Mar 15 10:03:44 ipsectest pluto[305]: Starting Pluto (Openswan Version 2.6.master-201011.git-g1d0483cc-dirty; Vendor ID OEGKn]izkHyv) pid:305 [snip] Mar 15 10:04:50 ipsectest pluto[305]: packet from 172.30.64.140:500: received Vendor ID payload [RFC 3947] method set to=109 Mar 15 10:04:50 ipsectest pluto[305]: packet from 172.30.64.140:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 109 Mar 15 10:04:50 ipsectest pluto[305]: packet from 172.30.64.140:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 109 Mar 15 10:04:50 ipsectest pluto[305]: packet from 172.30.64.140:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00] Mar 15 10:04:50 ipsectest pluto[305]: packet from 172.30.64.140:500: received Vendor ID payload [Dead Peer Detection] Mar 15 10:04:50 ipsectest pluto[305]: "vpnk"[1] 172.30.64.140 #1: responding to Main Mode from unknown peer 172.30.64.140 Mar 15 10:04:50 ipsectest pluto[305]: "vpnk"[1] 172.30.64.140 #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 Mar 15 10:04:50 ipsectest pluto[305]: "vpnk"[1] 172.30.64.140 #1: STATE_MAIN_R1: sent MR1, expecting MI2 Mar 15 10:04:51 ipsectest pluto[305]: "vpnk"[1] 172.30.64.140 #1: NAT-Traversal: Result using RFC 3947 (NAT-Traversal): peer is NATed Mar 15 10:04:51 ipsectest pluto[305]: "vpnk"[1] 172.30.64.140 #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 Mar 15 10:04:51 ipsectest pluto[305]: "vpnk"[1] 172.30.64.140 #1: STATE_MAIN_R2: sent MR2, expecting MI3 Mar 15 10:04:51 ipsectest pluto[305]: "vpnk"[1] 172.30.64.140 #1: Main mode peer ID is ID_DER_ASN1_DN: 'C=DE, O=KoCoConnector, OU=Systemtest, CN=4711, S=KoCoBox, G=001, SN=rel234 C.NK.VPN 2009000010, T=KONN.NK' Mar 15 10:04:51 ipsectest pluto[305]: "vpnk"[1] 172.30.64.140 #1: switched from "vpnk" to "vpnk" Mar 15 10:04:51 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #1: deleting connection "vpnk" instance with peer 172.30.64.140 {isakmp=#0/ipsec=#0} Mar 15 10:04:51 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #1: I am sending my cert Mar 15 10:04:51 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #1: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 Mar 15 10:04:51 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #1: new NAT mapping for #1, was 172.30.64.140:500, now 172.30.64.140:62817 Mar 15 10:04:51 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #1: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_RSA_SIG cipher=aes_256 prf=oakley_sha group=modp1536} Mar 15 10:04:51 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #1: Dead Peer Detection (RFC 3706): enabled Mar 15 10:04:51 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #1: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000 Mar 15 10:04:51 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #1: received and ignored informational message Mar 15 10:04:53 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #1: the peer proposed: 172.30.64.190/32:17/1701 -> 192.168.0.118/32:17/0 Mar 15 10:04:53 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #2: responding to Quick Mode proposal {msgid:c1861c8d} Mar 15 10:04:53 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #2: us: 172.30.64.190<172.30.64.190>[C=DE, O=gematik, CN=ipsectest, SN=rel234 VPNK VPN 000.00,+S=C]:17/1701 Mar 15 10:04:53 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #2: them: 172.30.64.140[C=DE, O=KoCoConnector, OU=Systemtest, CN=4711, S=KoCoBox, G=001, SN=rel234 C.NK.VPN 2009000010, T=KONN.NK,+S=C]:17/1701===192.168.0.118/32 Mar 15 10:04:53 ipsectest pluto[305]: | NAT-OA: 32 tunnel: 1 Mar 15 10:04:53 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #2: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 Mar 15 10:04:53 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #2: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 Mar 15 10:04:53 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #2: Dead Peer Detection (RFC 3706): enabled Mar 15 10:04:53 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #2: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 Mar 15 10:04:53 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #2: STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x0460f65a <0x20f420e5 xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=172.30.64.140:62817 DPD=enabled} Mar 15 10:52:24 ipsectest -- MARK -- Mar 15 10:52:55 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #1: the peer proposed: 172.30.64.190/32:17/1701 -> 192.168.0.118/32:17/1701 Mar 15 10:52:55 ipsectest pluto[305]: "vpnk"[3] 172.30.64.140 #3: responding to Quick Mode proposal {msgid:812158f3} Mar 15 10:52:55 ipsectest pluto[305]: "vpnk"[3] 172.30.64.140 #3: us: 172.30.64.190<172.30.64.190>[C=DE, O=gematik, CN=ipsectest, SN=rel234 VPNK VPN 000.00,+S=C]:17/1701 Mar 15 10:52:55 ipsectest pluto[305]: "vpnk"[3] 172.30.64.140 #3: them: 172.30.64.140[C=DE, O=KoCoConnector, OU=Systemtest, CN=4711, S=KoCoBox, G=001, SN=rel234 C.NK.VPN 2009000010, T=KONN.NK,+S=C]:17/1701===192.168.0.118/32 Mar 15 10:52:55 ipsectest pluto[305]: | NAT-OA: 32 tunnel: 1 Mar 15 10:52:55 ipsectest pluto[305]: "vpnk"[3] 172.30.64.140 #3: cannot install eroute -- it is in use for "vpnk"[2] 172.30.64.140 #2 Mar 15 10:53:06 ipsectest pluto[305]: "vpnk"[3] 172.30.64.140 #3: discarding duplicate packet; already STATE_QUICK_R0 Mar 15 10:53:16 ipsectest pluto[305]: "vpnk"[3] 172.30.64.140 #3: discarding duplicate packet; already STATE_QUICK_R0 Mar 15 10:57:55 ipsectest pluto[305]: "vpnk"[3] 172.30.64.140: deleting connection "vpnk" instance with peer 172.30.64.140 {isakmp=#0/ipsec=#0} Mar 15 11:04:53 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #2: IPsec SA expired (--dontrekey) Mar 15 11:04:57 ipsectest pluto[305]: "vpnk"[2] 172.30.64.140 #1: the peer proposed: 172.30.64.190/32:17/1701 -> 192.168.0.118/32:17/1701 Mar 15 11:04:57 ipsectest pluto[305]: "vpnk"[4] 172.30.64.140 #4: responding to Quick Mode proposal {msgid:ebab616f} Mar 15 11:04:57 ipsectest pluto[305]: "vpnk"[4] 172.30.64.140 #4: us: 172.30.64.190<172.30.64.190>[C=DE, O=gematik, CN=ipsectest, SN=rel234 VPNK VPN 000.00,+S=C]:17/1701 Mar 15 11:04:57 ipsectest pluto[305]: "vpnk"[4] 172.30.64.140 #4: them: 172.30.64.140[C=DE, O=KoCoConnector, OU=Systemtest, CN=4711, S=KoCoBox, G=001, SN=rel234 C.NK.VPN 2009000010, T=KONN.NK,+S=C]:17/1701===192.168.0.118/32 Mar 15 11:04:57 ipsectest pluto[305]: | NAT-OA: 32 tunnel: 1 Mar 15 11:04:57 ipsectest pluto[305]: "vpnk"[4] 172.30.64.140 #4: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1 Mar 15 11:04:57 ipsectest pluto[305]: "vpnk"[4] 172.30.64.140 #4: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2 Mar 15 11:04:57 ipsectest pluto[305]: "vpnk"[4] 172.30.64.140 #4: Dead Peer Detection (RFC 3706): enabled Mar 15 11:04:57 ipsectest pluto[305]: "vpnk"[4] 172.30.64.140 #4: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2 Mar 15 11:04:57 ipsectest pluto[305]: "vpnk"[4] 172.30.64.140 #4: STATE_QUICK_R2: IPsec SA established transport mode {ESP=>0x033e2fe2 <0x06797fe8 xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=172.30.64.140:62817 DPD=enabled}