Hi Paul:<div><br></div><div>Here&#39;s the log on the WAN-WAN server side,but i can not find anything helpfull...</div><div>I have no idea what to do now.</div><div><br></div><div><div>Source IP,Generated,Received,Source Name,Facility,Severity,Tag,Origin,Message</div>
<div>17:09:37,,clock,Notice,crond[1714],SSLVPN,&quot;USER root pid 10492 cmd /testshell/spy.sh&quot;</div><div>17:08:44,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[1] 113.89.243.199 #1: sending notification INVALID_ID_INFORMATION to <a href="http://113.89.243.199:500">113.89.243.199:500</a>&quot;</div>
<div>17:08:44,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[1] 113.89.243.199 #1: initial Aggressive Mode packet claiming to be from @test26 on 113.89.243.199 but no connection has been authorized&quot;</div>
<div>17:08:44,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[1] 113.89.243.199 #1: no suitable connection for peer &#39;@test901&#39;&quot;</div><div>17:08:44,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[1] 113.89.243.199 #1: Aggressive mode peer ID is ID_FQDN: &#39;@test901&#39;&quot;</div>
<div>17:08:44,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]&quot;</div><div>17:08:44,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109&quot;</div>
<div>17:08:44,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109&quot;</div>
<div>17:08:44,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109&quot;</div>
<div>17:08:44,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [RFC 3947] method set to=109 &quot;</div><div>17:08:44,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [Dead Peer Detection]&quot;</div>
<div>17:08:37,,clock,Notice,crond[1714],SSLVPN,&quot;USER root pid 10431 cmd /testshell/spy.sh&quot;</div><div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;loading secrets from &quot;&quot;/testconf/ipsec.secrets.d/101.secret&quot;&quot;&quot;</div>
<div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;loaded private key for keyid: PPK_RSA:AQN82KZkW&quot;</div><div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;loading secrets from &quot;&quot;/etc/ipsec.secrets&quot;&quot;&quot;</div>
<div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;adding interface ipsec0/ppp0 <a href="http://113.88.151.45:4500">113.88.151.45:4500</a>&quot;</div><div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;adding interface ipsec0/ppp0 <a href="http://113.88.151.45:500">113.88.151.45:500</a>&quot;</div>
<div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;IP interfaces ppp1 and eth1 share address 192.168.100.1!&quot;</div><div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;IP interfaces ppp2 and eth1 share address 192.168.100.1!&quot;</div>
<div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;IP interfaces ppp2 and ppp1 share address 192.168.100.1!&quot;</div><div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;listening for IKE messages&quot;</div>
<div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;added connection description &quot;&quot;aa&quot;&quot;&quot;</div><div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;Warning: empty directory&quot;</div>
<div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;Changing to directory &#39;/etc/ipsec.d/crls&#39;&quot;</div><div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;Changed path to directory &#39;/etc/ipsec.d/ocspcerts&#39;&quot;</div>
<div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;Changed path to directory &#39;/etc/ipsec.d/aacerts&#39;&quot;</div><div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;Changed path to directory &#39;/etc/ipsec.d/cacerts&#39;&quot;</div>
<div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;Using KLIPS IPsec interface code on 2.6.28.9&quot;</div><div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;no helpers will be started, all cryptographic operations will be done inline&quot;</div>
<div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)&quot;</div><div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)&quot;</div>
<div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;ike_alg_register_enc(): Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0)&quot;</div><div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)&quot;</div>
<div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok (ret=0)&quot;</div><div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok (ret=0)&quot;</div>
<div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0)&quot;</div><div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;using /dev/urandom as source of random entropy&quot;</div>
<div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;including NAT-Traversal patch (Version 0.6c)&quot;</div><div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;port floating activation criteria nat_t=1/port_float=1&quot;</div>
<div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;Setting NAT-Traversal port-4500 floating to on&quot;</div><div>17:08:09,,secur/auth,Warning,pluto[10411],SSLVPN,&quot;Starting Pluto (Openswan Version 2.6.21; Vendor ID OE~q\177kZNr}Wk) pid:10411&quot;</div>
<div>17:08:09,,user-level,Warning,pluto,SSLVPN,&quot;adjusting ipsec.d to /etc/ipsec.d&quot;</div><div>17:08:09,,system,Error,ipsec__plutorun,SSLVPN,&quot;003 IP interfaces ppp1 and eth1 share address 192.168.100.1!&quot;</div>
<div>17:08:09,,system,Error,ipsec__plutorun,SSLVPN,&quot;003 IP interfaces ppp2 and eth1 share address 192.168.100.1!&quot;</div><div>17:08:09,,system,Error,ipsec__plutorun,SSLVPN,&quot;003 IP interfaces ppp2 and ppp1 share address 192.168.100.1!&quot;</div>
<div>17:08:09,,system,Error,ipsec__plutorun,SSLVPN,&quot;002 added connection description &quot;&quot;aa&quot;&quot;&quot;</div><div>17:08:09,,system,Error,ipsec_setup,SSLVPN,&quot;...Openswan IPsec started&quot;</div><div>
17:08:09,,system,Error,ipsec__plutorun,SSLVPN,&quot;adjusting ipsec.d to /etc/ipsec.d&quot;</div><div>17:08:09,,secur/auth,Error,ipsec__plutorun,SSLVPN,&quot;Restarting Pluto subsystem...&quot;</div><div>17:08:08,,kernel,Warning,kernel,SSLVPN,&quot;[83049.550000] &quot;</div>
<div>17:08:08,,system,Error,ipsec_setup,SSLVPN,&quot;KLIPS ipsec1 on eth1 <a href="http://192.168.100.1/255.255.255.0">192.168.100.1/255.255.255.0</a> broadcast 192.168.100.255 &quot;</div><div>17:08:08,,system,Error,ipsec_setup,SSLVPN,&quot;KLIPS ipsec0 on ppp0 <a href="http://113.88.151.45/255.255.255.255">113.88.151.45/255.255.255.255</a> pointopoint 113.88.150.1 &quot;</div>
<div>17:08:08,,system,Error,ipsec_setup,SSLVPN,&quot;KLIPS debug `none&#39;&quot;</div><div>17:08:07,,system,Error,ipsec_setup,SSLVPN,&quot;Using KLIPS/legacy stack&quot;</div><div>17:08:07,,system,Error,ipsec_setup,SSLVPN,&quot;Restarting Openswan IPsec 2.6.21...&quot;</div>
<div>17:08:07,,system,Error,ipsec_setup,SSLVPN,&quot;...Openswan IPsec stopped&quot;</div><div>17:08:06,,kernel,Warning,kernel,SSLVPN,&quot;[83048.200000] &quot;</div><div>17:08:06,,kernel,Critical,kernel,SSLVPN,&quot;[83047.990000] IPSEC EVENT: KLIPS device ipsec1 shut down.&quot;</div>
<div>17:08:06,,kernel,Critical,kernel,SSLVPN,&quot;[83047.820000] IPSEC EVENT: KLIPS device ipsec0 shut down.&quot;</div><div>17:08:05,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;shutting down interface ipsec0/ppp0 <a href="http://113.88.151.45:500">113.88.151.45:500</a>&quot;</div>
<div>17:08:05,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;shutting down interface ipsec0/ppp0 <a href="http://113.88.151.45:4500">113.88.151.45:4500</a>&quot;</div><div>17:08:05,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;: deleting connection&quot;</div>
<div>17:08:05,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[1] <a href="http://113.89.243.199">113.89.243.199</a>: deleting connection &quot;&quot;aa&quot;&quot; instance with peer 113.89.243.199 {isakmp=#0/ipsec=#0}&quot;</div>
<div>17:08:05,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot; #22: deleting state (STATE_AGGR_R2)&quot;</div><div>17:08:04,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot; #23: deleting state (STATE_QUICK_R2)&quot;</div>
<div>17:08:04,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] <a href="http://113.89.241.123">113.89.241.123</a>: deleting connection &quot;&quot;aa&quot;&quot; instance with peer 113.89.241.123 {isakmp=#22/ipsec=#23}&quot;</div>
<div>17:08:04,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;forgetting secrets&quot;</div><div>17:08:04,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;shutting down&quot;</div><div>17:08:04,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[1] 113.89.243.199 #24: sending notification INVALID_ID_INFORMATION to <a href="http://113.89.243.199:500">113.89.243.199:500</a>&quot;</div>
<div>17:08:04,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[1] 113.89.243.199 #24: initial Aggressive Mode packet claiming to be from @test26 on 113.89.243.199 but no connection has been authorized&quot;</div>
<div>17:08:04,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[1] 113.89.243.199 #24: no suitable connection for peer &#39;@test901&#39;&quot;</div><div>17:08:04,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[1] 113.89.243.199 #24: Aggressive mode peer ID is ID_FQDN: &#39;@test901&#39;&quot;</div>
<div>17:08:04,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]&quot;</div><div>17:08:04,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109&quot;</div>
<div>17:08:04,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109&quot;</div>
<div>17:08:04,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109&quot;</div>
<div>17:08:04,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [RFC 3947] method set to=109 &quot;</div><div>17:08:04,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [Dead Peer Detection]&quot;</div>
<div>17:08:04,,system,Error,ipsec_setup,SSLVPN,&quot;Stopping Openswan IPsec...&quot;</div><div>17:07:59,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #23: DPD Error: could not find newest phase 1 state&quot;</div>
<div>17:07:55,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;reapchild failed with errno=10 No child processes&quot;</div><div>17:07:55,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;ADNS process exited with status 1&quot;</div>
<div>17:07:54,,system,Error,ipsec__plutorun,SSLVPN,&quot;restarting IPsec after pause...&quot;</div><div>17:07:54,,system,Error,ipsec__plutorun,SSLVPN,&quot;!pluto failure!:  exited with error status 128&quot;</div><div>17:07:40,,local 2,Notice,sudo,SSLVPN,&quot;www : TTY=pts/0 ; PWD=/testapp/config/apache/htdocs/language_zh_CN ; USER=root ; COMMAND=/sbin/ipsec whack --status&quot;</div>
<div>17:07:37,,clock,Notice,crond[1714],SSLVPN,&quot;USER root pid 10198 cmd /testshell/spy.sh&quot;</div><div>17:07:30,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #23: STATE_QUICK_R2: IPsec SA established tunnel mode {ESP=&gt;0x291ae3f6 &lt;0xcdf87c67 xfrm=3DES_0-HMAC_SHA1 NATOA=none NATD=none DPD=enabled}&quot;</div>
<div>17:07:30,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #23: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2&quot;</div><div>17:07:30,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #23: Dead Peer Detection (RFC 3706): enabled&quot;</div>
<div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #23: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2&quot;</div><div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #23: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1&quot;</div>
<div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #23:   them: 113.89.241.123&lt;0.0.0.0&gt;[@test26,+S=C]===<a href="http://192.168.109.0/24">192.168.109.0/24</a>&quot;</div>
<div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #23:     us: <a href="http://192.168.100.0/24===113.88.151.45[@testyf,+S=C]">192.168.100.0/24===113.88.151.45[@testyf,+S=C]</a>&quot;</div>
<div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #23: responding to Quick Mode proposal {msgid:26673bba}&quot;</div><div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #22: the peer proposed: <a href="http://192.168.100.0/24:0/0">192.168.100.0/24:0/0</a> -&gt; <a href="http://192.168.109.0/24:0/0">192.168.109.0/24:0/0</a>&quot;</div>
<div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #22: Dead Peer Detection (RFC 3706): enabled&quot;</div><div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #22: STATE_AGGR_R2: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}&quot;</div>
<div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #22: transition from state STATE_AGGR_R1 to state STATE_AGGR_R2&quot;</div><div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #22: NAT-Traversal: Only 0 NAT-D - Aborting NAT-Traversal negotiation&quot;</div>
<div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #22: STATE_AGGR_R1: sent AR1, expecting AI2&quot;</div><div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #22: transition from state STATE_AGGR_R0 to state STATE_AGGR_R1&quot;</div>
<div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #22: responding to Aggressive Mode, state #22, connection &quot;&quot;aa&quot;&quot; from 113.89.241.123&quot;</div><div>
17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[2] 113.89.241.123 #22: Aggressive mode peer ID is ID_FQDN: &#39;@test26&#39;&quot;</div><div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.241.123:500">113.89.241.123:500</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]&quot;</div>
<div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.241.123:500">113.89.241.123:500</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109&quot;</div>
<div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.241.123:500">113.89.241.123:500</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109&quot;</div>
<div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.241.123:500">113.89.241.123:500</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109&quot;</div>
<div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.241.123:500">113.89.241.123:500</a>: received Vendor ID payload [RFC 3947] method set to=109 &quot;</div><div>17:07:28,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.241.123:500">113.89.241.123:500</a>: received Vendor ID payload [Dead Peer Detection]&quot;</div>
<div>17:07:24,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[1] 113.89.243.199 #21: sending notification INVALID_ID_INFORMATION to <a href="http://113.89.243.199:500">113.89.243.199:500</a>&quot;</div>
<div>17:07:24,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[1] 113.89.243.199 #21: initial Aggressive Mode packet claiming to be from @test26 on 113.89.243.199 but no connection has been authorized&quot;</div>
<div>17:07:24,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[1] 113.89.243.199 #21: no suitable connection for peer &#39;@test901&#39;&quot;</div><div>17:07:24,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;&quot;&quot;aa&quot;&quot;[1] 113.89.243.199 #21: Aggressive mode peer ID is ID_FQDN: &#39;@test901&#39;&quot;</div>
<div>17:07:24,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]&quot;</div><div>17:07:24,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109&quot;</div>
<div>17:07:24,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109&quot;</div>
<div>17:07:24,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 109&quot;</div>
<div>17:07:24,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [RFC 3947] method set to=109 &quot;</div><div>17:07:24,,secur/auth,Warning,pluto[9357],SSLVPN,&quot;packet from <a href="http://113.89.243.199:500">113.89.243.199:500</a>: received Vendor ID payload [Dead Peer Detection]&quot;</div>
<br><div class="gmail_quote">2009/6/23 Paul Wouters <span dir="ltr">&lt;<a href="mailto:paul@xelerance.com">paul@xelerance.com</a>&gt;</span><br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
<div class="im">On Tue, 23 Jun 2009, Zhiping Liu wrote:<br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
openswan 2.6.21 restart for serveral minutes. i found some error message<br>
from syslog:<br>
<br>
!pluto failure!: exited with error status 128<br>
<br>
and then openswan restarted itself.<br>
</blockquote>
<br></div>
There should be more logs in /var/log/secure or /var/log/auth.log telling<br>
you what is going on.<br>
<br>
Alternatively, you can define dumpdir=/var/run/pluto/ and make it crash<br>
again, and then you have a core file in /var/run/pluto which you can<br>
inspect with gdb.<br><font color="#888888">
<br>
Paul<br>
</font></blockquote></div><br><br clear="all"><br>-- <br>from Romeo<br>
</div>