Jul 15 11:06:50 server iked[12701]: ikev2_dispatch_cert: cert type X509_CERT length 1004, ok Jul 15 11:06:50 server iked[12701]: sa_stateflags: 0x0034 -> 0x0035 cert,certreq,authvalid,sa (required 0x003b cert,certvalid,auth,authvalid,sa) Jul 15 11:06:50 server iked[12701]: sa_stateok: VALID flags 0x0031, require 0x003b cert,certvalid,auth,authvalid,sa Jul 15 11:06:50 server iked[12701]: sa_state: cannot switch: AUTH_SUCCESS -> VALID Jul 15 11:06:50 server iked[12701]: ikev2_getimsgdata: imsg 25 rspi 0xfb7ec7c3268b8596 ispi 0x8a6401ca230f832f initiator 0 sa valid type 1 data length 256 Jul 15 11:06:50 server iked[36135]: ca_validate_pubkey: unsupported public key type ASN1_DN Jul 15 11:06:50 server iked[12701]: ikev2_dispatch_cert: AUTH type 1 len 256 Jul 15 11:06:50 server iked[12701]: sa_stateflags: 0x0035 -> 0x003d cert,certreq,auth,authvalid,sa (required 0x003b cert,certvalid,auth,authvalid,sa) Jul 15 11:06:50 server iked[12701]: sa_stateok: VALID flags 0x0039, require 0x003b cert,certvalid,auth,authvalid,sa Jul 15 11:06:50 server iked[12701]: sa_state: cannot switch: AUTH_SUCCESS -> VALID Jul 15 11:06:50 server iked[36135]: ca_validate_cert: /C=DE/ST=Lower Saxony/L=Hanover/O=OpenBSD/OU=iked/CN=client2.example.com/[email protected] ok Jul 15 11:06:50 server iked[12701]: ikev2_dispatch_cert: peer certificate is valid Jul 15 11:06:50 server iked[12701]: sa_stateflags: 0x003d -> 0x003f cert,certvalid,certreq,auth,authvalid,sa (required 0x003b cert,certvalid,auth,authvalid,sa) Jul 15 11:06:50 server iked[12701]: sa_stateok: VALID flags 0x003b, require 0x003b cert,certvalid,auth,authvalid,sa Jul 15 11:06:50 server iked[12701]: sa_state: AUTH_SUCCESS -> VALID Jul 15 11:06:50 server iked[12701]: sa_stateok: VALID flags 0x003b, require 0x003b cert,certvalid,auth,authvalid,sa Jul 15 11:06:50 server iked[12701]: sa_stateok: VALID flags 0x003b, require 0x003b cert,certvalid,auth,authvalid,sa Jul 15 11:06:50 server iked[12701]: ikev2_sa_tag: clientA-CN=client2.example.com (34) Jul 15 11:06:50 server iked[12701]: ikev2_childsa_negotiate: proposal 1 Jul 15 11:06:50 server iked[12701]: ikev2_childsa_negotiate: key material length 72 Jul 15 11:06:50 server iked[12701]: ikev2_prfplus: T1 with 32 bytes Jul 15 11:06:50 server iked[12701]: ikev2_prfplus: T2 with 32 bytes Jul 15 11:06:50 server iked[12701]: ikev2_prfplus: T3 with 32 bytes Jul 15 11:06:50 server iked[12701]: ikev2_prfplus: Tn with 96 bytes Jul 15 11:06:50 server iked[12701]: pfkey_sa_getspi: spi 0xf999bff1 Jul 15 11:06:50 server iked[12701]: pfkey_sa_init: new spi 0xf999bff1 Jul 15 11:06:50 server iked[12701]: ikev2_next_payload: length 12 nextpayload CERT Jul 15 11:06:50 server iked[12701]: ikev2_next_payload: length 1009 nextpayload AUTH Jul 15 11:06:50 server iked[12701]: ikev2_next_payload: length 264 nextpayload CP Jul 15 11:06:50 server iked[12701]: ikev2_next_payload: length 60 nextpayload NOTIFY Jul 15 11:06:50 server iked[12701]: ikev2_add_mobike: done Jul 15 11:06:50 server iked[12701]: ikev2_next_payload: length 8 nextpayload SA Jul 15 11:06:50 server iked[12701]: ikev2_add_proposals: length 32 Jul 15 11:06:50 server iked[12701]: ikev2_next_payload: length 36 nextpayload TSi Jul 15 11:06:50 server iked[12701]: ikev2_next_payload: length 56 nextpayload TSr Jul 15 11:06:50 server iked[12701]: ikev2_next_payload: length 56 nextpayload NONE Jul 15 11:06:50 server iked[12701]: ikev2_msg_encrypt: decrypted length 1501 Jul 15 11:06:50 server iked[12701]: ikev2_msg_encrypt: padded length 1504 Jul 15 11:06:50 server iked[12701]: ikev2_msg_encrypt: length 1502, padding 2, output length 1536 Jul 15 11:06:50 server iked[12701]: ikev2_next_payload: length 1540 nextpayload IDr Jul 15 11:06:50 server iked[12701]: ikev2_msg_integr: message length 1568 Jul 15 11:06:50 server iked[12701]: ikev2_msg_integr: integrity checksum length 16 Jul 15 11:06:50 server iked[12701]: ikev2_pld_parse: header ispi 0x8a6401ca230f832f rspi 0xfb7ec7c3268b8596 nextpayload SK version 0x20 exchange IKE_AUTH flags 0x20 msgid 1 length 1568 response 1 Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: payload SK nextpayload IDr critical 0x00 length 1540 Jul 15 11:06:50 server iked[12701]: ikev2_msg_decrypt: IV length 16 Jul 15 11:06:50 server iked[12701]: ikev2_msg_decrypt: encrypted payload length 1504 Jul 15 11:06:50 server iked[12701]: ikev2_msg_decrypt: integrity checksum length 16 Jul 15 11:06:50 server iked[12701]: ikev2_msg_decrypt: integrity check succeeded Jul 15 11:06:50 server iked[12701]: ikev2_msg_decrypt: decrypted payload length 1504/1504 padding 2 Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload IDr nextpayload CERT critical 0x00 length 12 Jul 15 11:06:50 server iked[12701]: ikev2_pld_id: id IPV4/1.2.3.4 length 8 Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload CERT nextpayload AUTH critical 0x00 length 1009 Jul 15 11:06:50 server iked[12701]: ikev2_pld_cert: type X509_CERT length 1004 Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload AUTH nextpayload CP critical 0x00 length 264 Jul 15 11:06:50 server iked[12701]: ikev2_pld_auth: method RSA_SIG length 256 Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload CP nextpayload NOTIFY critical 0x00 length 60 Jul 15 11:06:50 server iked[12701]: ikev2_pld_cp: type REPLY length 52 Jul 15 11:06:50 server iked[12701]: ikev2_pld_cp: INTERNAL_IP4_ADDRESS 0x0001 length 4 Jul 15 11:06:50 server iked[12701]: ikev2_pld_cp: INTERNAL_IP4_NETMASK 0x0002 length 4 Jul 15 11:06:50 server iked[12701]: ikev2_pld_cp: INTERNAL_IP4_DNS 0x0003 length 4 Jul 15 11:06:50 server last message repeated 2 times Jul 15 11:06:50 server iked[12701]: ikev2_pld_cp: INTERNAL_IP4_SUBNET 0x000d length 8 Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload NOTIFY nextpayload SA critical 0x00 length 8 Jul 15 11:06:50 server iked[12701]: ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 36 Jul 15 11:06:50 server iked[12701]: ikev2_pld_sa: more 0 reserved 0 length 32 proposal #1 protoid ESP spisize 4 xforms 2 spi 0xf999bff1 Jul 15 11:06:50 server iked[12701]: ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16 Jul 15 11:06:50 server iked[12701]: ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 Jul 15 11:06:50 server iked[12701]: ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 56 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: count 3 length 48 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: start 10.75.0.0 end 10.75.255.255 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: start 10.75.0.0 end 10.75.255.255 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: start 10.75.0.0 end 10.75.255.255 Jul 15 11:06:50 server iked[12701]: ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 56 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: count 3 length 48 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: start 10.21.0.0 end 10.21.255.255 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: start 192.168.0.0 end 192.168.255.255 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 Jul 15 11:06:50 server iked[12701]: ikev2_pld_ts: start 172.22.1.0 end 172.22.1.255 Jul 15 11:06:50 server iked[12701]: ikev2_msg_send: IKE_AUTH response from 1.2.3.4:4500 to 5.6.7.8:1083 msgid 1, 1568 bytes, NAT-T Jul 15 11:06:50 server iked[12701]: pfkey_sa_add: update spi 0xf999bff1 Jul 15 11:06:50 server iked[12701]: pfkey_sa: udpencap port 1083 Jul 15 11:06:50 server iked[12701]: ikev2_childsa_enable: loaded CHILD SA spi 0xf999bff1 Jul 15 11:06:50 server iked[12701]: pfkey_sa_add: add spi 0x844224ca Jul 15 11:06:50 server iked[12701]: pfkey_sa: udpencap port 1083 Jul 15 11:06:50 server iked[12701]: ikev2_childsa_enable: loaded CHILD SA spi 0x844224ca Jul 15 11:06:50 server iked[12701]: ikev2_childsa_enable: replaced old flow 0x159d73b64400 with 0x159e392c1400 Jul 15 11:06:50 server iked[12701]: ikev2_childsa_enable: loaded flow 0x159e392c1400 Jul 15 11:06:50 server iked[12701]: ikev2_childsa_enable: replaced old flow 0x159da9a0d800 with 0x159e00d70c00 Jul 15 11:06:50 server iked[12701]: ikev2_childsa_enable: loaded flow 0x159e00d70c00 Jul 15 11:06:50 server iked[12701]: ikev2_childsa_enable: replaced old flow 0x159e392c1800 with 0x159e00d70800 Jul 15 11:06:50 server iked[12701]: ikev2_childsa_enable: loaded flow 0x159e00d70800 Jul 15 11:06:50 server iked[12701]: ikev2_childsa_enable: replaced old flow 0x159e392c1c00 with 0x159e35526400 Jul 15 11:06:50 server iked[12701]: ikev2_childsa_enable: loaded flow 0x159e35526400 Jul 15 11:06:50 server iked[12701]: ikev2_childsa_enable: replaced old flow 0x159da9a0c000 with 0x159e00d70000 Jul 15 11:06:50 server iked[12701]: ikev2_childsa_enable: loaded flow 0x159e00d70000 Jul 15 11:06:50 server iked[12701]: ikev2_childsa_enable: replaced old flow 0x159d683de400 with 0x159e35526c00 Jul 15 11:06:50 server iked[12701]: ikev2_childsa_enable: loaded flow 0x159e35526c00 Jul 15 11:06:50 server iked[12701]: ikev2_childsa_enable: remember SA peer 5.6.7.8:1083 Jul 15 11:06:50 server iked[12701]: sa_state: VALID -> ESTABLISHED from 5.6.7.8:1083 to 1.2.3.4:4500 policy 'clientA'

