Hmm, I tried your configuration and I get the same behaviour with strongswan. I don't have an iPhone to test. I tried playing around with the settings switching from x509 to PSK, changing strongswan knobs, always with the same result. I can connect to other strongswan responders using this same client. Do you have other special settings in other strongswan config files? Do you have any special pf rules? I run with pf disabled for these tests. I don't think running pf is required to establish a tunnel.
Best regards, Jona On Apr 20, 2020, 16:02, at 16:02, R0me0 *** <[email protected]> wrote: >Ajust as your necessity * > >( Don't forget to adjust your pf rules accordingly ) * > > > >OpenBSD 6.X ( Works with IPHONE AND STRONGSWAN ) > >ikev2 "roadwarrior" passive esp from 0.0.0.0/0 to 10.20.30.0/24 \ > local egress peer any \ > ikesa enc aes-256 auth hmac-sha2-256 group modp2048 \ > childsa enc aes-256 auth hmac-sha2-256 group modp2048 \ > dstid [email protected] psk "psk_passphrase" config address 10.20.30.32 > > > >Iphone = just disable certificates and set psk > > >Interoperability with StrongSwan > > ># cat /etc/ipsec.conf > > ipsec.conf – strongSwan IPsec configuration file ># basic configuration > >config setup > >conn %default >ikelifetime=60m >keylife=20m >rekeymargin=3m >keyingtries=1 >keyexchange=ikev2 >authby=secret >ike=aes256-sha256-modp2048! >esp=aes256-sha256-modp2048! > >conn strongswan >left=%any >leftfirewall=yes >leftsourceip=%config >right=REMOTE_PEER_IP >rightid=puffymagic.ikedvpn.com >rightsubnet=192.168.0.0/24,172.8.50.0/24 ( networks you want access on >other side ) ( behind magic puffer fish ) >auto=add > > > ># cat /etc/ipsec.secrets > ># ipsec.secrets – strongSwan IPsec secrets file >: PSK “strongopeniked” > > > >PS: Magic Puffer Fish Rock! > >Em seg., 20 de abr. de 2020 às 09:49, Jona Joachim <[email protected]> >escreveu: > >> Hi, >> >> I am trying to connect to iked running on OpenBSD 6.6 from a >strongSwan >> 5.7.2 initiator running on Ubuntu 19.10 (which is behind NAT). I am >> using x509 certificates generated by ikectl. >> >> The tunnel cannot be established. It is hard for me to see what's >going >> on. strongswan seems to be sending the same IKE_AUTH packet again and >> again and iked does not seem to respond even though it receives the >> packet and does not show an error. The only thing fishy I see in iked >> output is "sa_state: cannot switch: AUTH_SUCCESS -> VALID", not sure >why >> it "cannot switch". >> >> Does anybody have a working setup between iked and strongSwan or any >> insights? Config files and logs below. >> >> Thanks, >> >> Jona >> >> >> iked.conf: >> >> ikev2 passive esp \ >> from 0.0.0.0/0 to 10.201.201.0/24 \ >> from 192.168.0.0/16 to 10.244.244.0/24 \ >> from 10.244.244.0/24 to 192.168.0.0/16 \ >> local 1.2.3.4 peer any \ >> srcid vpn.example.com \ >> config address 10.201.201.0/24 \ >> config name-server 10.201.201.1 \ >> tag "IKED" >> >> >> ipsec.conf (strongSwan): >> >> config setup >> # strictcrlpolicy=yes >> # uniqueids = no >> >> conn puffvpn >> keyexchange=ikev2 >> dpddelay=5s >> dpdtimeout=60s >> dpdaction=restart >> >> left=%defaultroute >> leftcert=wookie.crt >> leftsubnet=192.168.0.0/16 >> leftfirewall=yes >> leftid="wookie" >> >> right=vpn.example.com >> rightsubnet=10.201.201.0/24 >> rightid="vpn.example.com" >> >> auto=start >> >> strongswan log: >> >> # ipsec up puffvpn >> initiating IKE_SA puffvpn[5] to 1.2.3.4 >> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) >> N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ] >> sending packet: from 192.168.4.103[500] to 1.2.3.4[500] (928 bytes) >> received packet: from 1.2.3.4[500] to 192.168.4.103[500] (38 bytes) >> parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ] >> peer didn't accept DH group ECP_256, it requested MODP_2048 >> initiating IKE_SA puffvpn[5] to 1.2.3.4 >> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) >> N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ] >> sending packet: from 192.168.4.103[500] to 1.2.3.4[500] (1120 bytes) >> retransmit 1 of request with message ID 0 >> sending packet: from 192.168.4.103[500] to 1.2.3.4[500] (1120 bytes) >> retransmit 2 of request with message ID 0 >> sending packet: from 192.168.4.103[500] to 1.2.3.4[500] (1120 bytes) >> received packet: from 1.2.3.4[500] to 192.168.4.103[500] (471 bytes) >> parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) >> CERTREQ N(HASH_ALG) ] >> selected proposal: >> IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048 >> local host is behind NAT, sending keep alives >> received 1 cert requests for an unknown ca >> sending cert request for "CN=35.180.187.116" >> sending cert request for "C=FR, ST=Ile-de-France, L=Paris, O=OpenBSD, >> OU=iked, CN=VPN CA, [email protected]" >> authentication of 'wookie' (myself) with RSA_EMSA_PKCS1_SHA2_256 >successful >> sending end entity cert "C=FR, ST=Ile-de-France, L=Paris, O=puffvpn, >> OU=iked, CN=wookie, [email protected]" >> establishing CHILD_SA puffvpn{7} >> generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr >> AUTH SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(EAP_ONLY) >N(MSG_ID_SYN_SUP) ] >> sending packet: from 192.168.4.103[4500] to 1.2.3.4[4500] (1568 >bytes) >> retransmit 1 of request with message ID 1 >> sending packet: from 192.168.4.103[4500] to 1.2.3.4[4500] (1568 >bytes) >> retransmit 2 of request with message ID 1 >> sending packet: from 192.168.4.103[4500] to 1.2.3.4[4500] (1568 >bytes) >> retransmit 3 of request with message ID 1 >> sending packet: from 192.168.4.103[4500] to 1.2.3.4[4500] (1568 >bytes) >> sending keep alive to 1.2.3.4[4500] >> retransmit 4 of request with message ID 1 >> sending packet: from 192.168.4.103[4500] to 1.2.3.4[4500] (1568 >bytes) >> sending keep alive to 1.2.3.4[4500] >> sending keep alive to 1.2.3.4[4500] >> retransmit 5 of request with message ID 1 >> sending packet: from 192.168.4.103[4500] to 1.2.3.4[4500] (1568 >bytes) >> sending keep alive to 1.2.3.4[4500] >> sending keep alive to 1.2.3.4[4500] >> sending keep alive to 1.2.3.4[4500] >> giving up after 5 retransmits >> peer not responding, trying again (2/3) >> establishing connection 'puffvpn' failed >> >> iked log: >> >> # iked -dvv >> ikev2 "policy1" passive esp inet from 10.244.244.0/24 to >192.168.0.0/16 >> from 0.0.0.0/0 to 10.201.201.0/24 from 192.168.0.0/16 to >10.244.244.0/24 >> loc >> al 1.2.3.4 peer any ikesa enc aes-256,aes-192,aes-128,3des prf >> hmac-sha2-256,hmac-sha1 auth hmac-sha2-256,hmac-sha1 group >> modp2048,modp1536,modp >> 1024 childsa enc aes-256,aes-192,aes-128 auth hmac-sha2-256,hmac-sha1 >> srcid vpn.example.com lifetime 10800 bytes 536870912 signature config >> address 1 >> 0.201.201.0 config name-server 10.201.201.1 tag "IKED" >> /etc/iked.conf: loaded 1 configuration rules >> ca_privkey_serialize: type RSA_KEY length 1192 >> ca_pubkey_serialize: type RSA_KEY length 270 >> ca_privkey_to_method: type RSA_KEY method RSA_SIG >> ca_getkey: received private key type RSA_KEY length 1192 >> ca_getkey: received public key type RSA_KEY length 270 >> ca_dispatch_parent: config reset >> ca_reload: loaded ca file ca.crt >> ca_reload: loaded crl file ca.crl >> ca_reload: >> >> >/C=FR/ST=Ile-de-France/L=Paris/O=puffvpn/OU=iked/CN=IKECA/[email protected] >> ca_reload: loaded 1 ca certificate >> ca_reload: loaded cert file vpn.example.com.crt >> ca_reload: loaded cert file wookie.crt >> ca_validate_cert: >> /C=FR/ST=Ile-de-France/L=Paris/O=puffvpn/OU=iked/CN= >> vpn.example.com/[email protected] >> ok >> ca_validate_cert: >> >> >/C=FR/ST=Ile-de-France/L=Paris/O=puffvpn/OU=iked/CN=wookie/[email protected] >> ok >> ca_reload: local cert type X509_CERT >> config_getocsp: ocsp_url none >> ikev2_dispatch_cert: updated local CERTREQ type X509_CERT length 20 >> ikev2_dispatch_cert: updated local CERTREQ type X509_CERT length 20 >> config_getpolicy: received policy >> config_getpfkey: received pfkey fd 3 >> config_getcompile: compilation done >> config_getsocket: received socket fd 4 >> config_getsocket: received socket fd 5 >> config_getsocket: received socket fd 6 >> config_getsocket: received socket fd 7 >> config_getmobike: mobike >> config_getfragmentation: no fragmentation >> spi=0x35fb3f73a0a70b49: recv IKE_SA_INIT req 0 peer 5.6.7.8:52409 >local >> 1.2.3.4:500, 928 bytes, policy 'policy1' >> ikev2_recv: ispi 0x35fb3f73a0a70b49 rspi 0x0000000000000000 >> ikev2_policy2id: srcid FQDN/vpn.example.com length 18 >> ikev2_pld_parse: header ispi 0x35fb3f73a0a70b49 rspi >0x0000000000000000 >> nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 >length >> 9 >> 28 response 0 >> ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length >704 >> ikev2_pld_sa: more 2 reserved 0 length 324 proposal #1 protoid IKE >> spisize 0 xforms 35 spi 0 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id >CAMELLIA_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id >CAMELLIA_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id >CAMELLIA_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >> HMAC_SHA2_256_128 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >> HMAC_SHA2_384_192 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >> HMAC_SHA2_512_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >AES_XCBC_96 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >AES_CMAC_96 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >HMAC_SHA1_96 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_XCBC >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_CMAC >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_384 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_512 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_521 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P256R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P384R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P512R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id CURVE25519 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id <UNKNOWN:32> >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_3072 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_4096 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_6144 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_8192 >> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048 >> ikev2_pld_sa: more 0 reserved 0 length 376 proposal #2 protoid IKE >> spisize 0 xforms 37 spi 0 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_XCBC >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_CMAC >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_384 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_512 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_521 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P256R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P384R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P512R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id CURVE25519 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id <UNKNOWN:32> >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_3072 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_4096 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_6144 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_8192 >> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048 >> ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length >72 >> ikev2_pld_ke: dh group ECP_256 reserved 0 >> ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 >length >> 36 >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >> length 28 >> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP >> ikev2_nat_detection: peer source 0x35fb3f73a0a70b49 >0x0000000000000000 >> 5.6.7.8:52409 >> ikev2_pld_notify: NAT_DETECTION_SOURCE_IP detected NAT >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >> length 28 >> ikev2_pld_notify: protoid NONE spisize 0 type >NAT_DETECTION_DESTINATION_IP >> ikev2_nat_detection: peer destination 0x35fb3f73a0a70b49 >> 0x0000000000000000 1.2.3.4:500 >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >length >> 8 >> ikev2_pld_notify: protoid NONE spisize 0 type FRAGMENTATION_SUPPORTED >> ikev2_pld_notify: fragmentation disabled >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >> length 16 >> ikev2_pld_notify: protoid NONE spisize 0 type >SIGNATURE_HASH_ALGORITHMS >> ikev2_pld_notify: signature hash SHA2_256 (2) >> ikev2_pld_notify: signature hash SHA2_384 (3) >> ikev2_pld_notify: signature hash SHA2_512 (4) >> ikev2_pld_notify: signature hash <UNKNOWN:5> (5) >> ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 >length 8 >> ikev2_pld_notify: protoid NONE spisize 0 type REDIRECT_SUPPORTED >> sa_state: INIT -> SA_INIT >> ikev2_sa_negotiate: score 4 >> ikev2_sa_negotiate: score 0 >> sa_stateok: SA_INIT flags 0x0000, require 0x0000 >> sa_stateflags: 0x0000 -> 0x0020 sa (required 0x0000 ) >> spi=0x35fb3f73a0a70b49: ikev2_sa_responder_dh: want dh MODP_2048, KE >has >> ECP_256 >> spi=0x35fb3f73a0a70b49: ikev2_resp_recv: failed to negotiate IKE SA >> spi=0x35fb3f73a0a70b49: ikev2_add_error: INVALID_KE_PAYLOAD >> ikev2_add_error: done >> ikev2_next_payload: length 10 nextpayload NONE >> ikev2_pld_parse: header ispi 0x35fb3f73a0a70b49 rspi >0x56bdae3b5afb6def >> nextpayload NOTIFY version 0x20 exchange IKE_SA_INIT flags 0x20 msgid >0 >> leng >> th 38 response 1 >> ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 >length 10 >> ikev2_pld_notify: protoid NONE spisize 0 type INVALID_KE_PAYLOAD >> spi=0x35fb3f73a0a70b49: send IKE_SA_INIT res 0 peer 5.6.7.8:52409 >local >> 1.2.3.4:500, 38 bytes >> spi=0x35fb3f73a0a70b49: sa_state: SA_INIT -> CLOSED from any to any >> policy 'policy1' >> config_free_proposals: free 0x29c15330b80 >> config_free_proposals: free 0x29bd54c0d00 >> spi=0x35fb3f73a0a70b49: recv IKE_SA_INIT req 0 peer 5.6.7.8:52409 >local >> 1.2.3.4:500, 1120 bytes, policy 'policy1' >> ikev2_recv: ispi 0x35fb3f73a0a70b49 rspi 0x0000000000000000 >> sa_free: ispi 0x35fb3f73a0a70b49 rspi 0x56bdae3b5afb6def >> config_free_proposals: free 0x29bff353800 >> ikev2_policy2id: srcid FQDN/vpn.example.com length 18 >> ikev2_pld_parse: header ispi 0x35fb3f73a0a70b49 rspi >0x0000000000000000 >> nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 >length >> 1 >> 120 response 0 >> ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length >704 >> ikev2_pld_sa: more 2 reserved 0 length 324 proposal #1 protoid IKE >> spisize 0 xforms 35 spi 0 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id >CAMELLIA_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id >CAMELLIA_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id >CAMELLIA_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >> HMAC_SHA2_256_128 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >> HMAC_SHA2_384_192 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >> HMAC_SHA2_512_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >AES_XCBC_96 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >AES_CMAC_96 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >HMAC_SHA1_96 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_XCBC >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_CMAC >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_384 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_512 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_2048 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_521 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P256R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P384R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P512R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id CURVE25519 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id <UNKNOWN:32> >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_3072 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_4096 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_6144 >> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_8192 >> ikev2_pld_sa: more 0 reserved 0 length 376 proposal #2 protoid IKE >> spisize 0 xforms 37 spi 0 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_XCBC >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_CMAC >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_384 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_512 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_2048 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_521 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P256R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P384R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P512R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id CURVE25519 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id <UNKNOWN:32> >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_3072 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_4096 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_6144 >> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_8192 >> ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length >264 >> ikev2_pld_ke: dh group MODP_2048 reserved 0 >> ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 >length >> 36 >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >> length 28 >> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP >> ikev2_nat_detection: peer source 0x35fb3f73a0a70b49 >0x0000000000000000 >> 5.6.7.8:52409 >> ikev2_pld_notify: NAT_DETECTION_SOURCE_IP detected NAT >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >> length 28 >> ikev2_pld_notify: protoid NONE spisize 0 type >NAT_DETECTION_DESTINATION_IP >> ikev2_nat_detection: peer destination 0x35fb3f73a0a70b49 >> 0x0000000000000000 1.2.3.4:500 >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >length >> 8 >> ikev2_pld_notify: protoid NONE spisize 0 type FRAGMENTATION_SUPPORTED >> ikev2_pld_notify: fragmentation disabled >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >> length 16 >> ikev2_pld_notify: protoid NONE spisize 0 type >SIGNATURE_HASH_ALGORITHMS >> ikev2_pld_notify: signature hash SHA2_256 (2) >> ikev2_pld_notify: signature hash SHA2_384 (3) >> ikev2_pld_notify: signature hash SHA2_512 (4) >> ikev2_pld_notify: signature hash <UNKNOWN:5> (5) >> ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 >length 8 >> ikev2_pld_notify: protoid NONE spisize 0 type REDIRECT_SUPPORTED >> sa_state: INIT -> SA_INIT >> ikev2_sa_negotiate: score 4 >> ikev2_sa_negotiate: score 0 >> sa_stateok: SA_INIT flags 0x0000, require 0x0000 >> sa_stateflags: 0x0000 -> 0x0020 sa (required 0x0000 ) >> spi=0x35fb3f73a0a70b49: ikev2_sa_keys: DHSECRET with 256 bytes >> ikev2_sa_keys: SKEYSEED with 32 bytes >> spi=0x35fb3f73a0a70b49: ikev2_sa_keys: S with 80 bytes >> ikev2_prfplus: T1 with 32 bytes >> ikev2_prfplus: T2 with 32 bytes >> ikev2_prfplus: T3 with 32 bytes >> ikev2_prfplus: T4 with 32 bytes >> ikev2_prfplus: T5 with 32 bytes >> ikev2_prfplus: T6 with 32 bytes >> ikev2_prfplus: T7 with 32 bytes >> ikev2_prfplus: Tn with 224 bytes >> ikev2_sa_keys: SK_d with 32 bytes >> ikev2_sa_keys: SK_ai with 32 bytes >> ikev2_sa_keys: SK_ar with 32 bytes >> ikev2_sa_keys: SK_ei with 32 bytes >> ikev2_sa_keys: SK_er with 32 bytes >> ikev2_sa_keys: SK_pi with 32 bytes >> ikev2_sa_keys: SK_pr with 32 bytes >> ikev2_resp_ike_sa_init: detected NAT, enabling UDP encapsulation >> ikev2_add_proposals: length 44 >> ikev2_next_payload: length 48 nextpayload KE >> ikev2_next_payload: length 264 nextpayload NONCE >> ikev2_next_payload: length 36 nextpayload NOTIFY >> ikev2_nat_detection: local source 0x35fb3f73a0a70b49 >0x5537f74b17c41bce >> 1.2.3.4:500 >> ikev2_next_payload: length 28 nextpayload NOTIFY >> ikev2_nat_detection: local destination 0x35fb3f73a0a70b49 >> 0x5537f74b17c41bce 5.6.7.8:52409 >> ikev2_next_payload: length 28 nextpayload CERTREQ >> ikev2_add_certreq: type X509_CERT length 21 >> ikev2_next_payload: length 25 nextpayload NOTIFY >> ikev2_next_payload: length 14 nextpayload NONE >> ikev2_pld_parse: header ispi 0x35fb3f73a0a70b49 rspi >0x5537f74b17c41bce >> nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 >length >> 4 >> 71 response 1 >> ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48 >> ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE >> spisize 0 xforms 4 spi 0 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >> HMAC_SHA2_256_128 >> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048 >> ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length >264 >> ikev2_pld_ke: dh group MODP_2048 reserved 0 >> ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 >length >> 36 >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >> length 28 >> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP >> ikev2_pld_payloads: payload NOTIFY nextpayload CERTREQ critical 0x00 >> length 28 >> ikev2_pld_notify: protoid NONE spisize 0 type >NAT_DETECTION_DESTINATION_IP >> ikev2_pld_payloads: payload CERTREQ nextpayload NOTIFY critical 0x00 >> length 25 >> ikev2_pld_certreq: type X509_CERT length 20 >> ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 >length 14 >> ikev2_pld_notify: protoid NONE spisize 0 type >SIGNATURE_HASH_ALGORITHMS >> spi=0x35fb3f73a0a70b49: send IKE_SA_INIT res 0 peer 5.6.7.8:52409 >local >> 1.2.3.4:500, 471 bytes >> config_free_proposals: free 0x29c15330200 >> config_free_proposals: free 0x29bd54c0d80 >> spi=0x35fb3f73a0a70b49: recv IKE_AUTH req 1 peer 5.6.7.8:51315 local >> 1.2.3.4:4500, 1568 bytes, policy 'policy1' >> ikev2_recv: ispi 0x35fb3f73a0a70b49 rspi 0x5537f74b17c41bce >> ikev2_recv: updated SA to peer 5.6.7.8:51315 local 1.2.3.4:4500 >> ikev2_pld_parse: header ispi 0x35fb3f73a0a70b49 rspi >0x5537f74b17c41bce >> nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 >length >> 1568 >> response 0 >> ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length >1540 >> ikev2_msg_decrypt: IV length 16 >> ikev2_msg_decrypt: encrypted payload length 1504 >> ikev2_msg_decrypt: integrity checksum length 16 >> ikev2_msg_decrypt: integrity check succeeded >> ikev2_msg_decrypt: decrypted payload length 1504/1504 padding 7 >> ikev2_pld_payloads: decrypted payload IDi nextpayload CERT critical >0x00 >> length 14 >> ikev2_pld_id: id FQDN/wookie length 10 >> ikev2_pld_payloads: decrypted payload CERT nextpayload NOTIFY >critical >> 0x00 length 999 >> ikev2_pld_cert: type X509_CERT length 994 >> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload CERTREQ >> critical 0x00 length 8 >> ikev2_pld_notify: protoid NONE spisize 0 type INITIAL_CONTACT >> ikev2_pld_payloads: decrypted payload CERTREQ nextpayload IDr >critical >> 0x00 length 45 >> ikev2_pld_certreq: type X509_CERT length 40 >> ikev2_policy2id: srcid FQDN/vpn.example.com length 18 >> sa_stateflags: 0x0020 -> 0x0024 certreq,sa (required 0x0000 ) >> ikev2_pld_payloads: decrypted payload IDr nextpayload AUTH critical >0x00 >> length 22 >> ikev2_pld_id: id FQDN/vpn.example.com length 18 >> ikev2_pld_id: unexpected id payload >> ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical >0x00 >> length 280 >> ikev2_pld_auth: method SIG length 272 >> sa_state: SA_INIT -> AUTH_REQUEST >> ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical >0x00 >> length 44 >> ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP >> spisize 4 xforms 3 spi 0xc7402502 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >> HMAC_SHA2_256_128 >> ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE >> ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical >0x00 >> length 24 >> ikev2_pld_ts: count 1 length 16 >> ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 >> endport 65535 >> ikev2_pld_ts: start 192.168.0.0 end 192.168.255.255 >> ikev2_pld_payloads: decrypted payload TSr nextpayload NOTIFY critical >> 0x00 length 24 >> ikev2_pld_ts: count 1 length 16 >> ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 >> endport 65535 >> ikev2_pld_ts: start 10.201.201.0 end 10.201.201.255 >> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY >critical >> 0x00 length 8 >> ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED >> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY >critical >> 0x00 length 12 >> ikev2_pld_notify: protoid NONE spisize 0 type ADDITIONAL_IP4_ADDRESS >> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY >critical >> 0x00 length 8 >> ikev2_pld_notify: protoid NONE spisize 0 type EAP_ONLY_AUTHENTICATION >> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NONE >critical >> 0x00 length 8 >> ikev2_pld_notify: protoid NONE spisize 0 type >> IKEV2_MESSAGE_ID_SYNC_SUPPORTED >> sa_stateok: SA_INIT flags 0x0000, require 0x0000 >> policy_lookup: peerid 'wookie' >> ikev2_msg_auth: responder auth data length 535 >> ca_setauth: auth length 535 >> ikev2_msg_auth: initiator auth data length 1184 >> ikev2_msg_authverify: method SIG keylen 994 type X509_CERT >> _dsa_verify_init: signature scheme 0 selected >> ikev2_msg_authverify: authentication successful >> sa_state: AUTH_REQUEST -> AUTH_SUCCESS >> sa_stateflags: 0x0024 -> 0x0034 certreq,authvalid,sa (required 0x003b >> cert,certvalid,auth,authvalid,sa) >> ikev2_sa_negotiate: score 4 >> sa_stateflags: 0x0034 -> 0x0034 certreq,authvalid,sa (required 0x003b >> cert,certvalid,auth,authvalid,sa) >> sa_stateok: VALID flags 0x0030, require 0x003b >> cert,certvalid,auth,authvalid,sa >> spi=0x35fb3f73a0a70b49: sa_state: cannot switch: AUTH_SUCCESS -> >VALID >> config_free_proposals: free 0x29c15330100 >> ca_getreq: no valid local certificate found >> ca_setauth: auth length 256 >> ca_validate_pubkey: public key does not match pubkeys/fqdn/wookie >> ca_x509_subjectaltname: FQDN/wookie >> ca_validate_cert: >> >> >/C=FR/ST=Ile-de-France/L=Paris/O=puffvpn/OU=iked/CN=wookie/[email protected] >> ok >> ikev2_getimsgdata: imsg 21 rspi 0x5537f74b17c41bce ispi >> 0x35fb3f73a0a70b49 initiator 0 sa valid type 0 data length 0 >> ikev2_dispatch_cert: cert type NONE length 0, ignored >> ikev2_getimsgdata: imsg 26 rspi 0x5537f74b17c41bce ispi >> 0x35fb3f73a0a70b49 initiator 0 sa valid type 1 data length 256 >> ikev2_dispatch_cert: AUTH type 1 len 256 >> sa_stateflags: 0x0034 -> 0x003c certreq,auth,authvalid,sa (required >> 0x003b cert,certvalid,auth,authvalid,sa) >> sa_stateok: VALID flags 0x0038, require 0x003b >> cert,certvalid,auth,authvalid,sa >> spi=0x35fb3f73a0a70b49: sa_state: cannot switch: AUTH_SUCCESS -> >VALID >> ikev2_dispatch_cert: peer certificate is valid >> sa_stateflags: 0x003c -> 0x003e certvalid,certreq,auth,authvalid,sa >> (required 0x003b cert,certvalid,auth,authvalid,sa) >> sa_stateok: VALID flags 0x003a, require 0x003b >> cert,certvalid,auth,authvalid,sa >> spi=0x35fb3f73a0a70b49: sa_state: cannot switch: AUTH_SUCCESS -> >VALID >> spi=0x35fb3f73a0a70b49: recv IKE_AUTH req 1 peer 5.6.7.8:51315 local >> 1.2.3.4:4500, 1568 bytes, policy 'policy1' >> ikev2_recv: ispi 0x35fb3f73a0a70b49 rspi 0x5537f74b17c41bce >> spi=0x35fb3f73a0a70b49: recv IKE_AUTH req 1 peer 5.6.7.8:51315 local >> 1.2.3.4:4500, 1568 bytes, policy 'policy1' >> ikev2_recv: ispi 0x35fb3f73a0a70b49 rspi 0x5537f74b17c41bce >> spi=0x35fb3f73a0a70b49: recv IKE_AUTH req 1 peer 5.6.7.8:51315 local >> 1.2.3.4:4500, 1568 bytes, policy 'policy1' >> ikev2_recv: ispi 0x35fb3f73a0a70b49 rspi 0x5537f74b17c41bce >> spi=0x35fb3f73a0a70b49: recv IKE_AUTH req 1 peer 5.6.7.8:51315 local >> 1.2.3.4:4500, 1568 bytes, policy 'policy1' >> ikev2_recv: ispi 0x35fb3f73a0a70b49 rspi 0x5537f74b17c41bce >> spi=0x9d3467359e3543b4: recv IKE_SA_INIT req 0 peer 5.6.7.8:56436 >local >> 1.2.3.4:500, 928 bytes, policy 'policy1' >> ikev2_recv: ispi 0x9d3467359e3543b4 rspi 0x0000000000000000 >> ikev2_policy2id: srcid FQDN/vpn.example.com length 18 >> ikev2_pld_parse: header ispi 0x9d3467359e3543b4 rspi >0x0000000000000000 >> nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 >length >> 9 >> 28 response 0 >> ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length >704 >> ikev2_pld_sa: more 2 reserved 0 length 324 proposal #1 protoid IKE >> spisize 0 xforms 35 spi 0 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id >CAMELLIA_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id >CAMELLIA_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id >CAMELLIA_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >> HMAC_SHA2_256_128 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >> HMAC_SHA2_384_192 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >> HMAC_SHA2_512_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >AES_XCBC_96 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >AES_CMAC_96 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >HMAC_SHA1_96 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_XCBC >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_CMAC >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_384 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_512 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_521 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P256R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P384R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P512R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id CURVE25519 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id <UNKNOWN:32> >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_3072 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_4096 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_6144 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_8192 >> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048 >> ikev2_pld_sa: more 0 reserved 0 length 376 proposal #2 protoid IKE >> spisize 0 xforms 37 spi 0 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_XCBC >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_CMAC >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_384 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_512 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_521 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P256R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P384R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P512R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id CURVE25519 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id <UNKNOWN:32> >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_3072 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_4096 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_6144 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_8192 >> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048 >> ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length >72 >> ikev2_pld_ke: dh group ECP_256 reserved 0 >> ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 >length >> 36 >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >> length 28 >> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP >> ikev2_nat_detection: peer source 0x9d3467359e3543b4 >0x0000000000000000 >> 5.6.7.8:56436 >> ikev2_pld_notify: NAT_DETECTION_SOURCE_IP detected NAT >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >> length 28 >> ikev2_pld_notify: protoid NONE spisize 0 type >NAT_DETECTION_DESTINATION_IP >> ikev2_nat_detection: peer destination 0x9d3467359e3543b4 >> 0x0000000000000000 1.2.3.4:500 >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >length >> 8 >> ikev2_pld_notify: protoid NONE spisize 0 type FRAGMENTATION_SUPPORTED >> ikev2_pld_notify: fragmentation disabled >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >> length 16 >> ikev2_pld_notify: protoid NONE spisize 0 type >SIGNATURE_HASH_ALGORITHMS >> ikev2_pld_notify: signature hash SHA2_256 (2) >> ikev2_pld_notify: signature hash SHA2_384 (3) >> ikev2_pld_notify: signature hash SHA2_512 (4) >> ikev2_pld_notify: signature hash <UNKNOWN:5> (5) >> ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 >length 8 >> ikev2_pld_notify: protoid NONE spisize 0 type REDIRECT_SUPPORTED >> sa_state: INIT -> SA_INIT >> ikev2_sa_negotiate: score 4 >> ikev2_sa_negotiate: score 0 >> sa_stateok: SA_INIT flags 0x0000, require 0x0000 >> sa_stateflags: 0x0000 -> 0x0020 sa (required 0x0000 ) >> spi=0x9d3467359e3543b4: ikev2_sa_responder_dh: want dh MODP_2048, KE >has >> ECP_256 >> spi=0x9d3467359e3543b4: ikev2_resp_recv: failed to negotiate IKE SA >> spi=0x9d3467359e3543b4: ikev2_add_error: INVALID_KE_PAYLOAD >> ikev2_add_error: done >> ikev2_next_payload: length 10 nextpayload NONE >> ikev2_pld_parse: header ispi 0x9d3467359e3543b4 rspi >0x1ee80c5b6e666ae6 >> nextpayload NOTIFY version 0x20 exchange IKE_SA_INIT flags 0x20 msgid >0 >> leng >> th 38 response 1 >> ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 >length 10 >> ikev2_pld_notify: protoid NONE spisize 0 type INVALID_KE_PAYLOAD >> spi=0x9d3467359e3543b4: send IKE_SA_INIT res 0 peer 5.6.7.8:56436 >local >> 1.2.3.4:500, 38 bytes >> spi=0x9d3467359e3543b4: sa_state: SA_INIT -> CLOSED from any to any >> policy 'policy1' >> config_free_proposals: free 0x29bff353600 >> config_free_proposals: free 0x29c15330380 >> spi=0x9d3467359e3543b4: recv IKE_SA_INIT req 0 peer 5.6.7.8:56436 >local >> 1.2.3.4:500, 1120 bytes, policy 'policy1' >> ikev2_recv: ispi 0x9d3467359e3543b4 rspi 0x0000000000000000 >> sa_free: ispi 0x9d3467359e3543b4 rspi 0x1ee80c5b6e666ae6 >> config_free_proposals: free 0x29c15330f00 >> ikev2_policy2id: srcid FQDN/vpn.example.com length 18 >> ikev2_pld_parse: header ispi 0x9d3467359e3543b4 rspi >0x0000000000000000 >> nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 >length >> 1 >> 120 response 0 >> ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length >704 >> ikev2_pld_sa: more 2 reserved 0 length 324 proposal #1 protoid IKE >> spisize 0 xforms 35 spi 0 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CTR >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id >CAMELLIA_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id >CAMELLIA_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id >CAMELLIA_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >> HMAC_SHA2_256_128 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >> HMAC_SHA2_384_192 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >> HMAC_SHA2_512_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >AES_XCBC_96 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >AES_CMAC_96 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >HMAC_SHA1_96 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_XCBC >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_CMAC >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_384 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_512 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_2048 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_521 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P256R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P384R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P512R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id CURVE25519 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id <UNKNOWN:32> >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_3072 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_4096 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_6144 >> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_8192 >> ikev2_pld_sa: more 0 reserved 0 length 376 proposal #2 protoid IKE >> spisize 0 xforms 37 spi 0 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_16 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_8 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_GCM_12 >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_XCBC >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id AES128_CMAC >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_384 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_512 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_2048 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_384 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id ECP_521 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P256R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P384R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id >BRAINPOOL_P512R1 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id CURVE25519 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id <UNKNOWN:32> >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_3072 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_4096 >> ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_6144 >> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_8192 >> ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length >264 >> ikev2_pld_ke: dh group MODP_2048 reserved 0 >> ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 >length >> 36 >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >> length 28 >> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP >> ikev2_nat_detection: peer source 0x9d3467359e3543b4 >0x0000000000000000 >> 5.6.7.8:56436 >> ikev2_pld_notify: NAT_DETECTION_SOURCE_IP detected NAT >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >> length 28 >> ikev2_pld_notify: protoid NONE spisize 0 type >NAT_DETECTION_DESTINATION_IP >> ikev2_nat_detection: peer destination 0x9d3467359e3543b4 >> 0x0000000000000000 1.2.3.4:500 >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >length >> 8 >> ikev2_pld_notify: protoid NONE spisize 0 type FRAGMENTATION_SUPPORTED >> ikev2_pld_notify: fragmentation disabled >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >> length 16 >> ikev2_pld_notify: protoid NONE spisize 0 type >SIGNATURE_HASH_ALGORITHMS >> ikev2_pld_notify: signature hash SHA2_256 (2) >> ikev2_pld_notify: signature hash SHA2_384 (3) >> ikev2_pld_notify: signature hash SHA2_512 (4) >> ikev2_pld_notify: signature hash <UNKNOWN:5> (5) >> ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 >length 8 >> ikev2_pld_notify: protoid NONE spisize 0 type REDIRECT_SUPPORTED >> sa_state: INIT -> SA_INIT >> ikev2_sa_negotiate: score 4 >> ikev2_sa_negotiate: score 0 >> sa_stateok: SA_INIT flags 0x0000, require 0x0000 >> sa_stateflags: 0x0000 -> 0x0020 sa (required 0x0000 ) >> spi=0x9d3467359e3543b4: ikev2_sa_keys: DHSECRET with 256 bytes >> ikev2_sa_keys: SKEYSEED with 32 bytes >> spi=0x9d3467359e3543b4: ikev2_sa_keys: S with 80 bytes >> ikev2_prfplus: T1 with 32 bytes >> ikev2_prfplus: T2 with 32 bytes >> ikev2_prfplus: T3 with 32 bytes >> ikev2_prfplus: T4 with 32 bytes >> ikev2_prfplus: T5 with 32 bytes >> ikev2_prfplus: T6 with 32 bytes >> ikev2_prfplus: T7 with 32 bytes >> ikev2_prfplus: Tn with 224 bytes >> ikev2_sa_keys: SK_d with 32 bytes >> ikev2_sa_keys: SK_ai with 32 bytes >> ikev2_sa_keys: SK_ar with 32 bytes >> ikev2_sa_keys: SK_ei with 32 bytes >> ikev2_sa_keys: SK_er with 32 bytes >> ikev2_sa_keys: SK_pi with 32 bytes >> ikev2_sa_keys: SK_pr with 32 bytes >> ikev2_resp_ike_sa_init: detected NAT, enabling UDP encapsulation >> ikev2_add_proposals: length 44 >> ikev2_next_payload: length 48 nextpayload KE >> ikev2_next_payload: length 264 nextpayload NONCE >> ikev2_next_payload: length 36 nextpayload NOTIFY >> ikev2_nat_detection: local source 0x9d3467359e3543b4 >0xe5fa736e6c7143e4 >> 1.2.3.4:500 >> ikev2_next_payload: length 28 nextpayload NOTIFY >> ikev2_nat_detection: local destination 0x9d3467359e3543b4 >> 0xe5fa736e6c7143e4 5.6.7.8:56436 >> ikev2_next_payload: length 28 nextpayload CERTREQ >> ikev2_add_certreq: type X509_CERT length 21 >> ikev2_next_payload: length 25 nextpayload NOTIFY >> ikev2_next_payload: length 14 nextpayload NONE >> ikev2_pld_parse: header ispi 0x9d3467359e3543b4 rspi >0xe5fa736e6c7143e4 >> nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 >length >> 4 >> 71 response 1 >> ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48 >> ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE >> spisize 0 xforms 4 spi 0 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >> HMAC_SHA2_256_128 >> ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048 >> ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length >264 >> ikev2_pld_ke: dh group MODP_2048 reserved 0 >> ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 >length >> 36 >> ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 >> length 28 >> ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP >> ikev2_pld_payloads: payload NOTIFY nextpayload CERTREQ critical 0x00 >> length 28 >> ikev2_pld_notify: protoid NONE spisize 0 type >NAT_DETECTION_DESTINATION_IP >> ikev2_pld_payloads: payload CERTREQ nextpayload NOTIFY critical 0x00 >> length 25 >> ikev2_pld_certreq: type X509_CERT length 20 >> ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 >length 14 >> ikev2_pld_notify: protoid NONE spisize 0 type >SIGNATURE_HASH_ALGORITHMS >> spi=0x9d3467359e3543b4: send IKE_SA_INIT res 0 peer 5.6.7.8:56436 >local >> 1.2.3.4:500, 471 bytes >> config_free_proposals: free 0x29c15330800 >> config_free_proposals: free 0x29bff353c80 >> spi=0x9d3467359e3543b4: recv IKE_AUTH req 1 peer 5.6.7.8:51315 local >> 1.2.3.4:4500, 1568 bytes, policy 'policy1' >> ikev2_recv: ispi 0x9d3467359e3543b4 rspi 0xe5fa736e6c7143e4 >> ikev2_recv: updated SA to peer 5.6.7.8:51315 local 1.2.3.4:4500 >> ikev2_pld_parse: header ispi 0x9d3467359e3543b4 rspi >0xe5fa736e6c7143e4 >> nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 >length >> 1568 >> response 0 >> ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length >1540 >> ikev2_msg_decrypt: IV length 16 >> ikev2_msg_decrypt: encrypted payload length 1504 >> ikev2_msg_decrypt: integrity checksum length 16 >> ikev2_msg_decrypt: integrity check succeeded >> ikev2_msg_decrypt: decrypted payload length 1504/1504 padding 7 >> ikev2_pld_payloads: decrypted payload IDi nextpayload CERT critical >0x00 >> length 14 >> ikev2_pld_id: id FQDN/wookie length 10 >> ikev2_pld_payloads: decrypted payload CERT nextpayload NOTIFY >critical >> 0x00 length 999 >> ikev2_pld_cert: type X509_CERT length 994 >> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload CERTREQ >> critical 0x00 length 8 >> ikev2_pld_notify: protoid NONE spisize 0 type INITIAL_CONTACT >> ikev2_pld_payloads: decrypted payload CERTREQ nextpayload IDr >critical >> 0x00 length 45 >> ikev2_pld_certreq: type X509_CERT length 40 >> ikev2_policy2id: srcid FQDN/vpn.example.com length 18 >> sa_stateflags: 0x0020 -> 0x0024 certreq,sa (required 0x0000 ) >> ikev2_pld_payloads: decrypted payload IDr nextpayload AUTH critical >0x00 >> length 22 >> ikev2_pld_id: id FQDN/vpn.example.com length 18 >> ikev2_pld_id: unexpected id payload >> ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical >0x00 >> length 280 >> ikev2_pld_auth: method SIG length 272 >> sa_state: SA_INIT -> AUTH_REQUEST >> ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical >0x00 >> length 44 >> ikev2_pld_sa: more 0 reserved 0 length 40 proposal #1 protoid ESP >> spisize 4 xforms 3 spi 0xc46c24f0 >> ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC >> ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 >> ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id >> HMAC_SHA2_256_128 >> ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE >> ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical >0x00 >> length 24 >> ikev2_pld_ts: count 1 length 16 >> ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 >> endport 65535 >> ikev2_pld_ts: start 192.168.0.0 end 192.168.255.255 >> ikev2_pld_payloads: decrypted payload TSr nextpayload NOTIFY critical >> 0x00 length 24 >> ikev2_pld_ts: count 1 length 16 >> ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 >> endport 65535 >> ikev2_pld_ts: start 10.201.201.0 end 10.201.201.255 >> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY >critical >> 0x00 length 8 >> ikev2_pld_notify: protoid NONE spisize 0 type MOBIKE_SUPPORTED >> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY >critical >> 0x00 length 12 >> ikev2_pld_notify: protoid NONE spisize 0 type ADDITIONAL_IP4_ADDRESS >> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NOTIFY >critical >> 0x00 length 8 >> ikev2_pld_notify: protoid NONE spisize 0 type EAP_ONLY_AUTHENTICATION >> ikev2_pld_payloads: decrypted payload NOTIFY nextpayload NONE >critical >> 0x00 length 8 >> ikev2_pld_notify: protoid NONE spisize 0 type >> IKEV2_MESSAGE_ID_SYNC_SUPPORTED >> sa_stateok: SA_INIT flags 0x0000, require 0x0000 >> policy_lookup: peerid 'wookie' >> ikev2_msg_auth: responder auth data length 535 >> ca_setauth: auth length 535 >> ikev2_msg_auth: initiator auth data length 1184 >> ikev2_msg_authverify: method SIG keylen 994 type X509_CERT >> _dsa_verify_init: signature scheme 0 selected >> ikev2_msg_authverify: authentication successful >> sa_state: AUTH_REQUEST -> AUTH_SUCCESS >> sa_stateflags: 0x0024 -> 0x0034 certreq,authvalid,sa (required 0x003b >> cert,certvalid,auth,authvalid,sa) >> ikev2_sa_negotiate: score 4 >> sa_stateflags: 0x0034 -> 0x0034 certreq,authvalid,sa (required 0x003b >> cert,certvalid,auth,authvalid,sa) >> sa_stateok: VALID flags 0x0030, require 0x003b >> cert,certvalid,auth,authvalid,sa >> spi=0x9d3467359e3543b4: sa_state: cannot switch: AUTH_SUCCESS -> >VALID >> config_free_proposals: free 0x29bd54c0080 >> ca_getreq: no valid local certificate found >> ca_setauth: auth length 256 >> ca_validate_pubkey: public key does not match pubkeys/fqdn/wookie >> ca_x509_subjectaltname: FQDN/wookie >> ca_validate_cert: >> >> >/C=FR/ST=Ile-de-France/L=Paris/O=puffvpn/OU=iked/CN=wookie/[email protected] >> ok >> ikev2_getimsgdata: imsg 21 rspi 0xe5fa736e6c7143e4 ispi >> 0x9d3467359e3543b4 initiator 0 sa valid type 0 data length 0 >> ikev2_dispatch_cert: cert type NONE length 0, ignored >> ikev2_getimsgdata: imsg 26 rspi 0xe5fa736e6c7143e4 ispi >> 0x9d3467359e3543b4 initiator 0 sa valid type 1 data length 256 >> ikev2_dispatch_cert: AUTH type 1 len 256 >> sa_stateflags: 0x0034 -> 0x003c certreq,auth,authvalid,sa (required >> 0x003b cert,certvalid,auth,authvalid,sa) >> sa_stateok: VALID flags 0x0038, require 0x003b >> cert,certvalid,auth,authvalid,sa >> spi=0x9d3467359e3543b4: sa_state: cannot switch: AUTH_SUCCESS -> >VALID >> ikev2_dispatch_cert: peer certificate is valid >> sa_stateflags: 0x003c -> 0x003e certvalid,certreq,auth,authvalid,sa >> (required 0x003b cert,certvalid,auth,authvalid,sa) >> sa_stateok: VALID flags 0x003a, require 0x003b >> cert,certvalid,auth,authvalid,sa >> spi=0x9d3467359e3543b4: sa_state: cannot switch: AUTH_SUCCESS -> >VALID >> spi=0x9d3467359e3543b4: recv IKE_AUTH req 1 peer 5.6.7.8:51315 local >> 1.2.3.4:4500, 1568 bytes, policy 'policy1' >> ikev2_recv: ispi 0x9d3467359e3543b4 rspi 0xe5fa736e6c7143e4 >> spi=0x9d3467359e3543b4: recv IKE_AUTH req 1 peer 5.6.7.8:51315 local >> 1.2.3.4:4500, 1568 bytes, policy 'policy1' >> ikev2_recv: ispi 0x9d3467359e3543b4 rspi 0xe5fa736e6c7143e4 >> spi=0x9d3467359e3543b4: recv IKE_AUTH req 1 peer 5.6.7.8:51315 local >> 1.2.3.4:4500, 1568 bytes, policy 'policy1' >> ikev2_recv: ispi 0x9d3467359e3543b4 rspi 0xe5fa736e6c7143e4 >> spi=0x9d3467359e3543b4: recv IKE_AUTH req 1 peer 5.6.7.8:55315 local >> 1.2.3.4:4500, 1568 bytes, policy 'policy1' >> ikev2_recv: ispi 0x9d3467359e3543b4 rspi 0xe5fa736e6c7143e4 >> >> >>

