W026 Fri Apr 29 20:51:37 CEST 2011 + _________________________ version + + ipsec --version Linux Openswan U2.6.23/K2.6.32-22-generic (netkey) See `ipsec --copyright' for copyright information. + _________________________ /proc/version + + cat /proc/version Linux version 2.6.32-22-generic (buildd@yellow) (gcc version 4.4.3 (Ubuntu 4.4.3-4ubuntu5) ) #36-Ubuntu SMP Thu Jun 3 19:31:57 UTC 2010 + _________________________ /proc/net/ipsec_eroute + + test -r /proc/net/ipsec_eroute + _________________________ netstat-rn + + netstat -nr + head -n 100 Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface 212.117.175.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 0.0.0.0 212.117.175.1 0.0.0.0 UG 0 0 0 eth0 + _________________________ /proc/net/ipsec_spi + + test -r /proc/net/ipsec_spi + _________________________ /proc/net/ipsec_spigrp + + test -r /proc/net/ipsec_spigrp + _________________________ /proc/net/ipsec_tncfg + + test -r /proc/net/ipsec_tncfg + _________________________ /proc/net/pfkey + + test -r /proc/net/pfkey + cat /proc/net/pfkey sk RefCnt Rmem Wmem User Inode + _________________________ ip-xfrm-state + + ip xfrm state src 217.92.35.33 dst 212.117.175.46 proto esp spi 0x77a131fd reqid 16385 mode tunnel replay-window 32 auth hmac(md5) 0x298f8b1c9aa2c7dc46c109b4188b3fc3 enc cbc(aes) 0xf7a1746dadbbea39909ff8926207e7a7 sel src 0.0.0.0/0 dst 0.0.0.0/0 src 212.117.175.46 dst 217.92.35.33 proto esp spi 0x01225acd reqid 16385 mode tunnel replay-window 32 auth hmac(md5) 0x16497c86e0cc11f9422192f7324ac78f enc cbc(aes) 0xfb23ebc991d447e06328d2e3cb194057 sel src 0.0.0.0/0 dst 0.0.0.0/0 src 217.92.35.33 dst 212.117.175.46 proto esp spi 0x37ca9ff0 reqid 16385 mode tunnel replay-window 32 auth hmac(md5) 0xa3d9fba3c55dbf5ed5d0e4bdd711dedc enc cbc(aes) 0xfd75baa7c1a4aaae7a3ae7098dd211b4 sel src 0.0.0.0/0 dst 0.0.0.0/0 src 212.117.175.46 dst 217.92.35.33 proto esp spi 0x7c42c092 reqid 16385 mode tunnel replay-window 32 auth hmac(md5) 0x420deae902be58387ccc81bb9c991e7c enc cbc(aes) 0x888eab9551a7be803dd00678bb693702 sel src 0.0.0.0/0 dst 0.0.0.0/0 + _________________________ ip-xfrm-policy + + ip xfrm policy src 0.0.0.0/0 dst 10.70.0.0/24 dir out priority 3112 tmpl src 212.117.175.46 dst 217.92.35.33 proto esp reqid 16385 mode tunnel src 10.70.0.0/24 dst 0.0.0.0/0 dir fwd priority 3112 tmpl src 217.92.35.33 dst 212.117.175.46 proto esp reqid 16385 mode tunnel src 10.70.0.0/24 dst 0.0.0.0/0 dir in priority 3112 tmpl src 217.92.35.33 dst 212.117.175.46 proto esp reqid 16385 mode tunnel src ::/0 dst ::/0 dir 4 priority 0 src ::/0 dst ::/0 dir 3 priority 0 src 0.0.0.0/0 dst 0.0.0.0/0 dir 4 priority 0 src 0.0.0.0/0 dst 0.0.0.0/0 dir 3 priority 0 src 0.0.0.0/0 dst 0.0.0.0/0 dir 4 priority 0 src 0.0.0.0/0 dst 0.0.0.0/0 dir 3 priority 0 + _________________________ /proc/crypto + + test -r /proc/crypto + cat /proc/crypto name : authenc(hmac(md5),cbc(aes)) driver : authenc(hmac(md5-generic),cbc(aes-asm)) module : authenc priority : 2000 refcnt : 5 selftest : passed type : aead async : no blocksize : 16 ivsize : 16 maxauthsize : 16 geniv : name : cbc(aes) driver : cbc(aes-asm) module : kernel priority : 200 refcnt : 5 selftest : passed type : givcipher async : no blocksize : 16 min keysize : 16 max keysize : 32 ivsize : 16 geniv : eseqiv name : deflate driver : deflate-generic module : deflate priority : 0 refcnt : 1 selftest : passed type : compression name : rfc3686(ctr(aes)) driver : rfc3686(ctr(aes-asm)) module : ctr priority : 200 refcnt : 1 selftest : passed type : blkcipher blocksize : 1 min keysize : 20 max keysize : 36 ivsize : 8 geniv : seqiv name : ctr(aes) driver : ctr(aes-asm) module : ctr priority : 200 refcnt : 1 selftest : passed type : blkcipher blocksize : 1 min keysize : 16 max keysize : 32 ivsize : 16 geniv : chainiv name : cbc(twofish) driver : cbc(twofish-generic) module : kernel priority : 100 refcnt : 1 selftest : passed type : blkcipher blocksize : 16 min keysize : 16 max keysize : 32 ivsize : 16 geniv : name : cbc(camellia) driver : cbc(camellia-generic) module : kernel priority : 100 refcnt : 1 selftest : passed type : blkcipher blocksize : 16 min keysize : 16 max keysize : 32 ivsize : 16 geniv : name : camellia driver : camellia-generic module : camellia priority : 100 refcnt : 1 selftest : passed type : cipher blocksize : 16 min keysize : 16 max keysize : 32 name : cbc(serpent) driver : cbc(serpent-generic) module : kernel priority : 0 refcnt : 1 selftest : passed type : blkcipher blocksize : 16 min keysize : 0 max keysize : 32 ivsize : 16 geniv : name : cbc(aes) driver : cbc(aes-asm) module : kernel priority : 200 refcnt : 5 selftest : passed type : blkcipher blocksize : 16 min keysize : 16 max keysize : 32 ivsize : 16 geniv : name : cbc(blowfish) driver : cbc(blowfish-generic) module : kernel priority : 0 refcnt : 1 selftest : passed type : blkcipher blocksize : 8 min keysize : 4 max keysize : 56 ivsize : 8 geniv : name : cbc(cast5) driver : cbc(cast5-generic) module : kernel priority : 0 refcnt : 1 selftest : passed type : blkcipher blocksize : 8 min keysize : 5 max keysize : 16 ivsize : 8 geniv : name : cast5 driver : cast5-generic module : cast5 priority : 0 refcnt : 1 selftest : passed type : cipher blocksize : 8 min keysize : 5 max keysize : 16 name : cbc(des3_ede) driver : cbc(des3_ede-generic) module : kernel priority : 0 refcnt : 1 selftest : passed type : blkcipher blocksize : 8 min keysize : 24 max keysize : 24 ivsize : 8 geniv : name : cbc(des) driver : cbc(des-generic) module : kernel priority : 0 refcnt : 1 selftest : passed type : blkcipher blocksize : 8 min keysize : 8 max keysize : 8 ivsize : 8 geniv : name : xcbc(aes) driver : xcbc(aes-asm) module : xcbc priority : 200 refcnt : 1 selftest : passed type : shash blocksize : 16 digestsize : 16 name : hmac(rmd160) driver : hmac(rmd160-generic) module : kernel priority : 0 refcnt : 1 selftest : passed type : shash blocksize : 64 digestsize : 20 name : rmd160 driver : rmd160-generic module : rmd160 priority : 0 refcnt : 1 selftest : passed type : shash blocksize : 64 digestsize : 20 name : hmac(sha256) driver : hmac(sha256-generic) module : kernel priority : 0 refcnt : 1 selftest : passed type : shash blocksize : 64 digestsize : 32 name : hmac(sha1) driver : hmac(sha1-generic) module : kernel priority : 0 refcnt : 1 selftest : passed type : shash blocksize : 64 digestsize : 20 name : sha1 driver : sha1-generic module : sha1_generic priority : 0 refcnt : 1 selftest : passed type : shash blocksize : 64 digestsize : 20 name : hmac(md5) driver : hmac(md5-generic) module : kernel priority : 0 refcnt : 9 selftest : passed type : shash blocksize : 64 digestsize : 16 name : compress_null driver : compress_null-generic module : crypto_null priority : 0 refcnt : 1 selftest : passed type : compression name : digest_null driver : digest_null-generic module : crypto_null priority : 0 refcnt : 1 selftest : passed type : shash blocksize : 1 digestsize : 0 name : ecb(cipher_null) driver : ecb-cipher_null module : crypto_null priority : 100 refcnt : 1 selftest : passed type : blkcipher blocksize : 1 min keysize : 0 max keysize : 0 ivsize : 0 geniv : name : cipher_null driver : cipher_null-generic module : crypto_null priority : 0 refcnt : 1 selftest : passed type : cipher blocksize : 1 min keysize : 0 max keysize : 0 name : tnepres driver : tnepres-generic module : serpent priority : 0 refcnt : 1 selftest : passed type : cipher blocksize : 16 min keysize : 0 max keysize : 32 name : serpent driver : serpent-generic module : serpent priority : 0 refcnt : 1 selftest : passed type : cipher blocksize : 16 min keysize : 0 max keysize : 32 name : blowfish driver : blowfish-generic module : blowfish priority : 0 refcnt : 1 selftest : passed type : cipher blocksize : 8 min keysize : 4 max keysize : 56 name : twofish driver : twofish-generic module : twofish priority : 100 refcnt : 1 selftest : passed type : cipher blocksize : 16 min keysize : 16 max keysize : 32 name : sha256 driver : sha256-generic module : sha256_generic priority : 0 refcnt : 1 selftest : passed type : shash blocksize : 64 digestsize : 32 name : sha224 driver : sha224-generic module : sha256_generic priority : 0 refcnt : 1 selftest : passed type : shash blocksize : 64 digestsize : 28 name : sha512 driver : sha512-generic module : sha512_generic priority : 0 refcnt : 1 selftest : passed type : shash blocksize : 128 digestsize : 64 name : sha384 driver : sha384-generic module : sha512_generic priority : 0 refcnt : 1 selftest : passed type : shash blocksize : 128 digestsize : 48 name : des3_ede driver : des3_ede-generic module : des_generic priority : 0 refcnt : 1 selftest : passed type : cipher blocksize : 8 min keysize : 24 max keysize : 24 name : des driver : des-generic module : des_generic priority : 0 refcnt : 1 selftest : passed type : cipher blocksize : 8 min keysize : 8 max keysize : 8 name : aes driver : aes-asm module : aes_x86_64 priority : 200 refcnt : 5 selftest : passed type : cipher blocksize : 16 min keysize : 16 max keysize : 32 name : aes driver : aes-generic module : aes_generic priority : 100 refcnt : 1 selftest : passed type : cipher blocksize : 16 min keysize : 16 max keysize : 32 name : stdrng driver : krng module : kernel priority : 200 refcnt : 2 selftest : passed type : rng seedsize : 0 name : md5 driver : md5-generic module : kernel priority : 0 refcnt : 5 selftest : passed type : shash blocksize : 64 digestsize : 16 + __________________________/proc/sys/net/core/xfrm-star /usr/lib/ipsec/barf: 1: __________________________/proc/sys/net/core/xfrm-star: not found + echo -n /proc/sys/net/core/xfrm_acq_expires: /proc/sys/net/core/xfrm_acq_expires: + cat /proc/sys/net/core/xfrm_acq_expires 30 + echo -n /proc/sys/net/core/xfrm_aevent_etime: /proc/sys/net/core/xfrm_aevent_etime: + cat /proc/sys/net/core/xfrm_aevent_etime 10 + echo -n /proc/sys/net/core/xfrm_aevent_rseqth: /proc/sys/net/core/xfrm_aevent_rseqth: + cat /proc/sys/net/core/xfrm_aevent_rseqth 2 + echo -n /proc/sys/net/core/xfrm_larval_drop: /proc/sys/net/core/xfrm_larval_drop: + cat /proc/sys/net/core/xfrm_larval_drop 1 + _________________________ /proc/sys/net/ipsec-star + + test -d /proc/sys/net/ipsec + _________________________ ipsec/status + + ipsec auto --status 000 using kernel interface: netkey 000 interface lo/lo ::1 000 interface lo/lo 127.0.0.1 000 interface eth0/eth0 212.117.175.46 000 %myid = (none) 000 debug none 000 000 virtual_private (%priv): 000 - allowed 3 subnets: 10.0.0.0/8, 192.168.0.0/16, 172.16.0.0/12 000 - disallowed 0 subnets: 000 WARNING: Either virtual_private= was not specified, or there was a syntax 000 error in that line. 'left/rightsubnet=%priv' will not work! 000 000 algorithm ESP encrypt: id=2, name=ESP_DES, ivlen=8, keysizemin=64, keysizemax=64 000 algorithm ESP encrypt: id=3, name=ESP_3DES, ivlen=8, keysizemin=192, keysizemax=192 000 algorithm ESP encrypt: id=6, name=ESP_CAST, ivlen=8, keysizemin=40, keysizemax=128 000 algorithm ESP encrypt: id=7, name=ESP_BLOWFISH, ivlen=8, keysizemin=40, keysizemax=448 000 algorithm ESP encrypt: id=11, name=ESP_NULL, ivlen=0, keysizemin=0, keysizemax=0 000 algorithm ESP encrypt: id=12, name=ESP_AES, ivlen=8, keysizemin=128, keysizemax=256 000 algorithm ESP encrypt: id=13, name=ESP_AES_CTR, ivlen=8, keysizemin=128, keysizemax=256 000 algorithm ESP encrypt: id=14, name=ESP_AES_CCM_A, ivlen=8, keysizemin=128, keysizemax=256 000 algorithm ESP encrypt: id=15, name=ESP_AES_CCM_B, ivlen=8, keysizemin=128, keysizemax=256 000 algorithm ESP encrypt: id=16, name=ESP_AES_CCM_C, ivlen=8, keysizemin=128, keysizemax=256 000 algorithm ESP encrypt: id=18, name=ESP_AES_GCM_A, ivlen=8, keysizemin=128, keysizemax=256 000 algorithm ESP encrypt: id=19, name=ESP_AES_GCM_B, ivlen=8, keysizemin=128, keysizemax=256 000 algorithm ESP encrypt: id=20, name=ESP_AES_GCM_C, ivlen=8, keysizemin=128, keysizemax=256 000 algorithm ESP encrypt: id=22, name=ESP_CAMELLIA, ivlen=8, keysizemin=128, keysizemax=256 000 algorithm ESP encrypt: id=252, name=ESP_SERPENT, ivlen=8, keysizemin=128, keysizemax=256 000 algorithm ESP encrypt: id=253, name=ESP_TWOFISH, ivlen=8, keysizemin=128, keysizemax=256 000 algorithm ESP auth attr: id=1, name=AUTH_ALGORITHM_HMAC_MD5, keysizemin=128, keysizemax=128 000 algorithm ESP auth attr: id=2, name=AUTH_ALGORITHM_HMAC_SHA1, keysizemin=160, keysizemax=160 000 algorithm ESP auth attr: id=5, name=AUTH_ALGORITHM_HMAC_SHA2_256, keysizemin=256, keysizemax=256 000 algorithm ESP auth attr: id=8, name=AUTH_ALGORITHM_HMAC_RIPEMD, keysizemin=160, keysizemax=160 000 algorithm ESP auth attr: id=9, name=AUTH_ALGORITHM_AES_CBC, keysizemin=128, keysizemax=128 000 algorithm ESP auth attr: id=251, name=(null), keysizemin=0, keysizemax=0 000 000 algorithm IKE encrypt: id=0, name=(null), blocksize=16, keydeflen=131 000 algorithm IKE encrypt: id=3, name=OAKLEY_BLOWFISH_CBC, blocksize=8, keydeflen=128 000 algorithm IKE encrypt: id=5, name=OAKLEY_3DES_CBC, blocksize=8, keydeflen=192 000 algorithm IKE encrypt: id=7, name=OAKLEY_AES_CBC, blocksize=16, keydeflen=128 000 algorithm IKE encrypt: id=65004, name=OAKLEY_SERPENT_CBC, blocksize=16, keydeflen=128 000 algorithm IKE encrypt: id=65005, name=OAKLEY_TWOFISH_CBC, blocksize=16, keydeflen=128 000 algorithm IKE encrypt: id=65289, name=OAKLEY_TWOFISH_CBC_SSH, blocksize=16, keydeflen=128 000 algorithm IKE hash: id=1, name=OAKLEY_MD5, hashsize=16 000 algorithm IKE hash: id=2, name=OAKLEY_SHA1, hashsize=20 000 algorithm IKE hash: id=4, name=OAKLEY_SHA2_256, hashsize=32 000 algorithm IKE hash: id=6, name=OAKLEY_SHA2_512, hashsize=64 000 algorithm IKE dh group: id=2, name=OAKLEY_GROUP_MODP1024, bits=1024 000 algorithm IKE dh group: id=5, name=OAKLEY_GROUP_MODP1536, bits=1536 000 algorithm IKE dh group: id=14, name=OAKLEY_GROUP_MODP2048, bits=2048 000 algorithm IKE dh group: id=15, name=OAKLEY_GROUP_MODP3072, bits=3072 000 algorithm IKE dh group: id=16, name=OAKLEY_GROUP_MODP4096, bits=4096 000 algorithm IKE dh group: id=17, name=OAKLEY_GROUP_MODP6144, bits=6144 000 algorithm IKE dh group: id=18, name=OAKLEY_GROUP_MODP8192, bits=8192 000 000 stats db_ops: {curr_cnt, total_cnt, maxsz} :context={0,6,64} trans={0,6,2304} attrs={0,6,1536} 000 000 "HOME": 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]---212.117.175.1...212.117.175.1---217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/24; erouted; eroute owner: #10 000 "HOME": myip=unset; hisip=unset; 000 "HOME": ike_life: 8000s; ipsec_life: 2000s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0 000 "HOME": policy: PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW+lKOD+rKOD; prio: 0,24; interface: eth0; 000 "HOME": newest ISAKMP SA: #8; newest IPsec SA: #10; 000 "HOME": IKE algorithms wanted: AES_CBC(7)_256-MD5(1)-MODP1536(5), AES_CBC(7)_256-SHA1(2)-MODP1536(5), AES_CBC(7)_256-MD5(1)-MODP1024(2), AES_CBC(7)_256-SHA1(2)-MODP1024(2); flags=-strict 000 "HOME": IKE algorithms found: AES_CBC(7)_256-MD5(1)_128-5, AES_CBC(7)_256-SHA1(2)_160-5, AES_CBC(7)_256-MD5(1)_128-2, AES_CBC(7)_256-SHA1(2)_160-2, 000 "HOME": IKE algorithm newest: AES_CBC_256-MD5-MODP1024 000 "HOME": ESP algorithms wanted: AES(12)_128-MD5(1); flags=-strict 000 "HOME": ESP algorithms loaded: AES(12)_128-MD5(1)_128 000 "HOME": ESP algorithm newest: AES_128-HMAC_MD5; pfsgroup= 000 000 #10: "HOME":500 STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_REPLACE in 914s; newest IPSEC; eroute owner; isakmp#8; idle; import:admin initiate 000 #10: "HOME" esp.1225acd@217.92.35.33 esp.77a131fd@212.117.175.46 tun.0@217.92.35.33 tun.0@212.117.175.46 ref=0 refhim=4294901761 000 #9: "HOME":500 STATE_QUICK_I2 (sent QI2, IPsec SA established); EVENT_SA_EXPIRE in 759s; isakmp#8; idle; import:admin initiate 000 #9: "HOME" esp.7c42c092@217.92.35.33 esp.37ca9ff0@212.117.175.46 tun.0@217.92.35.33 tun.0@212.117.175.46 ref=0 refhim=4294901761 000 #8: "HOME":500 STATE_MAIN_R3 (sent MR3, ISAKMP SA established); EVENT_SA_REPLACE in 6483s; newest ISAKMP; lastdpd=41s(seq in:0 out:0); idle; import:admin initiate 000 + _________________________ ifconfig-a + + ifconfig -a eth0 Link encap:Ethernet HWaddr 00:21:85:63:2f:76 inet addr:212.117.175.46 Bcast:212.117.175.255 Mask:255.255.255.0 inet6 addr: fe80::221:85ff:fe63:2f76/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:2267972 errors:0 dropped:0 overruns:0 frame:0 TX packets:78538 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:235438921 (235.4 MB) TX bytes:42924141 (42.9 MB) Interrupt:25 Base address:0x8000 lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) + _________________________ ip-addr-list + + ip addr list 1: lo: mtu 16436 qdisc noqueue state UNKNOWN link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: eth0: mtu 1500 qdisc pfifo_fast state UNKNOWN qlen 1000 link/ether 00:21:85:63:2f:76 brd ff:ff:ff:ff:ff:ff inet 212.117.175.46/24 brd 212.117.175.255 scope global eth0 inet6 fe80::221:85ff:fe63:2f76/64 scope link valid_lft forever preferred_lft forever + _________________________ ip-route-list + + ip route list 212.117.175.0/24 dev eth0 proto kernel scope link src 212.117.175.46 default via 212.117.175.1 dev eth0 metric 100 + _________________________ ip-rule-list + + ip rule list 0: from all lookup local 32766: from all lookup main 32767: from all lookup default + _________________________ ipsec_verify + + ipsec verify --nocolour Checking your system to see if IPsec got installed and started correctly: Version check and ipsec on-path [OK] Linux Openswan U2.6.23/K2.6.32-22-generic (netkey) Checking for IPsec support in kernel [OK] NETKEY detected, testing for disabled ICMP send_redirects [OK] NETKEY detected, testing for disabled ICMP accept_redirects [OK] Checking for RSA private key (/etc/ipsec.secrets) [OK] Checking that pluto is running [OK] Pluto listening for IKE on udp 500 [OK] Pluto listening for NAT-T on udp 4500 [FAILED] Checking for 'ip' command [OK] Checking for 'iptables' command [OK] Opportunistic Encryption Support [DISABLED] + _________________________ mii-tool + + [ -x /sbin/mii-tool ] + /sbin/mii-tool -v eth0: negotiated 100baseTx-FD, link ok product info: vendor 00:07:32, model 17 rev 2 basic mode: autonegotiation enabled basic status: autonegotiation complete, link ok capabilities: 1000baseT-HD 1000baseT-FD 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD advertising: 100baseTx-FD 100baseTx-HD 10baseT-FD 10baseT-HD flow-control link partner: 100baseTx-FD 100baseTx-HD + _________________________ ipsec/directory + + ipsec --directory /usr/lib/ipsec + _________________________ hostname/fqdn + + hostname --fqdn W026.server.lu + _________________________ hostname/ipaddress + + hostname --ip-address 212.117.175.46 + _________________________ uptime + + uptime 20:51:37 up 3:39, 4 users, load average: 0.04, 0.02, 0.00 + _________________________ ps + + ps alxwf + egrep -i ppid|pluto|ipsec|klips F UID PID PPID PRI NI VSZ RSS WCHAN STAT TTY TIME COMMAND 4 0 4510 4352 20 0 4092 636 wait S+ pts/3 0:00 \_ /bin/sh /usr/lib/ipsec/barf 0 0 4589 4510 20 0 6148 656 pipe_w S+ pts/3 0:00 \_ egrep -i ppid|pluto|ipsec|klips 1 0 3991 1 20 0 9276 544 wait S pts/1 0:00 /bin/bash /usr/lib/ipsec/_plutorun --debug --uniqueids yes --force_busy no --nocrsend no --strictcrlpolicy no --nat_traversal no --keep_alive --protostack netkey --force_keepalive no --disable_port_floating no --virtual_private %v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12 --crlcheckinterval 0 --ocspuri --nhelpers --dump --opts --stderrlog --wait no --pre --post --log user.debug --plutorestartoncrash true --pid /var/run/pluto/pluto.pid 1 0 3993 3991 20 0 9276 732 wait S pts/1 0:00 \_ /bin/bash /usr/lib/ipsec/_plutorun --debug --uniqueids yes --force_busy no --nocrsend no --strictcrlpolicy no --nat_traversal no --keep_alive --protostack netkey --force_keepalive no --disable_port_floating no --virtual_private %v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12 --crlcheckinterval 0 --ocspuri --nhelpers --dump --opts --stderrlog --wait no --pre --post --log user.debug --plutorestartoncrash true --pid /var/run/pluto/pluto.pid 4 0 3997 3993 20 0 62776 3448 poll_s S pts/1 0:00 | \_ /usr/lib/ipsec/pluto --nofork --secretsfile /etc/ipsec.secrets --ipsecdir /etc/ipsec.d --use-netkey --uniqueids --virtual_private %v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12 1 0 4001 3997 30 10 62760 1264 unix_s SN pts/1 0:00 | \_ pluto helper # 0 0 0 4026 3997 20 0 6012 388 poll_s S pts/1 0:00 | \_ _pluto_adns 4 0 3994 3991 20 0 4092 604 pipe_w S pts/1 0:00 \_ /bin/sh /usr/lib/ipsec/_plutoload --wait no --post 4 0 3992 1 20 0 3996 648 pipe_w S pts/1 0:00 logger -s -p user.debug -t ipsec__plutorun + _________________________ ipsec/showdefaults + + ipsec showdefaults routephys=eth0 routevirt=none routeaddr=212.117.175.46 routenexthop=212.117.175.1 + _________________________ ipsec/conf + + ipsec _include /etc/ipsec.conf + ipsec _keycensor #< /etc/ipsec.conf 1 # /etc/ipsec.conf - Openswan IPsec configuration file # RCSID $Id: ipsec.conf.in,v 1.16 2005/07/26 12:29:45 ken Exp $ # This file: /usr/share/doc/openswan/ipsec.conf-sample # # Manual: ipsec.conf.5 version 2.0 # conforms to second version of ipsec.conf specification # basic configuration config setup forwardcontrol=yes interfaces=%defaultroute nat_traversal=no oe=off protostack=netkey syslog=user.debug virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12 # Add connections here # sample VPN connection # for more examples, see /etc/ipsec.d/examples/ #conn sample # # Left security gateway, subnet behind it, nexthop toward right. # left=10.0.0.1 # leftsubnet=172.16.0.0/24 # leftnexthop= # # Right security gateway, subnet behind it, nexthop toward left. # right=10.12.12.1 # rightsubnet=192.168.0.0/24 # rightnexthop=10.101.102.103 # # To authorize this connection, but not actually start it, # # at startup, uncomment this. # #auto=start #Home #conn tunnelipsec #type=tunnel #authby=secret #left=212.117.175.46 #leftnexthop=212.117.175.1 #leftsubnet=212.117.175.0/24 #right=217.92.35.33 #rightnexthop=%defaultroute #rightsubnet=10.70.0.0/16 #esp=!aes256-md5 #keyexchange=ike #pfs=no #auto=start conn HOME auth=esp authby=secret auto=start esp=aes-128-md5 ike=aes256 ikelifetime=8000s keylife=2000s left=212.117.175.46 leftid=212.117.175.46 leftnexthop=%defaultroute leftsubnet=0.0.0.0/0 pfs=no right=217.92.35.33 rightid=217.92.35.33 rightnexthop=%defaultroute rightsubnet=10.70.0.0/24 type=tunnel + _________________________ ipsec/secrets + + ipsec _include /etc/ipsec.secrets + ipsec _secretcensor #< /etc/ipsec.secrets 1 : RSA { # RSA 2192 bits W026 Fri Apr 22 16:06:36 2011 # for signatures only, UNSAFE FOR ENCRYPTION #pubkey=[keyid AQPPVEU1A] Modulus: [...] PublicExponent: [...] # everything after this point is secret PrivateExponent: [...] Prime1: [...] Prime2: [...] Exponent1: [...] Exponent2: [...] Coefficient: [...] } # do not change the indenting of that "[sums to 7d9d...]" : PSK "[sums to 1a3a...]" + _________________________ ipsec/listall + + ipsec auto --listall 000 000 List of Public Keys: 000 000 List of Pre-shared secrets (from /etc/ipsec.secrets) 000 16: PSK (none) (none) 000 1: RSA (none) (none) + [ /etc/ipsec.d/policies ] + basename /etc/ipsec.d/policies/block + base=block + _________________________ ipsec/policies/block + + cat /etc/ipsec.d/policies/block # This file defines the set of CIDRs (network/mask-length) to which # communication should never be allowed. # # See /usr/share/doc/openswan/policygroups.html for details. # # $Id: block.in,v 1.4 2003/02/17 02:22:15 mcr Exp $ # + basename /etc/ipsec.d/policies/clear + base=clear + _________________________ ipsec/policies/clear + + cat /etc/ipsec.d/policies/clear # This file defines the set of CIDRs (network/mask-length) to which # communication should always be in the clear. # # See /usr/share/doc/openswan/policygroups.html for details. # # root name servers should be in the clear 192.58.128.30/32 198.41.0.4/32 192.228.79.201/32 192.33.4.12/32 128.8.10.90/32 192.203.230.10/32 192.5.5.241/32 192.112.36.4/32 128.63.2.53/32 192.36.148.17/32 193.0.14.129/32 199.7.83.42/32 202.12.27.33/32 + basename /etc/ipsec.d/policies/clear-or-private + base=clear-or-private + _________________________ ipsec/policies/clear-or-private + + cat /etc/ipsec.d/policies/clear-or-private # This file defines the set of CIDRs (network/mask-length) to which # we will communicate in the clear, or, if the other side initiates IPSEC, # using encryption. This behaviour is also called "Opportunistic Responder". # # See /usr/share/doc/openswan/policygroups.html for details. # # $Id: clear-or-private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $ # + basename /etc/ipsec.d/policies/private + base=private + _________________________ ipsec/policies/private + + cat /etc/ipsec.d/policies/private # This file defines the set of CIDRs (network/mask-length) to which # communication should always be private (i.e. encrypted). # See /usr/share/doc/openswan/policygroups.html for details. # # $Id: private.in,v 1.4 2003/02/17 02:22:15 mcr Exp $ # + basename /etc/ipsec.d/policies/private-or-clear + base=private-or-clear + _________________________ ipsec/policies/private-or-clear + + cat /etc/ipsec.d/policies/private-or-clear # This file defines the set of CIDRs (network/mask-length) to which # communication should be private, if possible, but in the clear otherwise. # # If the target has a TXT (later IPSECKEY) record that specifies # authentication material, we will require private (i.e. encrypted) # communications. If no such record is found, communications will be # in the clear. # # See /usr/share/doc/openswan/policygroups.html for details. # # $Id: private-or-clear.in,v 1.5 2003/02/17 02:22:15 mcr Exp $ # 0.0.0.0/0 + _________________________ ipsec/ls-libdir + + ls -l /usr/lib/ipsec total 2616 -rwxr-xr-x 1 root root 10712 Nov 14 2009 _copyright -rwxr-xr-x 1 root root 2379 Nov 14 2009 _include -rwxr-xr-x 1 root root 1475 Nov 14 2009 _keycensor -rwxr-xr-x 1 root root 14776 Nov 14 2009 _pluto_adns -rwxr-xr-x 1 root root 2632 Nov 14 2009 _plutoload -rwxr-xr-x 1 root root 7621 Nov 14 2009 _plutorun -rwxr-xr-x 1 root root 12943 Nov 14 2009 _realsetup -rwxr-xr-x 1 root root 1975 Nov 14 2009 _secretcensor -rwxr-xr-x 1 root root 8567 Nov 14 2009 _startklips -rwxr-xr-x 1 root root 8567 Nov 14 2009 _startklips.old -rwxr-xr-x 1 root root 5917 Nov 14 2009 _startnetkey -rwxr-xr-x 1 root root 4868 Nov 14 2009 _updown -rwxr-xr-x 1 root root 14022 Nov 14 2009 _updown.klips -rwxr-xr-x 1 root root 14022 Nov 14 2009 _updown.klips.old -rwxr-xr-x 1 root root 11792 Nov 14 2009 _updown.mast -rwxr-xr-x 1 root root 11792 Nov 14 2009 _updown.mast.old -rwxr-xr-x 1 root root 8530 Nov 14 2009 _updown.netkey -rwxr-xr-x 1 root root 218400 Nov 14 2009 addconn -rwxr-xr-x 1 root root 6015 Nov 14 2009 auto -rwxr-xr-x 1 root root 10816 Nov 14 2009 barf -rwxr-xr-x 1 root root 103368 Nov 14 2009 eroute -rwxr-xr-x 1 root root 27120 Nov 14 2009 ikeping -rwxr-xr-x 1 root root 74824 Nov 14 2009 klipsdebug -rwxr-xr-x 1 root root 2591 Nov 14 2009 look -rwxr-xr-x 1 root root 2182 Nov 14 2009 newhostkey -rwxr-xr-x 1 root root 66152 Nov 14 2009 pf_key -rwxr-xr-x 1 root root 1137712 Nov 14 2009 pluto -rwxr-xr-x 1 root root 10888 Nov 14 2009 ranbits -rwxr-xr-x 1 root root 23784 Nov 14 2009 rsasigkey -rwxr-xr-x 1 root root 766 Nov 14 2009 secrets lrwxrwxrwx 1 root root 17 Apr 21 21:29 setup -> /etc/init.d/ipsec -rwxr-xr-x 1 root root 1054 Nov 14 2009 showdefaults -rwxr-xr-x 1 root root 290392 Nov 14 2009 showhostkey -rwxr-xr-x 1 root root 27272 Nov 14 2009 showpolicy -rwxr-xr-x 1 root root 165856 Nov 14 2009 spi -rwxr-xr-x 1 root root 86840 Nov 14 2009 spigrp -rwxr-xr-x 1 root root 78312 Nov 14 2009 tncfg -rwxr-xr-x 1 root root 13372 Nov 14 2009 verify -rwxr-xr-x 1 root root 64536 Nov 14 2009 whack + _________________________ ipsec/ls-execdir + + ls -l /usr/lib/ipsec total 2616 -rwxr-xr-x 1 root root 10712 Nov 14 2009 _copyright -rwxr-xr-x 1 root root 2379 Nov 14 2009 _include -rwxr-xr-x 1 root root 1475 Nov 14 2009 _keycensor -rwxr-xr-x 1 root root 14776 Nov 14 2009 _pluto_adns -rwxr-xr-x 1 root root 2632 Nov 14 2009 _plutoload -rwxr-xr-x 1 root root 7621 Nov 14 2009 _plutorun -rwxr-xr-x 1 root root 12943 Nov 14 2009 _realsetup -rwxr-xr-x 1 root root 1975 Nov 14 2009 _secretcensor -rwxr-xr-x 1 root root 8567 Nov 14 2009 _startklips -rwxr-xr-x 1 root root 8567 Nov 14 2009 _startklips.old -rwxr-xr-x 1 root root 5917 Nov 14 2009 _startnetkey -rwxr-xr-x 1 root root 4868 Nov 14 2009 _updown -rwxr-xr-x 1 root root 14022 Nov 14 2009 _updown.klips -rwxr-xr-x 1 root root 14022 Nov 14 2009 _updown.klips.old -rwxr-xr-x 1 root root 11792 Nov 14 2009 _updown.mast -rwxr-xr-x 1 root root 11792 Nov 14 2009 _updown.mast.old -rwxr-xr-x 1 root root 8530 Nov 14 2009 _updown.netkey -rwxr-xr-x 1 root root 218400 Nov 14 2009 addconn -rwxr-xr-x 1 root root 6015 Nov 14 2009 auto -rwxr-xr-x 1 root root 10816 Nov 14 2009 barf -rwxr-xr-x 1 root root 103368 Nov 14 2009 eroute -rwxr-xr-x 1 root root 27120 Nov 14 2009 ikeping -rwxr-xr-x 1 root root 74824 Nov 14 2009 klipsdebug -rwxr-xr-x 1 root root 2591 Nov 14 2009 look -rwxr-xr-x 1 root root 2182 Nov 14 2009 newhostkey -rwxr-xr-x 1 root root 66152 Nov 14 2009 pf_key -rwxr-xr-x 1 root root 1137712 Nov 14 2009 pluto -rwxr-xr-x 1 root root 10888 Nov 14 2009 ranbits -rwxr-xr-x 1 root root 23784 Nov 14 2009 rsasigkey -rwxr-xr-x 1 root root 766 Nov 14 2009 secrets lrwxrwxrwx 1 root root 17 Apr 21 21:29 setup -> /etc/init.d/ipsec -rwxr-xr-x 1 root root 1054 Nov 14 2009 showdefaults -rwxr-xr-x 1 root root 290392 Nov 14 2009 showhostkey -rwxr-xr-x 1 root root 27272 Nov 14 2009 showpolicy -rwxr-xr-x 1 root root 165856 Nov 14 2009 spi -rwxr-xr-x 1 root root 86840 Nov 14 2009 spigrp -rwxr-xr-x 1 root root 78312 Nov 14 2009 tncfg -rwxr-xr-x 1 root root 13372 Nov 14 2009 verify -rwxr-xr-x 1 root root 64536 Nov 14 2009 whack + _________________________ /proc/net/dev + + cat /proc/net/dev Inter-| Receive | Transmit face |bytes packets errs drop fifo frame compressed multicast|bytes packets errs drop fifo colls carrier compressed lo: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 eth0:235440441 2267988 0 0 0 0 0 0 42924524 78543 0 0 0 0 0 0 + _________________________ /proc/net/route + + cat /proc/net/route Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT eth0 00AF75D4 00000000 0001 0 0 0 00FFFFFF 0 0 0 eth0 00000000 01AF75D4 0003 0 0 100 00000000 0 0 0 + _________________________ /proc/sys/net/ipv4/ip_no_pmtu_disc + + cat /proc/sys/net/ipv4/ip_no_pmtu_disc 0 + _________________________ /proc/sys/net/ipv4/ip_forward + + cat /proc/sys/net/ipv4/ip_forward 1 + _________________________ /proc/sys/net/ipv4/tcp_ecn + + cat /proc/sys/net/ipv4/tcp_ecn 2 + _________________________ /proc/sys/net/ipv4/conf/star-rp_filter + + cd /proc/sys/net/ipv4/conf + egrep ^ all/rp_filter default/rp_filter eth0/rp_filter lo/rp_filter all/rp_filter:1 default/rp_filter:1 eth0/rp_filter:1 lo/rp_filter:1 + _________________________ /proc/sys/net/ipv4/conf/star-star-redirects + + cd /proc/sys/net/ipv4/conf + egrep ^ all/accept_redirects all/secure_redirects all/send_redirects default/accept_redirects default/secure_redirects default/send_redirects eth0/accept_redirects eth0/secure_redirects eth0/send_redirects lo/accept_redirects lo/secure_redirects lo/send_redirects all/accept_redirects:0 all/secure_redirects:0 all/send_redirects:0 default/accept_redirects:0 default/secure_redirects:0 default/send_redirects:0 eth0/accept_redirects:0 eth0/secure_redirects:0 eth0/send_redirects:0 lo/accept_redirects:0 lo/secure_redirects:0 lo/send_redirects:0 + _________________________ /proc/sys/net/ipv4/tcp_window_scaling + + cat /proc/sys/net/ipv4/tcp_window_scaling 1 + _________________________ /proc/sys/net/ipv4/tcp_adv_win_scale + + cat /proc/sys/net/ipv4/tcp_adv_win_scale 2 + _________________________ uname-a + + uname -a Linux W026 2.6.32-22-generic #36-Ubuntu SMP Thu Jun 3 19:31:57 UTC 2010 x86_64 GNU/Linux + _________________________ config-built-with + + test -r /proc/config_built_with + _________________________ distro-release + + test -f /etc/redhat-release + test -f /etc/debian-release + test -f /etc/SuSE-release + test -f /etc/mandrake-release + test -f /etc/mandriva-release + test -f /etc/gentoo-release + _________________________ /proc/net/ipsec_version + + test -r /proc/net/ipsec_version + test -r /proc/net/pfkey + uname -r + echo NETKEY (2.6.32-22-generic) support detected NETKEY (2.6.32-22-generic) support detected + _________________________ iptables + + test -r /sbin/iptables + iptables -L -v -n Chain INPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 17 676 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID limit: avg 2/sec burst 5 LOG flags 0 level 4 prefix `INPUT INVALID ' 17 676 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 0 0 MY_DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x00 0 0 MY_DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x03/0x03 0 0 MY_DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x06 0 0 MY_DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x05/0x05 0 0 MY_DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x11/0x01 0 0 MY_DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x18/0x08 0 0 MY_DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x30/0x20 0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 49008 36M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 27 1516 ACCEPT tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80 0 0 ACCEPT tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:25 0 0 ACCEPT tcp -- eth0 * 62.134.40.130 0.0.0.0/0 state NEW tcp dpt:22 3 156 ACCEPT tcp -- eth0 * 217.92.35.33 0.0.0.0/0 state NEW tcp dpt:22 716 37232 ACCEPT tcp -- eth0 * 217.92.35.33 0.0.0.0/0 state NEW 0 0 ACCEPT esp -- eth0 * 217.92.35.33 0.0.0.0/0 state NEW 0 0 ACCEPT udp -- eth0 * 217.92.35.33 0.0.0.0/0 state NEW 0 0 ACCEPT tcp -- eth0 * 217.92.35.33 0.0.0.0/0 state NEW tcp dpt:10000 0 0 ACCEPT tcp -- eth0 * 217.92.35.33 0.0.0.0/0 state NEW tcp dpt:3128 0 0 ACCEPT all -- * * 10.70.0.0/16 0.0.0.0/0 7841 1201K MY_REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 Chain FORWARD (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination Chain OUTPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID limit: avg 2/sec burst 5 LOG flags 0 level 4 prefix `OUTPUT INVALID ' 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 0 0 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0 50447 37M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED 0 0 MY_REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 Chain MY_DROP (7 references) pkts bytes target prot opt in out source destination 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 2/sec burst 5 LOG flags 0 level 4 prefix `PORTSCAN DROP ' 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain MY_REJECT (2 references) pkts bytes target prot opt in out source destination 432 22732 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 2/sec burst 5 LOG flags 0 level 4 prefix `REJECT TCP ' 432 22732 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset 7134 1145K LOG udp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 2/sec burst 5 LOG flags 0 level 4 prefix `REJECT UDP ' 7326 1176K REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable 3 180 LOG icmp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 2/sec burst 5 LOG flags 0 level 4 prefix `DROP ICMP ' 3 180 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0 80 2560 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 2/sec burst 5 LOG flags 0 level 4 prefix `REJECT OTHER ' 80 2560 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-proto-unreachable + _________________________ iptables-nat + + iptables -t nat -L -v -n Chain PREROUTING (policy ACCEPT 146K packets, 13M bytes) pkts bytes target prot opt in out source destination Chain POSTROUTING (policy ACCEPT 3952 packets, 255K bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * eth0 10.70.0.0/16 0.0.0.0/0 Chain OUTPUT (policy ACCEPT 3520 packets, 238K bytes) pkts bytes target prot opt in out source destination + _________________________ iptables-mangle + + iptables -t mangle -L -v -n Chain PREROUTING (policy ACCEPT 195K packets, 49M bytes) pkts bytes target prot opt in out source destination Chain INPUT (policy ACCEPT 57612 packets, 38M bytes) pkts bytes target prot opt in out source destination Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination Chain OUTPUT (policy ACCEPT 50447 packets, 37M bytes) pkts bytes target prot opt in out source destination Chain POSTROUTING (policy ACCEPT 50447 packets, 37M bytes) pkts bytes target prot opt in out source destination + _________________________ /proc/modules + + test -f /proc/modules + cat /proc/modules xfrm_user 21932 2 - Live 0xffffffffa0665000 ah6 5035 0 - Live 0xffffffffa065e000 ah4 4548 0 - Live 0xffffffffa0657000 esp6 5376 0 - Live 0xffffffffa0650000 esp4 5589 4 - Live 0xffffffffa0649000 xfrm4_mode_beet 2131 0 - Live 0xffffffffa0643000 xfrm4_tunnel 1979 0 - Live 0xffffffffa063d000 xfrm4_mode_tunnel 2000 8 - Live 0xffffffffa0637000 xfrm4_mode_transport 1511 0 - Live 0xffffffffa0631000 xfrm6_mode_transport 1575 0 - Live 0xffffffffa062b000 xfrm6_mode_ro 1380 0 - Live 0xffffffffa0625000 xfrm6_mode_beet 2082 0 - Live 0xffffffffa061f000 xfrm6_mode_tunnel 1904 0 - Live 0xffffffffa0619000 ipcomp 2212 0 - Live 0xffffffffa0613000 ipcomp6 2214 0 - Live 0xffffffffa060d000 xfrm6_tunnel 7903 1 ipcomp6, Live 0xffffffffa0606000 af_key 27834 0 - Live 0xffffffffa05eb000 xt_dscp 1829 0 - Live 0xffffffffa0542000 authenc 6760 4 - Live 0xffffffffa053b000 deflate 2181 0 - Live 0xffffffffa0492000 zlib_deflate 21834 1 deflate, Live 0xffffffffa0487000 ctr 4029 0 - Live 0xffffffffa0481000 camellia 19220 0 - Live 0xffffffffa0477000 cast5 15208 0 - Live 0xffffffffa046e000 rmd160 8120 0 - Live 0xffffffffa0467000 sha1_generic 2231 0 - Live 0xffffffffa045b000 crypto_null 2950 0 - Live 0xffffffffa0455000 ccm 8670 0 - Live 0xffffffffa044d000 serpent 18453 0 - Live 0xffffffffa0443000 blowfish 7882 0 - Live 0xffffffffa043c000 twofish 5899 0 - Live 0xffffffffa0435000 twofish_common 14631 1 twofish, Live 0xffffffffa042c000 xcbc 2847 0 - Live 0xffffffffa0426000 sha256_generic 10327 0 - Live 0xffffffffa041e000 sha512_generic 4972 0 - Live 0xffffffffa0417000 des_generic 16599 0 - Live 0xffffffffa040d000 cryptd 8116 0 - Live 0xffffffffa03f5000 aes_x86_64 7912 4 - Live 0xffffffffa03ee000 aes_generic 27607 1 aes_x86_64, Live 0xffffffffa03d5000 tunnel4 2909 1 xfrm4_tunnel, Live 0xffffffffa039b000 xfrm_ipcomp 5116 2 ipcomp,ipcomp6, Live 0xffffffffa0364000 tunnel6 2712 1 xfrm6_tunnel, Live 0xffffffffa0357000 ipt_REJECT 2384 3 - Live 0xffffffffa0336000 xt_tcpudp 2667 13 - Live 0xffffffffa0330000 ipt_LOG 5370 7 - Live 0xffffffffa0329000 xt_limit 2180 7 - Live 0xffffffffa0323000 xt_state 1490 15 - Live 0xffffffffa031d000 iptable_filter 2791 1 - Live 0xffffffffa0317000 iptable_nat 5219 1 - Live 0xffffffffa0310000 nf_nat 19501 1 iptable_nat, Live 0xffffffffa0304000 nf_conntrack_ipv4 12980 18 iptable_nat,nf_nat, Live 0xffffffffa02fa000 fbcon 39270 71 - Live 0xffffffffa02ea000 tileblit 2487 1 fbcon, Live 0xffffffffa02e4000 font 8053 1 fbcon, Live 0xffffffffa02dd000 bitblit 5811 1 fbcon, Live 0xffffffffa02d6000 softcursor 1565 1 bitblit, Live 0xffffffffa02d0000 nf_conntrack 73934 4 xt_state,iptable_nat,nf_nat,nf_conntrack_ipv4, Live 0xffffffffa02b1000 nf_defrag_ipv4 1481 1 nf_conntrack_ipv4, Live 0xffffffffa02ab000 vga16fb 12757 1 - Live 0xffffffffa02a1000 vgastate 9857 1 vga16fb, Live 0xffffffffa0299000 iptable_mangle 3315 0 - Live 0xffffffffa0293000 ip_tables 18390 3 iptable_filter,iptable_nat,iptable_mangle, Live 0xffffffffa0288000 x_tables 22429 8 xt_dscp,ipt_REJECT,xt_tcpudp,ipt_LOG,xt_limit,xt_state,iptable_nat,ip_tables, Live 0xffffffffa027a000 radeon 739595 0 - Live 0xffffffffa01a9000 ttm 60815 1 radeon, Live 0xffffffffa018f000 drm_kms_helper 30742 1 radeon, Live 0xffffffffa0180000 drm 198770 3 radeon,ttm,drm_kms_helper, Live 0xffffffffa013b000 i2c_algo_bit 6024 1 radeon, Live 0xffffffffa0129000 k8temp 3912 0 - Live 0xffffffffa0123000 edac_core 45423 0 - Live 0xffffffffa010d000 edac_mce_amd 9214 0 - Live 0xffffffffa0105000 i2c_piix4 9639 0 - Live 0xffffffffa00fd000 shpchp 33679 0 - Live 0xffffffffa00ed000 psmouse 64608 0 - Live 0xffffffffa00d5000 serio_raw 4918 0 - Live 0xffffffffa00ce000 lp 9336 0 - Live 0xffffffffa00c5000 parport 37160 1 lp, Live 0xffffffffa00b3000 raid10 21290 0 - Live 0xffffffffa00a7000 raid456 54720 0 - Live 0xffffffffa0092000 async_raid6_recov 5945 1 raid456, Live 0xffffffffa008b000 async_pq 3891 2 raid456,async_raid6_recov, Live 0xffffffffa0085000 raid6_pq 80147 2 async_raid6_recov,async_pq, Live 0xffffffffa006b000 async_xor 3111 3 raid456,async_raid6_recov,async_pq, Live 0xffffffffa0065000 xor 4685 1 async_xor, Live 0xffffffffa005e000 async_memcpy 1537 2 raid456,async_raid6_recov, Live 0xffffffffa0058000 async_tx 2545 5 raid456,async_raid6_recov,async_pq,async_xor,async_memcpy, Live 0xffffffffa0052000 raid1 22226 0 - Live 0xffffffffa0046000 raid0 6778 0 - Live 0xffffffffa003f000 r8169 39650 0 - Live 0xffffffffa002e000 multipath 7149 0 - Live 0xffffffffa0027000 mii 5237 1 r8169, Live 0xffffffffa0020000 ahci 37646 2 - Live 0xffffffffa000e000 pata_atiixp 4209 0 - Live 0xffffffffa0007000 linear 4158 0 - Live 0xffffffffa0000000 + _________________________ /proc/meminfo + + cat /proc/meminfo MemTotal: 2023608 kB MemFree: 1563144 kB Buffers: 60496 kB Cached: 155992 kB SwapCached: 0 kB Active: 226792 kB Inactive: 132436 kB Active(anon): 143048 kB Inactive(anon): 0 kB Active(file): 83744 kB Inactive(file): 132436 kB Unevictable: 0 kB Mlocked: 0 kB SwapTotal: 4200988 kB SwapFree: 4200988 kB Dirty: 92 kB Writeback: 0 kB AnonPages: 142752 kB Mapped: 19852 kB Shmem: 296 kB Slab: 24784 kB SReclaimable: 16508 kB SUnreclaim: 8276 kB KernelStack: 1216 kB PageTables: 6616 kB NFS_Unstable: 0 kB Bounce: 0 kB WritebackTmp: 0 kB CommitLimit: 5212792 kB Committed_AS: 433548 kB VmallocTotal: 34359738367 kB VmallocUsed: 279712 kB VmallocChunk: 34359448904 kB HardwareCorrupted: 0 kB HugePages_Total: 0 HugePages_Free: 0 HugePages_Rsvd: 0 HugePages_Surp: 0 Hugepagesize: 2048 kB DirectMap4k: 6720 kB DirectMap2M: 2056192 kB + _________________________ /proc/net/ipsec-ls + + test -f /proc/net/ipsec_version + _________________________ usr/src/linux/.config + + test -f /proc/config.gz + uname -r + test -f /lib/modules/2.6.32-22-generic/build/.config + egrep CONFIG_IPSEC|CONFIG_KLIPS|CONFIG_NET_KEY|CONFIG_INET|CONFIG_IP|CONFIG_HW_RANDOM|CONFIG_CRYPTO_DEV|_XFRM + uname -r + cat /lib/modules/2.6.32-22-generic/build/.config CONFIG_IPC_NS=y CONFIG_XFRM=y CONFIG_XFRM_USER=m # CONFIG_XFRM_SUB_POLICY is not set # CONFIG_XFRM_MIGRATE is not set # CONFIG_XFRM_STATISTICS is not set CONFIG_XFRM_IPCOMP=m CONFIG_NET_KEY=m # CONFIG_NET_KEY_MIGRATE is not set CONFIG_INET=y CONFIG_IP_MULTICAST=y CONFIG_IP_ADVANCED_ROUTER=y # CONFIG_IP_FIB_TRIE is not set CONFIG_IP_FIB_HASH=y CONFIG_IP_MULTIPLE_TABLES=y CONFIG_IP_ROUTE_MULTIPATH=y CONFIG_IP_ROUTE_VERBOSE=y # CONFIG_IP_PNP is not set CONFIG_IP_MROUTE=y CONFIG_IP_PIMSM_V1=y CONFIG_IP_PIMSM_V2=y CONFIG_INET_AH=m CONFIG_INET_ESP=m CONFIG_INET_IPCOMP=m CONFIG_INET_XFRM_TUNNEL=m CONFIG_INET_TUNNEL=m CONFIG_INET_XFRM_MODE_TRANSPORT=m CONFIG_INET_XFRM_MODE_TUNNEL=m CONFIG_INET_XFRM_MODE_BEET=m CONFIG_INET_LRO=y CONFIG_INET_DIAG=y CONFIG_INET_TCP_DIAG=y CONFIG_IPV6=y CONFIG_IPV6_PRIVACY=y # CONFIG_IPV6_ROUTER_PREF is not set # CONFIG_IPV6_OPTIMISTIC_DAD is not set CONFIG_INET6_AH=m CONFIG_INET6_ESP=m CONFIG_INET6_IPCOMP=m # CONFIG_IPV6_MIP6 is not set CONFIG_INET6_XFRM_TUNNEL=m CONFIG_INET6_TUNNEL=m CONFIG_INET6_XFRM_MODE_TRANSPORT=m CONFIG_INET6_XFRM_MODE_TUNNEL=m CONFIG_INET6_XFRM_MODE_BEET=m CONFIG_INET6_XFRM_MODE_ROUTEOPTIMIZATION=m CONFIG_IPV6_SIT=m CONFIG_IPV6_NDISC_NODETYPE=y CONFIG_IPV6_TUNNEL=m CONFIG_IPV6_MULTIPLE_TABLES=y # CONFIG_IPV6_SUBTREES is not set # CONFIG_IPV6_MROUTE is not set CONFIG_IP_VS=m CONFIG_IP_VS_IPV6=y # CONFIG_IP_VS_DEBUG is not set CONFIG_IP_VS_TAB_BITS=12 CONFIG_IP_VS_PROTO_TCP=y CONFIG_IP_VS_PROTO_UDP=y CONFIG_IP_VS_PROTO_AH_ESP=y CONFIG_IP_VS_PROTO_ESP=y CONFIG_IP_VS_PROTO_AH=y CONFIG_IP_VS_RR=m CONFIG_IP_VS_WRR=m CONFIG_IP_VS_LC=m CONFIG_IP_VS_WLC=m CONFIG_IP_VS_LBLC=m CONFIG_IP_VS_LBLCR=m CONFIG_IP_VS_DH=m CONFIG_IP_VS_SH=m CONFIG_IP_VS_SED=m CONFIG_IP_VS_NQ=m CONFIG_IP_VS_FTP=m CONFIG_IP_NF_QUEUE=m CONFIG_IP_NF_IPTABLES=m CONFIG_IP_NF_MATCH_ADDRTYPE=m CONFIG_IP_NF_MATCH_AH=m CONFIG_IP_NF_MATCH_ECN=m CONFIG_IP_NF_MATCH_TTL=m CONFIG_IP_NF_FILTER=m CONFIG_IP_NF_TARGET_REJECT=m CONFIG_IP_NF_TARGET_LOG=m CONFIG_IP_NF_TARGET_ULOG=m CONFIG_IP_NF_TARGET_MASQUERADE=m CONFIG_IP_NF_TARGET_NETMAP=m CONFIG_IP_NF_TARGET_REDIRECT=m CONFIG_IP_NF_MANGLE=m CONFIG_IP_NF_TARGET_CLUSTERIP=m CONFIG_IP_NF_TARGET_ECN=m CONFIG_IP_NF_TARGET_TTL=m CONFIG_IP_NF_RAW=m CONFIG_IP_NF_SECURITY=m CONFIG_IP_NF_ARPTABLES=m CONFIG_IP_NF_ARPFILTER=m CONFIG_IP_NF_ARP_MANGLE=m CONFIG_IP6_NF_QUEUE=m CONFIG_IP6_NF_IPTABLES=m CONFIG_IP6_NF_MATCH_AH=m CONFIG_IP6_NF_MATCH_EUI64=m CONFIG_IP6_NF_MATCH_FRAG=m CONFIG_IP6_NF_MATCH_OPTS=m CONFIG_IP6_NF_MATCH_HL=m CONFIG_IP6_NF_MATCH_IPV6HEADER=m CONFIG_IP6_NF_MATCH_MH=m CONFIG_IP6_NF_MATCH_RT=m CONFIG_IP6_NF_TARGET_HL=m CONFIG_IP6_NF_TARGET_LOG=m CONFIG_IP6_NF_FILTER=m CONFIG_IP6_NF_TARGET_REJECT=m CONFIG_IP6_NF_MANGLE=m CONFIG_IP6_NF_RAW=m CONFIG_IP6_NF_SECURITY=m CONFIG_IP_DCCP=m CONFIG_INET_DCCP_DIAG=m # CONFIG_IP_DCCP_CCID2_DEBUG is not set CONFIG_IP_DCCP_CCID3=y # CONFIG_IP_DCCP_CCID3_DEBUG is not set CONFIG_IP_DCCP_CCID3_RTO=100 CONFIG_IP_DCCP_TFRC_LIB=y # CONFIG_IP_DCCP_DEBUG is not set CONFIG_IP_SCTP=m CONFIG_IPX=m # CONFIG_IPX_INTERN is not set CONFIG_IPDDP=m CONFIG_IPDDP_ENCAP=y CONFIG_IPDDP_DECAP=y CONFIG_IP1000=m CONFIG_IPW2100=m CONFIG_IPW2100_MONITOR=y # CONFIG_IPW2100_DEBUG is not set CONFIG_IPW2200=m CONFIG_IPW2200_MONITOR=y CONFIG_IPW2200_RADIOTAP=y CONFIG_IPW2200_PROMISCUOUS=y CONFIG_IPW2200_QOS=y # CONFIG_IPW2200_DEBUG is not set CONFIG_IPPP_FILTER=y CONFIG_IPMI_HANDLER=m # CONFIG_IPMI_PANIC_EVENT is not set CONFIG_IPMI_DEVICE_INTERFACE=m CONFIG_IPMI_SI=m CONFIG_IPMI_WATCHDOG=m CONFIG_IPMI_POWEROFF=m CONFIG_HW_RANDOM=y CONFIG_HW_RANDOM_TIMERIOMEM=m CONFIG_HW_RANDOM_INTEL=m CONFIG_HW_RANDOM_AMD=m CONFIG_HW_RANDOM_VIA=m CONFIG_HW_RANDOM_VIRTIO=m CONFIG_IPWIRELESS=m # CONFIG_SECURITY_NETWORK_XFRM is not set CONFIG_CRYPTO_DEV_PADLOCK=y CONFIG_CRYPTO_DEV_PADLOCK_AES=m CONFIG_CRYPTO_DEV_PADLOCK_SHA=m CONFIG_CRYPTO_DEV_HIFN_795X=m CONFIG_CRYPTO_DEV_HIFN_795X_RNG=y + _________________________ etc/syslog.conf + + _________________________ etc/syslog-ng/syslog-ng.conf + + cat /etc/syslog-ng/syslog-ng.conf cat: /etc/syslog-ng/syslog-ng.conf: No such file or directory + cat /etc/syslog.conf # /etc/syslog.conf Configuration file for syslogd. # # For more information see syslog.conf(5) # manpage. # # First some standard logfiles. Log by facility. # auth,authpriv.* /var/log/auth.log *.*;auth,authpriv.none -/var/log/syslog #cron.* /var/log/cron.log daemon.* -/var/log/daemon.log kern.* -/var/log/kern.log lpr.* -/var/log/lpr.log mail.* -/var/log/mail.log user.* -/var/log/user.log # # Logging for the mail system. Split it up so that # it is easy to write scripts to parse these files. # mail.info -/var/log/mail.info mail.warning -/var/log/mail.warn mail.err /var/log/mail.err # Logging for INN news system # news.crit /var/log/news/news.crit news.err /var/log/news/news.err news.notice -/var/log/news/news.notice # # Some `catch-all' logfiles. # *.=debug;\ auth,authpriv.none;\ news.none;mail.none -/var/log/debug *.=info;*.=notice;*.=warning;\ auth,authpriv.none;\ cron,daemon.none;\ mail,news.none -/var/log/messages # # Emergencies are sent to everybody logged in. # *.emerg * # # I like to have messages displayed on the console, but only on a virtual # console I usually leave idle. # #daemon,mail.*;\ # news.=crit;news.=err;news.=notice;\ # *.=debug;*.=info;\ # *.=notice;*.=warning /dev/tty8 # The named pipe /dev/xconsole is for the `xconsole' utility. To use it, # you must invoke `xconsole' with the `-file' option: # # $ xconsole -file /dev/xconsole [...] # # NOTE: adjust the list below, or you'll go crazy if you have a reasonably # busy site.. # daemon.*;mail.*;\ news.err;\ *.=debug;*.=info;\ *.=notice;*.=warning |/dev/xconsole + _________________________ etc/resolv.conf + + cat /etc/resolv.conf search server.lu nameserver 195.24.72.6 nameserver 83.243.8.6 + _________________________ lib/modules-ls + + ls -ltr /lib/modules total 4 drwxr-xr-x 4 root root 4096 Nov 11 10:11 2.6.32-22-generic + _________________________ fipscheck + + cat /proc/sys/crypto/fips_enabled 0 + _________________________ /proc/ksyms-netif_rx + + test -r /proc/ksyms + test -r /proc/kallsyms + egrep netif_rx /proc/kallsyms ffffffff81460ad0 T netif_rx ffffffff81460d80 T netif_rx_ni ffffffff817588e0 r __ksymtab_netif_rx_ni ffffffff817588f0 r __ksymtab_netif_rx ffffffff81767468 r __kcrctab_netif_rx_ni ffffffff81767470 r __kcrctab_netif_rx ffffffff8177fa08 r __kstrtab_netif_rx_ni ffffffff8177fa14 r __kstrtab_netif_rx + _________________________ lib/modules-netif_rx + + modulegoo kernel/net/ipv4/ipip.o netif_rx + set +x 2.6.32-22-generic: + _________________________ kern.debug + + test -f /var/log/kern.debug + _________________________ klog + + sed -n 80495,$p /var/log/syslog + egrep -i ipsec|klips|pluto + cat Apr 29 20:09:12 W026 ipsec_setup: Starting Openswan IPsec U2.6.23/K2.6.32-22-generic... Apr 29 20:09:12 W026 ipsec_setup: Using NETKEY(XFRM) stack Apr 29 20:09:12 W026 ipsec_setup: Warning: ignored obsolete keyword (null) Apr 29 20:09:12 W026 ipsec_starter[3987]: Warning: ignored obsolete keyword (null) Apr 29 20:09:12 W026 ipsec_setup: ...Openswan IPsec started Apr 29 20:09:12 W026 ipsec__plutorun: Warning: ignored obsolete keyword (null) Apr 29 20:09:12 W026 ipsec_starter[3998]: Warning: ignored obsolete keyword (null) Apr 29 20:09:12 W026 ipsec__plutorun: adjusting ipsec.d to /etc/ipsec.d Apr 29 20:09:12 W026 pluto: adjusting ipsec.d to /etc/ipsec.d Apr 29 20:09:12 W026 ipsec__plutorun: Warning: ignored obsolete keyword (null) Apr 29 20:09:12 W026 ipsec_starter[3999]: Warning: ignored obsolete keyword (null) Apr 29 20:09:12 W026 ipsec__plutorun: Warning: ignored obsolete keyword (null) Apr 29 20:09:12 W026 ipsec_starter[4000]: Warning: ignored obsolete keyword (null) Apr 29 20:09:12 W026 ipsec__plutorun: 002 added connection description "HOME" Apr 29 20:09:12 W026 ipsec__plutorun: 104 "HOME" #1: STATE_MAIN_I1: initiate + _________________________ plog + + sed -n 6550,$p /var/log/auth.log + egrep -i pluto + cat Apr 29 20:09:12 W026 ipsec__plutorun: Starting Pluto subsystem... Apr 29 20:09:12 W026 pluto[3997]: Starting Pluto (Openswan Version 2.6.23; Vendor ID OEm@kgSFEH@\177) pid:3997 Apr 29 20:09:12 W026 pluto[3997]: Setting NAT-Traversal port-4500 floating to off Apr 29 20:09:12 W026 pluto[3997]: port floating activation criteria nat_t=0/port_float=1 Apr 29 20:09:12 W026 pluto[3997]: including NAT-Traversal patch (Version 0.6c) [disabled] Apr 29 20:09:12 W026 pluto[3997]: using /dev/urandom as source of random entropy Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC_SSH: Ok (ret=0) Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): Activating OAKLEY_TWOFISH_CBC: Ok (ret=0) Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): Activating OAKLEY_SERPENT_CBC: Ok (ret=0) Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0) Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): Activating OAKLEY_BLOWFISH_CBC: Ok (ret=0) Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0) Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0) Apr 29 20:09:12 W026 pluto[3997]: starting up 1 cryptographic helpers Apr 29 20:09:12 W026 pluto[3997]: started helper pid=4001 (fd:7) Apr 29 20:09:12 W026 pluto[3997]: Using Linux 2.6 IPsec interface code on 2.6.32-22-generic (experimental code) Apr 29 20:09:12 W026 pluto[4001]: using /dev/urandom as source of random entropy Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): WARNING: enc alg=0 not found in constants.c:oakley_enc_names Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): Activating : Ok (ret=0) Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): WARNING: enc alg=0 not found in constants.c:oakley_enc_names Apr 29 20:09:12 W026 pluto[3997]: ike_alg_add(): ERROR: Algorithm already exists Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): Activating : FAILED (ret=-17) Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): WARNING: enc alg=0 not found in constants.c:oakley_enc_names Apr 29 20:09:12 W026 pluto[3997]: ike_alg_add(): ERROR: Algorithm already exists Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): Activating : FAILED (ret=-17) Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): WARNING: enc alg=0 not found in constants.c:oakley_enc_names Apr 29 20:09:12 W026 pluto[3997]: ike_alg_add(): ERROR: Algorithm already exists Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): Activating : FAILED (ret=-17) Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): WARNING: enc alg=0 not found in constants.c:oakley_enc_names Apr 29 20:09:12 W026 pluto[3997]: ike_alg_add(): ERROR: Algorithm already exists Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): Activating : FAILED (ret=-17) Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): WARNING: enc alg=0 not found in constants.c:oakley_enc_names Apr 29 20:09:12 W026 pluto[3997]: ike_alg_add(): ERROR: Algorithm already exists Apr 29 20:09:12 W026 pluto[3997]: ike_alg_register_enc(): Activating : FAILED (ret=-17) Apr 29 20:09:12 W026 pluto[3997]: Changed path to directory '/etc/ipsec.d/cacerts' Apr 29 20:09:12 W026 pluto[3997]: Changed path to directory '/etc/ipsec.d/aacerts' Apr 29 20:09:12 W026 pluto[3997]: Changed path to directory '/etc/ipsec.d/ocspcerts' Apr 29 20:09:12 W026 pluto[3997]: Changing to directory '/etc/ipsec.d/crls' Apr 29 20:09:12 W026 pluto[3997]: Warning: empty directory Apr 29 20:09:12 W026 pluto[3997]: added connection description "HOME" Apr 29 20:09:12 W026 pluto[3997]: listening for IKE messages Apr 29 20:09:12 W026 pluto[3997]: adding interface eth0/eth0 212.117.175.46:500 Apr 29 20:09:12 W026 pluto[3997]: adding interface lo/lo 127.0.0.1:500 Apr 29 20:09:12 W026 pluto[3997]: adding interface lo/lo ::1:500 Apr 29 20:09:12 W026 pluto[3997]: loading secrets from "/etc/ipsec.secrets" Apr 29 20:09:12 W026 pluto[3997]: loaded private key for keyid: PPK_RSA:AQPPVEU1A Apr 29 20:09:12 W026 pluto[3997]: "HOME" #1: initiating Main Mode Apr 29 20:09:12 W026 pluto[3997]: "HOME" #1: ignoring unknown Vendor ID payload [eeefa37809e32ad4de4f6b010c26a640] Apr 29 20:09:12 W026 pluto[3997]: "HOME" #1: received Vendor ID payload [Dead Peer Detection] Apr 29 20:09:12 W026 pluto[3997]: "HOME" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 Apr 29 20:09:12 W026 pluto[3997]: "HOME" #1: STATE_MAIN_I2: sent MI2, expecting MR2 Apr 29 20:09:12 W026 pluto[3997]: "HOME" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 Apr 29 20:09:12 W026 pluto[3997]: "HOME" #1: STATE_MAIN_I3: sent MI3, expecting MR3 Apr 29 20:09:12 W026 pluto[3997]: "HOME" #1: Main mode peer ID is ID_IPV4_ADDR: '217.92.35.33' Apr 29 20:09:12 W026 pluto[3997]: "HOME" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 Apr 29 20:09:12 W026 pluto[3997]: "HOME" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_md5 group=modp1024} Apr 29 20:09:12 W026 pluto[3997]: "HOME" #2: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW {using isakmp#1 msgid:237da522 proposal=AES(12)_128-MD5(1)_128 pfsgroup=no-pfs} Apr 29 20:09:12 W026 pluto[3997]: "HOME" #2: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 Apr 29 20:09:12 W026 pluto[3997]: "HOME" #2: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x071b86f5 <0xdfc062fc xfrm=AES_128-HMAC_MD5 NATOA=none NATD=none DPD=none} Apr 29 20:09:20 W026 pluto[3997]: "HOME" #1: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:09:20 W026 pluto[3997]: "HOME" #1: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:09:20 W026 pluto[3997]: "HOME" #1: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:09:27 W026 pluto[3997]: "HOME" #1: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:09:27 W026 pluto[3997]: "HOME" #1: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:09:27 W026 pluto[3997]: "HOME" #1: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:09:32 W026 pluto[3997]: "HOME" #1: received Delete SA payload: replace IPSEC State #2 in 10 seconds Apr 29 20:09:32 W026 pluto[3997]: "HOME" #1: received and ignored informational message Apr 29 20:09:32 W026 pluto[3997]: "HOME" #1: received Delete SA payload: deleting ISAKMP State #1 Apr 29 20:09:32 W026 pluto[3997]: packet from 217.92.35.33:500: received and ignored informational message Apr 29 20:09:32 W026 pluto[3997]: ERROR: asynchronous network error report on eth0 (sport=500) for message to 217.92.35.33 port 500, complainant 217.92.35.33: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] Apr 29 20:09:32 W026 pluto[3997]: packet from 217.92.35.33:500: ignoring informational payload, type INVALID_COOKIE on st==NULL (deleted?) Apr 29 20:09:32 W026 pluto[3997]: packet from 217.92.35.33:500: received and ignored informational message Apr 29 20:09:42 W026 pluto[3997]: packet from 217.92.35.33:500: ignoring unknown Vendor ID payload [eeefa37809e32ad4de4f6b010c26a640] Apr 29 20:09:42 W026 pluto[3997]: packet from 217.92.35.33:500: received Vendor ID payload [Dead Peer Detection] Apr 29 20:09:42 W026 pluto[3997]: "HOME" #3: responding to Main Mode Apr 29 20:09:42 W026 pluto[3997]: "HOME" #3: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 Apr 29 20:09:42 W026 pluto[3997]: "HOME" #3: STATE_MAIN_R1: sent MR1, expecting MI2 Apr 29 20:09:42 W026 pluto[3997]: "HOME" #4: initiating Main Mode Apr 29 20:09:42 W026 pluto[3997]: "HOME" #3: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 Apr 29 20:09:42 W026 pluto[3997]: ERROR: asynchronous network error report on eth0 (sport=500) for message to 217.92.35.33 port 500, complainant 217.92.35.33: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] Apr 29 20:09:42 W026 pluto[3997]: "HOME" #3: STATE_MAIN_R2: sent MR2, expecting MI3 Apr 29 20:09:42 W026 pluto[3997]: "HOME" #3: Main mode peer ID is ID_IPV4_ADDR: '217.92.35.33' Apr 29 20:09:42 W026 pluto[3997]: "HOME" #3: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 Apr 29 20:09:42 W026 pluto[3997]: "HOME" #3: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_md5 group=modp1024} Apr 29 20:09:42 W026 pluto[3997]: "HOME" #3: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:09:42 W026 pluto[3997]: "HOME" #3: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:09:42 W026 pluto[3997]: "HOME" #3: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:09:49 W026 pluto[3997]: "HOME" #3: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:09:49 W026 pluto[3997]: "HOME" #3: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:09:49 W026 pluto[3997]: "HOME" #3: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:09:52 W026 pluto[3997]: "HOME" #2: IPsec SA expired (LATEST!) Apr 29 20:09:52 W026 pluto[3997]: ERROR: asynchronous network error report on eth0 (sport=500) for message to 217.92.35.33 port 500, complainant 217.92.35.33: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] Apr 29 20:09:52 W026 pluto[3997]: "HOME" #4: ignoring unknown Vendor ID payload [eeefa37809e32ad4de4f6b010c26a640] Apr 29 20:09:52 W026 pluto[3997]: "HOME" #4: received Vendor ID payload [Dead Peer Detection] Apr 29 20:09:52 W026 pluto[3997]: "HOME" #4: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 Apr 29 20:09:52 W026 pluto[3997]: "HOME" #4: STATE_MAIN_I2: sent MI2, expecting MR2 Apr 29 20:09:52 W026 pluto[3997]: "HOME" #4: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 Apr 29 20:09:52 W026 pluto[3997]: "HOME" #4: STATE_MAIN_I3: sent MI3, expecting MR3 Apr 29 20:09:52 W026 pluto[3997]: "HOME" #4: Main mode peer ID is ID_IPV4_ADDR: '217.92.35.33' Apr 29 20:09:52 W026 pluto[3997]: "HOME" #4: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 Apr 29 20:09:52 W026 pluto[3997]: "HOME" #4: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_md5 group=modp1024} Apr 29 20:09:52 W026 pluto[3997]: "HOME" #5: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW {using isakmp#4 msgid:b92a7b82 proposal=AES(12)_128-MD5(1)_128 pfsgroup=no-pfs} Apr 29 20:09:53 W026 pluto[3997]: "HOME" #5: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 Apr 29 20:09:53 W026 pluto[3997]: "HOME" #5: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x39f8b931 <0xd6495742 xfrm=AES_128-HMAC_MD5 NATOA=none NATD=none DPD=none} Apr 29 20:09:59 W026 pluto[3997]: "HOME" #3: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:09:59 W026 pluto[3997]: "HOME" #3: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:09:59 W026 pluto[3997]: "HOME" #3: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:09:59 W026 pluto[3997]: ERROR: asynchronous network error report on eth0 (sport=500) for message to 217.92.35.33 port 500, complainant 217.92.35.33: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] Apr 29 20:09:59 W026 pluto[3997]: "HOME" #3: received 1 malformed payload notifies Apr 29 20:10:09 W026 pluto[3997]: "HOME" #3: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:10:09 W026 pluto[3997]: "HOME" #3: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:10:09 W026 pluto[3997]: "HOME" #3: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:10:09 W026 pluto[3997]: ERROR: asynchronous network error report on eth0 (sport=500) for message to 217.92.35.33 port 500, complainant 217.92.35.33: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] Apr 29 20:10:09 W026 pluto[3997]: "HOME" #3: received 2 malformed payload notifies Apr 29 20:10:25 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:10:25 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:10:25 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:10:32 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:10:32 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:10:32 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:10:41 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:10:41 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:10:41 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:10:52 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:10:52 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:10:52 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:11:09 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:11:09 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:11:09 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:11:16 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:11:16 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:11:16 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:11:25 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:11:25 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:11:25 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:11:36 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:11:36 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:11:36 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:11:47 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:11:47 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:11:47 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:11:54 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:11:54 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:11:54 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:12:03 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:12:03 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:12:03 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:12:14 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:12:14 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:12:14 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:12:29 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:12:29 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:12:29 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:12:36 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:12:36 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:12:36 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:12:45 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:12:45 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:12:45 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:12:56 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:12:56 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:12:56 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:13:13 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:13:13 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:13:13 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:13:20 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:13:20 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:13:20 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:13:29 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:13:29 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:13:29 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:13:40 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:13:40 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:13:40 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:13:52 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:13:52 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:13:52 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:13:59 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:13:59 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:13:59 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:14:08 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:14:08 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:14:08 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:14:19 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:14:19 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:14:19 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:14:33 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:14:33 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:14:33 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:14:40 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:14:40 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:14:40 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:14:49 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:14:49 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:14:49 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:15:00 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:15:00 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:15:00 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:15:15 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:15:15 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:15:15 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:15:22 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:15:22 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:15:22 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:15:31 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:15:31 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:15:31 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:15:42 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:15:42 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:15:42 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:16:00 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:16:00 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:16:00 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:16:07 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:16:07 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:16:07 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:16:16 W026 pluto[3997]: "HOME" #4: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:16:16 W026 pluto[3997]: "HOME" #4: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:16:16 W026 pluto[3997]: "HOME" #4: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:16:22 W026 pluto[3997]: "HOME" #3: received Delete SA payload: deleting ISAKMP State #3 Apr 29 20:16:22 W026 pluto[3997]: packet from 217.92.35.33:500: received and ignored informational message Apr 29 20:16:22 W026 pluto[3997]: "HOME" #4: received Delete SA payload: replace IPSEC State #5 in 10 seconds Apr 29 20:16:22 W026 pluto[3997]: "HOME" #4: received and ignored informational message Apr 29 20:16:22 W026 pluto[3997]: "HOME" #4: received Delete SA payload: deleting ISAKMP State #4 Apr 29 20:16:22 W026 pluto[3997]: packet from 217.92.35.33:500: received and ignored informational message Apr 29 20:16:22 W026 pluto[3997]: ERROR: asynchronous network error report on eth0 (sport=500) for message to 217.92.35.33 port 500, complainant 217.92.35.33: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] Apr 29 20:16:22 W026 pluto[3997]: packet from 217.92.35.33:500: ignoring informational payload, type INVALID_COOKIE on st==NULL (deleted?) Apr 29 20:16:22 W026 pluto[3997]: packet from 217.92.35.33:500: received and ignored informational message Apr 29 20:16:22 W026 pluto[3997]: ERROR: asynchronous network error report on eth0 (sport=500) for message to 217.92.35.33 port 500, complainant 217.92.35.33: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] Apr 29 20:16:22 W026 pluto[3997]: packet from 217.92.35.33:500: ignoring informational payload, type INVALID_COOKIE on st==NULL (deleted?) Apr 29 20:16:22 W026 pluto[3997]: packet from 217.92.35.33:500: received and ignored informational message Apr 29 20:16:32 W026 pluto[3997]: "HOME" #6: initiating Main Mode Apr 29 20:16:32 W026 pluto[3997]: "HOME" #6: ignoring unknown Vendor ID payload [eeefa37809e32ad4de4f6b010c26a640] Apr 29 20:16:32 W026 pluto[3997]: "HOME" #6: received Vendor ID payload [Dead Peer Detection] Apr 29 20:16:32 W026 pluto[3997]: "HOME" #6: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 Apr 29 20:16:32 W026 pluto[3997]: "HOME" #6: STATE_MAIN_I2: sent MI2, expecting MR2 Apr 29 20:16:32 W026 pluto[3997]: "HOME" #6: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 Apr 29 20:16:32 W026 pluto[3997]: "HOME" #6: STATE_MAIN_I3: sent MI3, expecting MR3 Apr 29 20:16:32 W026 pluto[3997]: "HOME" #6: Main mode peer ID is ID_IPV4_ADDR: '217.92.35.33' Apr 29 20:16:32 W026 pluto[3997]: "HOME" #6: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 Apr 29 20:16:32 W026 pluto[3997]: "HOME" #6: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_md5 group=modp1024} Apr 29 20:16:32 W026 pluto[3997]: "HOME" #7: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW {using isakmp#6 msgid:38a41d31 proposal=AES(12)_128-MD5(1)_128 pfsgroup=no-pfs} Apr 29 20:16:32 W026 pluto[3997]: "HOME" #7: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 Apr 29 20:16:32 W026 pluto[3997]: "HOME" #7: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x369caf89 <0x358fc92a xfrm=AES_128-HMAC_MD5 NATOA=none NATD=none DPD=none} Apr 29 20:16:33 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:16:33 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:16:33 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:16:40 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:16:40 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:16:40 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:16:42 W026 pluto[3997]: ERROR: asynchronous network error report on eth0 (sport=500) for message to 217.92.35.33 port 500, complainant 217.92.35.33: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] Apr 29 20:16:49 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:16:49 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:16:49 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:17:00 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:17:00 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:17:00 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:17:15 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:17:15 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:17:15 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:17:22 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:17:22 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:17:22 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:17:31 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:17:31 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:17:31 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:17:42 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:17:42 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:17:42 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:17:56 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:17:56 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:17:56 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:18:03 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:18:03 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:18:03 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:18:12 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:18:12 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:18:12 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:18:23 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:18:23 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:18:23 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:18:30 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:18:30 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:18:30 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:18:37 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:18:37 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:18:37 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:18:46 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:18:46 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:18:46 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:18:57 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:18:57 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:18:57 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:19:15 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:19:15 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:19:15 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:19:22 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:19:22 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:19:22 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:19:31 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:19:31 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:19:31 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:19:42 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:19:42 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:19:42 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:19:48 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:19:48 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:19:48 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:19:55 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:19:55 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:19:55 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:20:04 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:20:04 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:20:04 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:20:15 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:20:15 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:20:15 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:20:29 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:20:29 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:20:29 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:20:36 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:20:36 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:20:36 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:20:45 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:20:45 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:20:45 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:20:56 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:20:56 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:20:56 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:21:15 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:21:15 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:21:15 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:21:22 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:21:22 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:21:22 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:21:31 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:21:31 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:21:31 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:21:42 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:21:42 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:21:42 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:21:55 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:21:55 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:21:55 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:22:02 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:22:02 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:22:02 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:22:11 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:22:11 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:22:11 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:22:22 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:22:22 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:22:22 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:22:27 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:22:27 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:22:27 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:22:34 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:22:34 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:22:34 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:22:43 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:22:43 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:22:43 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:22:54 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:22:54 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:22:54 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:22:58 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:22:58 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:22:58 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:23:05 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:23:05 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:23:05 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:23:14 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:23:14 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:23:14 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:23:25 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:23:25 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:23:25 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:23:31 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:23:31 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:23:31 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:23:38 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:23:38 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:23:38 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:23:47 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:23:47 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:23:47 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:23:58 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:23:58 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:23:58 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:24:20 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:24:20 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:24:20 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:24:27 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:24:27 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:24:27 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:24:36 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:24:36 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:24:36 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:24:47 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:24:47 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:24:47 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:25:00 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:25:00 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:25:00 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:25:07 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:25:07 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:25:07 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:25:16 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:25:16 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:25:16 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:25:27 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:25:27 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:25:27 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:25:33 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:25:33 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:25:33 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:25:40 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:25:40 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:25:40 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:25:49 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:25:49 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:25:49 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:26:00 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:26:00 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:26:00 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:26:17 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:26:17 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:26:17 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:26:24 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:26:24 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:26:24 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:26:33 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:26:33 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:26:33 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:26:44 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:26:44 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:26:44 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:26:54 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:26:54 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:26:54 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:27:01 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:27:01 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:27:01 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:27:10 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:27:10 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:27:10 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:27:21 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:27:21 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:27:21 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:27:35 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:27:35 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:27:35 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:27:42 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:27:42 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:27:42 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:27:51 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:27:51 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:27:51 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:28:02 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:28:02 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:28:02 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:28:19 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:28:19 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:28:19 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:28:26 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:28:26 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:28:26 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:28:35 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:28:35 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:28:35 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:28:46 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:28:46 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:28:46 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:29:01 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:29:01 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:29:01 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:29:08 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:29:08 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:29:08 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:29:17 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:29:17 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:29:17 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:29:28 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:29:28 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:29:28 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:29:35 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:29:35 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:29:35 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:29:42 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:29:42 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:29:42 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:29:51 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:29:51 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:29:51 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:30:02 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:30:02 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:30:02 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:30:06 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:30:06 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:30:06 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:30:13 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:30:13 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:30:13 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:30:22 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:30:22 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:30:22 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:30:33 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:30:33 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:30:33 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:30:39 W026 pluto[3997]: "HOME" #6: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:30:39 W026 pluto[3997]: "HOME" #6: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:30:39 W026 pluto[3997]: "HOME" #6: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:30:46 W026 pluto[3997]: "HOME" #6: received Delete SA payload: replace IPSEC State #7 in 10 seconds Apr 29 20:30:46 W026 pluto[3997]: "HOME" #6: received and ignored informational message Apr 29 20:30:46 W026 pluto[3997]: "HOME" #6: received Delete SA payload: deleting ISAKMP State #6 Apr 29 20:30:46 W026 pluto[3997]: packet from 217.92.35.33:500: received and ignored informational message Apr 29 20:30:46 W026 pluto[3997]: ERROR: asynchronous network error report on eth0 (sport=500) for message to 217.92.35.33 port 500, complainant 217.92.35.33: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] Apr 29 20:30:46 W026 pluto[3997]: packet from 217.92.35.33:500: ignoring informational payload, type INVALID_COOKIE on st==NULL (deleted?) Apr 29 20:30:46 W026 pluto[3997]: packet from 217.92.35.33:500: received and ignored informational message Apr 29 20:30:50 W026 pluto[3997]: packet from 217.92.35.33:500: ignoring unknown Vendor ID payload [eeefa37809e32ad4de4f6b010c26a640] Apr 29 20:30:50 W026 pluto[3997]: packet from 217.92.35.33:500: received Vendor ID payload [Dead Peer Detection] Apr 29 20:30:50 W026 pluto[3997]: "HOME" #8: responding to Main Mode Apr 29 20:30:50 W026 pluto[3997]: "HOME" #8: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1 Apr 29 20:30:50 W026 pluto[3997]: "HOME" #8: STATE_MAIN_R1: sent MR1, expecting MI2 Apr 29 20:30:50 W026 pluto[3997]: "HOME" #8: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2 Apr 29 20:30:50 W026 pluto[3997]: "HOME" #8: STATE_MAIN_R2: sent MR2, expecting MI3 Apr 29 20:30:50 W026 pluto[3997]: "HOME" #8: Main mode peer ID is ID_IPV4_ADDR: '217.92.35.33' Apr 29 20:30:50 W026 pluto[3997]: "HOME" #8: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3 Apr 29 20:30:50 W026 pluto[3997]: "HOME" #8: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_md5 group=modp1024} Apr 29 20:30:50 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:30:50 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:30:50 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:30:56 W026 pluto[3997]: "HOME" #9: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW to replace #7 {using isakmp#8 msgid:56dbfec4 proposal=AES(12)_128-MD5(1)_128 pfsgroup=no-pfs} Apr 29 20:30:56 W026 pluto[3997]: "HOME" #9: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 Apr 29 20:30:56 W026 pluto[3997]: "HOME" #9: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x7c42c092 <0x37ca9ff0 xfrm=AES_128-HMAC_MD5 NATOA=none NATD=none DPD=none} Apr 29 20:30:57 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:30:57 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:30:57 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:31:06 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:31:06 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:31:06 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:31:06 W026 pluto[3997]: ERROR: asynchronous network error report on eth0 (sport=500) for message to 217.92.35.33 port 500, complainant 217.92.35.33: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] Apr 29 20:31:17 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:31:17 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:31:17 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:31:29 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:31:29 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:31:29 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:31:36 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:31:36 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:31:36 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:31:45 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:31:45 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:31:45 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:31:56 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:31:56 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:31:56 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:32:06 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:32:06 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:32:06 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:32:13 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:32:13 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:32:13 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:32:22 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:32:22 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:32:22 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:32:34 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:32:34 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:32:34 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:32:47 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:32:47 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:32:47 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:32:54 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:32:54 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:32:54 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:33:03 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:33:03 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:33:03 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:33:14 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:33:14 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:33:14 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:33:29 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:33:29 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:33:29 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:33:36 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:33:36 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:33:36 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:33:45 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:33:45 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:33:45 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:33:56 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:33:56 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:33:56 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:34:14 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:34:14 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:34:14 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:34:21 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:34:21 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:34:21 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:34:30 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:34:30 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:34:30 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:34:41 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:34:41 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:34:41 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:34:51 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:34:51 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:34:51 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:34:58 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:34:58 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:34:58 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:35:07 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:35:07 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:35:07 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:35:18 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:35:18 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:35:18 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:35:23 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:35:23 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:35:23 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:35:30 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:35:30 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:35:30 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:35:39 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:35:39 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:35:39 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:35:50 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:35:50 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:35:50 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:35:56 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:35:56 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:35:56 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:36:03 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:36:03 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:36:03 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:36:12 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:36:12 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:36:12 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:36:23 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:36:23 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:36:23 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:36:38 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:36:38 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:36:38 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:36:45 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:36:45 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:36:45 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:36:54 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:36:54 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:36:54 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:37:05 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:37:05 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:37:05 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:37:19 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:37:19 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:37:19 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:37:26 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:37:26 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:37:26 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:37:35 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:37:35 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:37:35 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:37:46 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:37:46 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:37:46 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:38:05 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:38:05 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:38:05 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:38:12 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:38:12 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:38:12 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:38:21 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:38:21 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:38:21 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:38:32 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:38:32 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:38:32 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:38:42 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:38:42 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:38:42 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:38:49 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:38:49 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:38:49 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:38:58 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:38:58 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:38:58 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:39:09 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:39:09 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:39:09 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:39:29 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:39:29 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:39:29 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:39:36 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:39:36 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:39:36 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:39:45 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:39:45 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:39:45 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:39:56 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:39:56 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:39:56 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:40:04 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:40:04 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:40:04 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:40:11 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:40:11 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:40:11 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:40:20 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:40:20 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:40:20 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:40:31 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:40:31 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:40:31 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:40:49 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:40:49 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:40:49 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:40:56 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:40:56 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:40:56 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:41:05 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:41:05 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:41:05 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:41:16 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:41:16 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:41:16 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:41:29 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:41:29 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:41:29 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:41:36 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:41:36 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:41:36 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:41:45 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:41:45 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:41:45 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:41:56 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:41:56 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:41:56 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:42:09 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:42:09 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:42:09 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:42:16 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:42:16 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:42:16 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:42:25 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:42:25 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:42:25 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:42:36 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:42:36 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:42:36 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:42:55 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:42:55 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:42:55 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:43:02 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:43:02 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:43:02 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:43:10 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:43:10 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:43:10 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:43:22 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:43:22 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:43:22 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:43:36 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:43:36 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:43:36 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:43:43 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:43:43 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:43:43 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:43:52 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:43:52 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:43:52 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:44:03 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:44:03 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:44:03 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:44:17 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:44:17 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:44:17 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:44:24 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:44:24 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:44:24 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:44:33 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:44:33 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:44:33 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:44:44 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:44:44 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:44:44 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:44:59 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:44:59 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:44:59 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:45:06 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:45:06 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:45:06 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:45:15 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:45:15 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:45:15 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:45:26 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:45:26 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:45:26 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:45:42 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:45:42 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:45:42 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:45:49 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:45:49 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:45:49 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:45:58 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:45:58 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:45:58 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:46:09 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:46:09 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:46:09 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:46:19 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:46:19 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:46:19 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:46:26 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:46:26 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:46:26 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:46:35 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:46:35 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:46:35 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:46:46 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:46:46 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:46:46 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:46:57 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:46:57 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:46:57 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:47:04 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:47:04 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:47:04 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:47:13 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:47:13 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:47:13 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:47:24 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:47:24 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:47:24 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:47:37 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:47:37 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:47:37 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:47:44 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:47:44 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:47:44 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:47:53 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:47:53 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:47:53 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:48:04 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:48:04 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:48:04 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:48:14 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:48:14 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:48:14 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:48:18 W026 pluto[3997]: "HOME" #10: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP+IKEv2ALLOW to replace #9 {using isakmp#8 msgid:54a7025b proposal=AES(12)_128-MD5(1)_128 pfsgroup=no-pfs} Apr 29 20:48:18 W026 pluto[3997]: "HOME" #10: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 Apr 29 20:48:18 W026 pluto[3997]: "HOME" #10: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x01225acd <0x77a131fd xfrm=AES_128-HMAC_MD5 NATOA=none NATD=none DPD=none} Apr 29 20:48:21 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:48:21 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:48:21 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:48:30 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:48:30 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:48:30 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:48:41 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:48:41 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:48:41 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:48:44 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:48:44 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:48:44 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:48:51 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:48:51 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:48:51 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:49:00 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:49:00 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:49:00 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:49:11 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:49:11 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:49:11 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:49:24 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:49:24 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:49:24 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:49:31 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:49:31 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:49:31 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:49:40 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:49:40 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:49:40 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:49:51 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:49:51 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:49:51 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:50:02 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:50:02 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:50:02 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:50:09 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:50:09 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:50:09 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:50:18 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:50:18 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:50:18 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:50:29 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:50:29 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:50:29 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:50:36 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:50:36 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:50:36 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:50:43 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:50:43 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:50:43 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:50:52 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:50:52 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:50:52 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:51:03 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:51:03 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:51:03 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:51:17 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:51:17 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:51:17 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:51:24 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:51:24 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:51:24 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 Apr 29 20:51:33 W026 pluto[3997]: "HOME" #8: the peer proposed: 0.0.0.0/0:0/0 -> 10.70.0.0/16:0/0 Apr 29 20:51:33 W026 pluto[3997]: "HOME" #8: cannot respond to IPsec SA request because no connection is known for 0.0.0.0/0===212.117.175.46<212.117.175.46>[+S=C]...217.92.35.33<217.92.35.33>[+S=C]===10.70.0.0/16 Apr 29 20:51:33 W026 pluto[3997]: "HOME" #8: sending encrypted notification INVALID_ID_INFORMATION to 217.92.35.33:500 + _________________________ date + + date Fri Apr 29 20:51:37 CEST 2011