<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content="text/html; charset=big5" http-equiv=Content-Type>
<META name=GENERATOR content="MSHTML 8.00.6001.23536">
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#0000ff size=2 face=Verdana>Dear Sirs,</FONT></DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana></FONT> </DIV>
<DIV><FONT face=Verdana><FONT color=#0000ff size=2>The following is the debug
message.Is anythong I need to do?Please help,thank's.</FONT></FONT></DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana></FONT> </DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana>Best Regards,</FONT></DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana>Ozai</FONT></DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana></FONT> </DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana>Dec 5 01:19:04 authpriv debug
pluto[30859]: | hashing 48 bytes of SA<BR>Dec 5 01:19:04 authpriv debug
pluto[30859]: | ***emit ISAKMP Hash Payload:<BR>Dec 5 01:19:04 authpriv
debug pluto[30859]: | next payload type:
<BR>ISAKMP_NEXT_VID<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: |
emitting 16 raw bytes of <BR>HASH_R into ISAKMP Hash Payload<BR>Dec 5
01:19:04 authpriv debug pluto[30859]: | HASH_R 3c e1 03 dc ea 4f cc
<BR>aa 5d 3d 06 40 15 aa d5 14<BR>Dec 5 01:19:04 authpriv
debug pluto[30859]: | emitting length of ISAKMP <BR>Hash Payload:
20<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | out_vendorid():
sending [Dead <BR>Peer Detection]<BR>Dec 5 01:19:04 authpriv debug
pluto[30859]: | ***emit ISAKMP Vendor ID <BR>Payload:<BR>Dec 5 01:19:04
authpriv debug pluto[30859]: | next payload type:
<BR>ISAKMP_NEXT_NONE<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: |
emitting 16 raw bytes of V_ID <BR>into ISAKMP Vendor ID Payload<BR>Dec 5
01:19:04 authpriv debug pluto[30859]: | V_ID af ca d7 13 68 a1 f1
<BR>c9 6b 86 96 fc 77 57 01 00<BR>Dec 5 01:19:04 authpriv
debug pluto[30859]: | emitting length of ISAKMP <BR>Vendor ID Payload:
20<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | emitting length of
ISAKMP <BR>Message: 252<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: |
complete state transition <BR>with STF_OK<BR>Dec 5 01:19:04 authpriv warn
pluto[30859]: "ciprian"[1] 70.27.135.87 #1: <BR>transition from state
STATE_AGGR_R0 to state STATE_AGGR_R1<BR>Dec 5 01:19:04 authpriv debug
pluto[30859]: | deleting event for #1<BR>Dec 5 01:19:04 authpriv debug
pluto[30859]: | sending reply packet to <BR>70.27.135.87:500 (from port
500)<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | sending 252 bytes
for <BR>STATE_AGGR_R0 through ppp0.1:500 to 70.27.135.87:500 (using
#1)<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | 3e 81 bf
08 ff 77 8c de <BR>0f 0c 3f 11 73 b2 5c fe<BR>Dec 5 01:19:04
authpriv debug pluto[30859]: | 01 10 04 00 00 00 00 00 <BR>00
00 00 fc 04 00 00 34<BR>Dec 5 01:19:04 authpriv debug pluto[30859]:
| 00 00 00 01 00 00 00 01 <BR>00 00 00 28 01 01 00
01<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | 00 00 00
20 01 01 00 00 <BR>80 0b 00 01 80 0c 70 80<BR>Dec 5 01:19:04
authpriv debug pluto[30859]: | 80 01 00 01 80 03 00 01 <BR>80
02 00 01 80 04 00 01<BR>Dec 5 01:19:04 authpriv debug pluto[30859]:
| 0a 00 00 64 9a 5e 23 27 <BR>75 ba 77 b1 c6 23 60
71<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | 75 d4 9e
02 b9 69 cb 53 <BR>cf 27 2f ef de b3 76 ec<BR>Dec 5 01:19:04
authpriv debug pluto[30859]: | b3 c6 02 9b 55 65 3b 9a <BR>05
70 16 b2 c1 91 9b 04<BR>Dec 5 01:19:04 authpriv debug pluto[30859]:
| c5 2d 20 2f c6 32 2a a4 <BR>95 bc 9d 93 55 21 5b
bd<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | 62 85 13
97 c9 dc 0f 1a <BR>5f cf d6 e6 98 7c 11 1d<BR>Dec 5 01:19:04
authpriv debug pluto[30859]: | ee 06 38 c1 04 47 94 4d <BR>de
ba 73 1d cf 5c 03 3c<BR>Dec 5 01:19:04 authpriv debug pluto[30859]:
| 76 2e 2a ab 05 00 00 14 <BR>56 7a 54 9d a8 d8 3d
75<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | 8b c6 6b
ed 3c bf ca a7 <BR>08 00 00 0c 01 00 00 00<BR>Dec 5 01:19:04
authpriv debug pluto[30859]: | 3f fa 6f c5 0d 00 00 14 <BR>3c
e1 03 dc ea 4f cc aa<BR>Dec 5 01:19:04 authpriv debug pluto[30859]:
| 5d 3d 06 40 15 aa d5 14 <BR>00 00 00 14 af ca d7
13<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | 68 a1 f1
c9 6b 86 96 fc <BR>77 57 01 00<BR>Dec 5 01:19:04 authpriv debug
pluto[30859]: | inserting event <BR>EVENT_RETRANSMIT, timeout in 10 seconds for
#1<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | event added at head of
queue<BR>Dec 5 01:19:04 authpriv warn pluto[30859]: "ciprian"[1]
70.27.135.87 #1: <BR>STATE_AGGR_R1: sent AR1, expecting AI2<BR>Dec 5
01:19:04 authpriv debug pluto[30859]: | modecfg pull: noquirk <BR>policy:push
not-client<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | phase 1 is
done, looking for <BR>phase 2 to unpend<BR>Dec 5 01:19:04 authpriv debug
pluto[30859]: | * processed 1 messages from <BR>cryptographic
helpers<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | next event
EVENT_RETRANSMIT <BR>in 10 seconds for #1<BR>Dec 5 01:19:04 authpriv debug
pluto[30859]: | next event EVENT_RETRANSMIT <BR>in 10 seconds for
#1<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: |<BR>Dec 5
01:19:04 authpriv debug pluto[30859]: | *received 48 bytes from
<BR>70.27.135.87:500 on ppp0.1 (port=500)<BR>Dec 5 01:19:04 authpriv debug
pluto[30859]: | 3e 81 bf 08 ff 77 8c de <BR>0f 0c 3f 11
73 b2 5c fe<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: |
08 10 04 00 00 00 00 00 <BR>00 00 00 30 00 00 00 14<BR>Dec 5
01:19:04 authpriv debug pluto[30859]: | 0a 4e 5f 67 ff 3a 9d
4e <BR>e9 15 3c b1 65 af 55 fa<BR>Dec 5 01:19:04 authpriv debug
pluto[30859]: | **parse ISAKMP Message:<BR>Dec 5 01:19:04 authpriv debug
pluto[30859]: | initiator cookie:<BR>Dec 5 01:19:04
authpriv debug pluto[30859]: | 3e 81 bf 08 ff 77 8c
de<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: |
responder cookie:<BR>Dec 5 01:19:04 authpriv debug pluto[30859]:
| 0f 0c 3f 11 73 b2 5c fe<BR>Dec 5 01:19:04 authpriv
debug pluto[30859]: | next payload type:
<BR>ISAKMP_NEXT_HASH<BR>Dec 5 01:19:04 authpriv debug pluto[30859]:
| ISAKMP version: ISAKMP <BR>Version 1.0
(rfc2407)<BR>Dec 5 01:19:04 authpriv debug pluto[30859]:
| exchange type: <BR>ISAKMP_XCHG_AGGR<BR>Dec 5 01:19:04
authpriv debug pluto[30859]: | flags: none<BR>Dec 5
01:19:04 authpriv debug pluto[30859]: | message ID: 00
00 00 00<BR>Dec 5 01:19:04 authpriv debug pluto[30859]:
| length: 48<BR>Dec 5 01:19:04 authpriv debug
pluto[30859]: | processing version=1.0 <BR>packet with exchange
type=ISAKMP_XCHG_AGGR (4)<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: |
ICOOKIE: 3e 81 bf 08 ff 77 <BR>8c de<BR>Dec 5 01:19:04
authpriv debug pluto[30859]: | RCOOKIE: 0f 0c 3f 11 73 b2 <BR>5c
fe<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | state hash entry
14<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | v1 peer and cookies
match on <BR>#1, provided msgid 00000000 vs 00000000<BR>Dec 5 01:19:04
authpriv debug pluto[30859]: | v1 state object #1 found, in
<BR>STATE_AGGR_R1<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: |
processing connection <BR>ciprian[1] 70.27.135.87<BR>Dec 5 01:19:04
authpriv warn pluto[30859]: "ciprian"[1] 70.27.135.87 #1: <BR>packet rejected:
should have been encrypted<BR>Dec 5 01:19:04 authpriv warn pluto[30859]:
"ciprian"[1] 70.27.135.87 #1: <BR>sending notification INVALID_FLAGS to
70.27.135.87:500<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | **emit
ISAKMP Message:<BR>Dec 5 01:19:04 authpriv debug pluto[30859]:
| initiator cookie:<BR>Dec 5 01:19:04 authpriv debug
pluto[30859]: | 3e 81 bf 08 ff 77 8c de<BR>Dec 5
01:19:04 authpriv debug pluto[30859]: | responder
cookie:<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | 0f 0c
3f 11 73 b2 5c fe<BR>Dec 5 01:19:04 authpriv debug pluto[30859]:
| next payload type: <BR>ISAKMP_NEXT_N<BR>Dec 5 01:19:04
authpriv debug pluto[30859]: | ISAKMP version: ISAKMP
<BR>Version 1.0 (rfc2407)<BR>Dec 5 01:19:04 authpriv debug pluto[30859]:
| exchange type: <BR>ISAKMP_XCHG_INFO<BR>Dec 5 01:19:04
authpriv debug pluto[30859]: | flags: none<BR>Dec 5
01:19:04 authpriv debug pluto[30859]: | message ID: 30
9f f5 72<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | ***emit ISAKMP
Notification <BR>Payload:<BR>Dec 5 01:19:04 authpriv debug pluto[30859]:
| next payload type: <BR>ISAKMP_NEXT_NONE<BR>Dec 5
01:19:04 authpriv debug pluto[30859]: | DOI:
ISAKMP_DOI_IPSEC<BR>Dec 5 01:19:04 authpriv debug pluto[30859]:
| protocol ID: 1<BR>Dec 5 01:19:04 authpriv debug
pluto[30859]: | SPI size: 0<BR>Dec 5 01:19:04 authpriv
debug pluto[30859]: | Notify Message Type:
<BR>INVALID_FLAGS<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: |
emitting length of ISAKMP <BR>Notification Payload: 12<BR>Dec 5 01:19:04
authpriv debug pluto[30859]: | emitting length of ISAKMP <BR>Message:
40<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | sending 40 bytes for
<BR>notification packet through ppp0.1:500 to 70.27.135.87:500 (using
#1)<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | 3e 81 bf
08 ff 77 8c de <BR>0f 0c 3f 11 73 b2 5c fe<BR>Dec 5 01:19:04
authpriv debug pluto[30859]: | 0b 10 05 00 30 9f f5 72 <BR>00
00 00 28 00 00 00 0c<BR>Dec 5 01:19:04 authpriv debug pluto[30859]:
| 00 00 00 01 01 00 00 08<BR>Dec 5 01:19:04 authpriv
debug pluto[30859]: | * processed 0 messages from <BR>cryptographic
helpers<BR>Dec 5 01:19:04 authpriv debug pluto[30859]: | next event
EVENT_RETRANSMIT <BR>in 10 seconds for #1<BR>Dec 5 01:19:04 authpriv debug
pluto[30859]: | next event EVENT_RETRANSMIT <BR>in 10 seconds for
#1<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: |<BR>Dec 5
01:19:09 authpriv debug pluto[30859]: | *received 260 bytes from
<BR>70.27.135.87:500 on ppp0.1 (port=500)<BR>Dec 5 01:19:09 authpriv debug
pluto[30859]: | 3e 81 bf 08 ff 77 8c de <BR>0f 0c 3f 11
73 b2 5c fe<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: |
08 10 20 01 ed 34 d7 14 <BR>00 00 01 04 f9 27 8a 8c<BR>Dec 5
01:19:09 authpriv debug pluto[30859]: | 2b 46 75 d1 b2 54 0e
11 <BR>55 4c 74 02 08 df 64 4d<BR>Dec 5 01:19:09 authpriv debug
pluto[30859]: | c3 e2 2f 3f a9 3b 35 c0 <BR>83 93 13 6b
12 72 0d 98<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: |
c7 b0 96 f5 5a 93 0f dc <BR>63 2b 10 32 d9 09 2d ea<BR>Dec 5
01:19:09 authpriv debug pluto[30859]: | 63 9f 72 29 0d f7 dc
3e <BR>84 34 63 64 37 ab 61 4f<BR>Dec 5 01:19:09 authpriv debug
pluto[30859]: | e3 66 47 6a 61 ef db d3 <BR>79 f7 6f ee
ab 55 3d 9f<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: |
ca da 91 c3 70 1c 66 74 <BR>32 d5 4e 67 4b bb a1 45<BR>Dec 5
01:19:09 authpriv debug pluto[30859]: | 2c a3 0b cc 13 34 64
80 <BR>4f 47 2e 29 b5 9a e3 fb<BR>Dec 5 01:19:09 authpriv debug
pluto[30859]: | 11 27 65 a1 0e dc ca 11 <BR>a6 e0 72 0d
ed 32 89 fe<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: |
24 f1 56 86 66 fb eb 5a <BR>e7 7f e7 0b 51 c8 39 f9<BR>Dec 5
01:19:09 authpriv debug pluto[30859]: | 16 72 8c 7a 94 85 ba
a7 <BR>44 c2 9b ee 3a 20 93 8e<BR>Dec 5 01:19:09 authpriv debug
pluto[30859]: | a1 53 ca a4 58 cc b8 56 <BR>95 e6 36 1f
47 a6 1b 45<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: |
9b fb 4a 09 a2 45 66 89 <BR>dc 47 17 fc 85 98 8a 69<BR>Dec 5
01:19:09 authpriv debug pluto[30859]: | 7c 42 9a a1 f6 1a 87
45 <BR>cb 05 5f 99 12 2b 40 60<BR>Dec 5 01:19:09 authpriv debug
pluto[30859]: | 2e 29 09 4d e1 17 06 a8 <BR>3e 3d 3c 7a
19 c1 99 43<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: |
6f f6 c3 b2<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: | **parse
ISAKMP Message:<BR>Dec 5 01:19:09 authpriv debug pluto[30859]:
| initiator cookie:<BR>Dec 5 01:19:09 authpriv debug
pluto[30859]: | 3e 81 bf 08 ff 77 8c de<BR>Dec 5
01:19:09 authpriv debug pluto[30859]: | responder
cookie:<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: | 0f 0c
3f 11 73 b2 5c fe<BR>Dec 5 01:19:09 authpriv debug pluto[30859]:
| next payload type: <BR>ISAKMP_NEXT_HASH<BR>Dec 5
01:19:09 authpriv debug pluto[30859]: | ISAKMP version: ISAKMP
<BR>Version 1.0 (rfc2407)<BR>Dec 5 01:19:09 authpriv debug pluto[30859]:
| exchange type: <BR>ISAKMP_XCHG_QUICK<BR>Dec 5 01:19:09
authpriv debug pluto[30859]: | flags:
<BR>ISAKMP_FLAG_ENCRYPTION<BR>Dec 5 01:19:09 authpriv debug pluto[30859]:
| message ID: ed 34 d7 14<BR>Dec 5 01:19:09
authpriv debug pluto[30859]: | length: 260<BR>Dec 5
01:19:09 authpriv debug pluto[30859]: | processing version=1.0 <BR>packet
with exchange type=ISAKMP_XCHG_QUICK (32)<BR>Dec 5 01:19:09 authpriv debug
pluto[30859]: | ICOOKIE: 3e 81 bf 08 ff 77 <BR>8c de<BR>Dec 5
01:19:09 authpriv debug pluto[30859]: | RCOOKIE: 0f 0c 3f 11 73 b2
<BR>5c fe<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: | state hash
entry 14<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: | v1 peer and
cookies match on <BR>#1, provided msgid ed34d714 vs 00000000<BR>Dec 5
01:19:09 authpriv debug pluto[30859]: | v1 state object not found<BR>Dec 5
01:19:09 authpriv debug pluto[30859]: | ICOOKIE: 3e 81 bf 08 ff 77
<BR>8c de<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: | RCOOKIE:
0f 0c 3f 11 73 b2 <BR>5c fe<BR>Dec 5 01:19:09 authpriv debug
pluto[30859]: | state hash entry 14<BR>Dec 5 01:19:09 authpriv debug
pluto[30859]: | v1 peer and cookies match on <BR>#1, provided msgid 00000000 vs
00000000<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: | v1 state object
#1 found, in <BR>STATE_AGGR_R1<BR>Dec 5 01:19:09 authpriv debug
pluto[30859]: | processing connection <BR>ciprian[1] 70.27.135.87<BR>Dec 5
01:19:09 authpriv warn pluto[30859]: "ciprian"[1] 70.27.135.87 #1: <BR>Quick
Mode message is unacceptable because it is for an incomplete ISAKMP
SA<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: | payload malformed
after IV<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: | ae
91 5a f7 c4 66 16 24 <BR>44 21 f8 ea 46 a0 d1 f1<BR>Dec 5
01:19:09 authpriv warn pluto[30859]: "ciprian"[1] 70.27.135.87 #1: <BR>sending
notification PAYLOAD_MALFORMED to 70.27.135.87:500<BR>Dec 5 01:19:09
authpriv debug pluto[30859]: | **emit ISAKMP Message:<BR>Dec 5 01:19:09
authpriv debug pluto[30859]: | initiator cookie:<BR>Dec
5 01:19:09 authpriv debug pluto[30859]: | 3e 81 bf 08 ff 77 8c
de<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: |
responder cookie:<BR>Dec 5 01:19:09 authpriv debug pluto[30859]:
| 0f 0c 3f 11 73 b2 5c fe<BR>Dec 5 01:19:09 authpriv
debug pluto[30859]: | next payload type:
<BR>ISAKMP_NEXT_N<BR>Dec 5 01:19:09 authpriv debug pluto[30859]:
| ISAKMP version: ISAKMP <BR>Version 1.0
(rfc2407)<BR>Dec 5 01:19:09 authpriv debug pluto[30859]:
| exchange type: <BR>ISAKMP_XCHG_INFO<BR>Dec 5 01:19:09
authpriv debug pluto[30859]: | flags: none<BR>Dec 5
01:19:09 authpriv debug pluto[30859]: | message ID: 12
e6 49 2d<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: | ***emit ISAKMP
Notification <BR>Payload:<BR>Dec 5 01:19:09 authpriv debug pluto[30859]:
| next payload type: <BR>ISAKMP_NEXT_NONE<BR>Dec 5
01:19:09 authpriv debug pluto[30859]: | DOI:
ISAKMP_DOI_IPSEC<BR>Dec 5 01:19:09 authpriv debug pluto[30859]:
| protocol ID: 1<BR>Dec 5 01:19:09 authpriv debug
pluto[30859]: | SPI size: 0<BR>Dec 5 01:19:09 authpriv
debug pluto[30859]: | Notify Message Type:
<BR>PAYLOAD_MALFORMED<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: |
emitting length of ISAKMP <BR>Notification Payload: 12<BR>Dec 5 01:19:09
authpriv debug pluto[30859]: | emitting length of ISAKMP <BR>Message:
40<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: | sending 40 bytes for
<BR>notification packet through ppp0.1:500 to 70.27.135.87:500 (using
#1)<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: | 3e 81 bf
08 ff 77 8c de <BR>0f 0c 3f 11 73 b2 5c fe<BR>Dec 5 01:19:09
authpriv debug pluto[30859]: | 0b 10 05 00 12 e6 49 2d <BR>00
00 00 28 00 00 00 0c<BR>Dec 5 01:19:09 authpriv debug pluto[30859]:
| 00 00 00 01 01 00 00 10<BR>Dec 5 01:19:09 authpriv
debug pluto[30859]: | * processed 0 messages from <BR>cryptographic
helpers<BR>Dec 5 01:19:09 authpriv debug pluto[30859]: | next event
EVENT_RETRANSMIT <BR>in 5 seconds for #1<BR>Dec 5 01:19:09 authpriv debug
pluto[30859]: | next event EVENT_RETRANSMIT <BR>in 5 seconds for
#1<BR></FONT></DIV>
<BLOCKQUOTE
style="BORDER-LEFT: #0000ff 2px solid; PADDING-LEFT: 5px; PADDING-RIGHT: 0px; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px"
dir=ltr>
<DIV style="FONT: 10pt 新細明體">----- Original Message ----- </DIV>
<DIV
style="FONT: 10pt 新細明體; BACKGROUND: #e4e4e4; font-color: black"><B>From:</B>
<A title=ozai.tien@gmail.com href="mailto:ozai.tien@gmail.com">Ozai</A> </DIV>
<DIV style="FONT: 10pt 新細明體"><B>To:</B> <A title=users@lists.openswan.org
href="mailto:users@lists.openswan.org">users@lists.openswan.org</A> </DIV>
<DIV style="FONT: 10pt 新細明體"><B>Sent:</B> Friday, November 29, 2013 11:52
AM</DIV>
<DIV style="FONT: 10pt 新細明體"><B>Subject:</B> [Openswan Users] Aggressive mode
connection error with Netopia</DIV>
<DIV><BR></DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana>Dear Sirs,</FONT></DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana></FONT> </DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana>Do you have any experience for
the connection with Netopia?I try to setup the VPN tunnel with Netopia.Our
environment is the openswan 2.6.38.Aggressive mode.</FONT></DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana>The following are the error
logs.It seem that the openswan reject connection from Netopia.Because no any
encrypted.Is it the configuration issue?or is there anything else I
lose?</FONT></DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana></FONT> </DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana>
<DIV><FONT color=#0000ff face=Verdana>Can someone point me in the right
direction?Please help,Thank's.</FONT></FONT></DIV></DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana></FONT> </DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana>pluto[9450]: packet from
63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP
SA<BR>Nov 26 09:35:03 authpriv warn pluto[9450]: packet from
63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP
SA<BR>Nov 26 09:35:06 authpriv warn pluto[9450]: packet from
63.250.111.205:500: Informational Exchange is for an unknown (expired?) SA
with MSGID:0xc11d6c7f<BR>Nov 26 09:35:13 authpriv warn pluto[9450]: "ACI1"[2]
63.250.111.205 #4: Aggressive mode peer ID is ID_USER_FQDN: <A
href="mailto:'testvpn@dsl4u.ca'">'testvpn@dsl4u.ca'</A><BR>Nov 26 09:35:13
authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: responding to
Aggressive Mode, state #4, connection "ACI1" from 63.250.111.205<BR>Nov 26
09:35:13 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: transition
from state STATE_AGGR_R0 to state STATE_AGGR_R1<BR>Nov 26 09:35:13 authpriv
warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: STATE_AGGR_R1: sent AR1,
expecting AI2<BR>Nov 26 09:35:13 authpriv warn pluto[9450]: "ACI1"[2]
63.250.111.205 #4: packet rejected: should have been encrypted<BR>Nov 26
09:35:13 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: sending
notification INVALID_FLAGS to 63.250.111.205:500<BR>Nov 26 09:35:13 authpriv
warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: next payload type of ISAKMP
Hash Payload has an unknown value: 115<BR>Nov 26 09:35:13 authpriv warn
pluto[9450]: "ACI1"[2] 63.250.111.205 #4: malformed payload in packet<BR>Nov
26 09:35:13 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: sending
notification PAYLOAD_MALFORMED to 63.250.111.205:500<BR>Nov 26 09:35:14
authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: Quick Mode message is
unacceptable because it is for an incomplete ISAKMP SA<BR>Nov 26 09:35:14
authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: sending notification
PAYLOAD_MALFORMED to 63.250.111.205:500<BR>Nov 26 09:35:29 authpriv warn
pluto[9450]: "ACI1"[2] 63.250.111.205 #4: Quick Mode message is unacceptable
because it is for an incomplete ISAKMP SA<BR>Nov 26 09:35:29 authpriv warn
pluto[9450]: "ACI1"[2] 63.250.111.205 #4: sending notification
PAYLOAD_MALFORMED to 63.250.111.205:500<BR>Nov 26 09:35:44 authpriv warn
pluto[9450]: "ACI1"[2] 63.250.111.205 #4: Quick Mode message is unacceptable
because it is for an incomplete ISAKMP SA<BR>Nov 26 09:35:44 authpriv warn
pluto[9450]: "ACI1"[2] 63.250.111.205 #4: sending notification
PAYLOAD_MALFORMED to 63.250.111.205:500<BR>Nov 26 09:35:59 authpriv warn
pluto[9450]: "ACI1"[2] 63.250.111.205 #4: Quick Mode message is unacceptable
because it is for an incomplete ISAKMP SA<BR>Nov 26 09:35:59 authpriv warn
pluto[9450]: "ACI1"[2] 63.250.111.205 #4: sending notification
PAYLOAD_MALFORMED to 63.250.111.205:500<BR>Nov 26 09:36:14 authpriv warn
pluto[9450]: "ACI1"[2] 63.250.111.205 #4: Quick Mode message is unacceptable
because it is for an incomplete ISAKMP SA<BR></FONT><FONT color=#0000ff size=2
face=Verdana>Nov 26 09:36:14 authpriv warn pluto[9450]: "ACI1"[2]
63.250.111.205 #4: sending notification PAYLOAD_MALFORMED to
63.250.111.205:500<BR>Nov 26 09:36:23 authpriv warn pluto[9450]: "ACI1"[2]
63.250.111.205 #4: max number of retransmissions (2) reached
STATE_AGGR_R1<BR>Nov 26 09:36:23 authpriv warn pluto[9450]: "ACI1"[2]
63.250.111.205: deleting connection "ACI1" instance with peer 63.250.111.205
{isakmp=#0/ipsec=#0}<BR>Nov 26 09:36:29 authpriv warn pluto[9450]: packet from
63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP
SA<BR>Nov 26 09:36:31 authpriv warn pluto[9450]: packet from
63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP
SA<BR>Nov 26 09:36:46 authpriv warn pluto[9450]: packet from
63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP
SA<BR>Nov 26 09:37:01 authpriv warn pluto[9450]: packet from
63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP
SA<BR>Nov 26 09:37:16 authpriv warn pluto[9450]: packet from
63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP
SA<BR>Nov 26 09:37:31 authpriv warn pluto[9450]: packet from
63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP
SA<BR>Nov 26 09:37:46 authpriv warn pluto[9450]: packet from
63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP
SA<BR>Nov 26 09:37:48 authpriv warn pluto[9450]: packet from
63.250.111.205:500: Informational Exchange is for an unknown (expired?) SA
with MSGID:0x7f43dac9<BR>Nov 26 09:37:58 authpriv warn pluto[9450]: "ACI1"[3]
63.250.111.205 #5: Aggressive mode peer ID is ID_USER_FQDN: <A
href="mailto:'testvpn@dsl4u.ca'">'testvpn@dsl4u.ca'</A><BR>Nov 26 09:37:58
authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: responding to
Aggressive Mode, state #5, connection "ACI1" from 63.250.111.205<BR>Nov 26
09:37:58 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: transition
from state STATE_AGGR_R0 to state STATE_AGGR_R1<BR>Nov 26 09:37:58 authpriv
warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: STATE_AGGR_R1: sent AR1,
expecting AI2<BR>Nov 26 09:37:59 authpriv warn pluto[9450]: "ACI1"[3]
63.250.111.205 #5: packet rejected: should have been encrypted<BR>Nov 26
09:37:59 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: sending
notification INVALID_FLAGS to 63.250.111.205:500<BR>Nov 26 09:37:59 authpriv
warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: next payload type of ISAKMP
Hash Payload has an unknown value: 192<BR>Nov 26 09:37:59 authpriv warn
pluto[9450]: "ACI1"[3] 63.250.111.205 #5: malformed payload in packet<BR>Nov
26 09:37:59 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: sending
notification PAYLOAD_MALFORMED to 63.250.111.205:500<BR>Nov 26 09:37:59
authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: Quick Mode message is
unacceptable because it is for an incomplete ISAKMP SA<BR>Nov 26 09:38:14
authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: Quick Mode message is
unacceptable because it is for an incomplete ISAKMP SA<BR>Nov 26 09:38:14
authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: sending notification
PAYLOAD_MALFORMED to 63.250.111.205:500<BR>Nov 26 09:38:29 authpriv warn
pluto[9450]: "ACI1"[3] 63.250.111.205 #5: Quick Mode message is unacceptable
because it is for an incomplete ISAKMP SA<BR>Nov 26 09:38:29 authpriv warn
pluto[9450]: "ACI1"[3] 63.250.111.205 #5: sending notification
PAYLOAD_MALFORMED to 63.250.111.205:500</FONT></DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana></FONT> </DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana>
<DIV><FONT color=#0000ff size=2 face=Verdana>Best Regards</FONT></DIV>
<DIV><FONT color=#0000ff size=2 face=Verdana>Ozai</FONT></DIV></FONT><FONT
color=#0000ff size=2 face=Verdana></FONT></DIV></BLOCKQUOTE></BODY></HTML>