Mar 11 15:25:15 ipsectest pluto[32012]: packet from 172.30.64.140:500: received Vendor ID payload [Dead Peer Detection] Mar 11 15:25:15 ipsectest pluto[32012]: "vpnk"[1] 172.30.64.140 #1: responding to Main Mode from unknown peer 172.30.64.140 Mar 11 15:25:15 ipsectest pluto[32012]: "vpnk"[1] 172.30.64.140 #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 Mar 11 15:25:15 ipsectest pluto[32012]: "vpnk"[1] 172.30.64.140 #1: STATE_MAIN_R1: sent MR1, expecting MI2 Mar 11 15:25:15 ipsectest pluto[32012]: "vpnk"[1] 172.30.64.140 #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed Mar 11 15:25:15 ipsectest pluto[32012]: "vpnk"[1] 172.30.64.140 #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 Mar 11 15:25:15 ipsectest pluto[32012]: "vpnk"[1] 172.30.64.140 #1: STATE_MAIN_R2: sent MR2, expecting MI3 Mar 11 15:25:16 ipsectest pluto[32012]: "vpnk"[1] 172.30.64.140 #1: Main mode peer ID is ID_DER_ASN1_DN: 'C=DE, O=KoCoConnector, OU=Systemtest, CN=4711, S=KoCoBox, G=001, SN=rel234 C.NK.VPN 2009000010, T=KONN.NK' Mar 11 15:25:16 ipsectest pluto[32012]: "vpnk"[1] 172.30.64.140 #1: switched from "vpnk" to "vpnk" Mar 11 15:25:16 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #1: deleting connection "vpnk" instance with peer 172.30.64.140 {isakmp=#0/ipsec=#0} Mar 11 15:25:16 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #1: I am sending my cert Mar 11 15:25:16 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 Mar 11 15:25:16 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #1: new NAT mapping for #1, was 172.30.64.140:500, now 172.30.64.140:62817 Mar 11 15:25:16 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_256 prf=oakley_sha group=modp1536} Mar 11 15:25:16 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #1: Dead Peer Detection (RFC 3706): enabled Mar 11 15:25:16 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #1: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000 Mar 11 15:25:16 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #1: received and ignored informational message Mar 11 15:25:18 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #1: the peer proposed: 172.30.64.190/32:17/1701 -> 192.168.0.118/32:17/0 Mar 11 15:25:18 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #2: responding to Quick Mode proposal {msgid:cac5fa61} Mar 11 15:25:18 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #2: us: 172.30.64.190<172.30.64.190>[C=DE, O=gematik, CN=ipsectest, SN=rel234 VPNK VPN 000.00,+S=C]:17/1701 Mar 11 15:25:18 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #2: them: 172.30.64.140[C=DE, O=KoCoConnector, OU=Systemtest, CN=4711, S=KoCoBox, G=001, SN=rel234 C.NK.VPN 2009000010, T=KONN.NK,+S=C]:17/1701===192.168.0.118/32 Mar 11 15:25:18 ipsectest pluto[32012]: | NAT-OA: 32 tunnel: 1 Mar 11 15:25:18 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 Mar 11 15:25:18 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 Mar 11 15:25:18 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #2: Dead Peer Detection (RFC 3706): enabled Mar 11 15:25:18 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 Mar 11 15:25:18 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #2: STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x0460f65a <0x31be25c8 xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=172.30.64.140:62817 DPD=enabled} Mar 11 15:35:48 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #3: initiating Quick Mode RSASIG+ENCRYPT+PFS+IKEv2ALLOW to replace #2 {using isakmp#1 msgid:f9cfbdca proposal=AES(12)_256-SHA1(2)_160 pfsgroup=OAKLEY_GROUP_MODP1536} Mar 11 15:36:58 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #3: max number of retransmissions (2) reached STATE_QUICK_I1 Mar 11 15:36:58 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #3: starting keying attempt 2 of an unlimited number Mar 11 15:36:58 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #4: initiating Quick Mode RSASIG+ENCRYPT+PFS+IKEv2ALLOW to replace #3 {using isakmp#1 msgid:70d8049d proposal=AES(12)_256-SHA1(2)_160 pfsgroup=OAKLEY_GROUP_MODP1536} Mar 11 15:37:19 ipsectest pluto[32012]: "vpnk"[2] 172.30.64.140 #1: the peer proposed: 172.30.64.190/32:17/1701 -> 192.168.0.118/32:17/1701 Mar 11 15:37:19 ipsectest pluto[32012]: "vpnk"[3] 172.30.64.140 #5: responding to Quick Mode proposal {msgid:47d36d2a} Mar 11 15:37:19 ipsectest pluto[32012]: "vpnk"[3] 172.30.64.140 #5: us: 172.30.64.190<172.30.64.190>[C=DE, O=gematik, CN=ipsectest, SN=rel234 VPNK VPN 000.00,+S=C]:17/1701 Mar 11 15:37:19 ipsectest pluto[32012]: "vpnk"[3] 172.30.64.140 #5: them: 172.30.64.140[C=DE, O=KoCoConnector, OU=Systemtest, CN=4711, S=KoCoBox, G=001, SN=rel234 C.NK.VPN 2009000010, T=KONN.NK,+S=C]:17/1701===192.168.0.118/32 Mar 11 15:37:19 ipsectest pluto[32012]: | NAT-OA: 32 tunnel: 1 Mar 11 15:37:19 ipsectest pluto[32012]: "vpnk"[3] 172.30.64.140 #5: cannot install eroute -- it is in use for "vpnk"[2] 172.30.64.140 #2 Mar 11 15:37:30 ipsectest pluto[32012]: "vpnk"[3] 172.30.64.140 #5: discarding duplicate packet; already STATE_QUICK_R0 Mar 11 15:37:40 ipsectest pluto[32012]: "vpnk"[3] 172.30.64.140 #5: discarding duplicate packet; already STATE_QUICK_R0 ^C