[Openswan Users] Message ID is 0 with openswan as client to cisco 876W]
Markus Locher
ml at as-support.com
Fri Dec 12 05:39:39 EST 2008
--- last again because was html --- sorry!!
Hi all,
I have a new situation now and I will document this for the next reader
coming up with same problem.
I deleted the line (which I don´t know how it came into router config) I
mentioned in the last mail with:
no crypto isakmp key # address 192.199.19.91
Problem changed but we are not through this now. So I search for the
reason this fails on my new tries.
So the connection has passed Pahse 1 and stucks in Phase 2 now. Here are
the logs:
Regards Markus
-------- /var/log/messages --------------------
.Dec 12 11:16:50.400 MEZ: ISAKMP (0:0): received packet from
192.199.19.91 dport 500 sport 500 Global (N) NEW SA
.Dec 12 11:16:50.400 MEZ: ISAKMP: Created a peer struct for
192.199.19.91, peer port 500
.Dec 12 11:16:50.400 MEZ: ISAKMP: New peer created peer = 0x82C2FD84
peer_handle = 0x80000115
.Dec 12 11:16:50.400 MEZ: ISAKMP: Locking peer struct 0x82C2FD84,
refcount 1 for crypto_isakmp_process_block
.Dec 12 11:16:50.400 MEZ: ISAKMP: local port 500, remote port 500
.Dec 12 11:16:50.404 MEZ: insert sa successfully sa = 8420638C
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0):Old State = IKE_READY New State =
IKE_R_MM1
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): processing SA payload. message ID = 0
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but
major 0 mismatch
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): vendor ID is DPD
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but
major 69 mismatch
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but
major 157 mismatch
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): vendor ID is NAT-T v3
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but
major 123 mismatch
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): vendor ID is NAT-T v2
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but
major 164 mismatch
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0):found peer pre-shared key matching
192.199.19.91
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): local preshared key found
.Dec 12 11:16:50.408 MEZ: ISAKMP : Scanning profiles for xauth ...
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0):Checking ISAKMP transform 0 against
priority 1 policy
.Dec 12 11:16:50.408 MEZ: ISAKMP: life type in seconds
.Dec 12 11:16:50.408 MEZ: ISAKMP: life duration (basic) of 3600
.Dec 12 11:16:50.408 MEZ: ISAKMP: encryption 3DES-CBC
.Dec 12 11:16:50.408 MEZ: ISAKMP: hash SHA
.Dec 12 11:16:50.408 MEZ: ISAKMP: auth pre-share
.Dec 12 11:16:50.408 MEZ: ISAKMP: default group 2
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0):atts are acceptable. Next payload is 0
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but
major 0 mismatch
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): vendor ID is DPD
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but
major 69 mismatch
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but
major 157 mismatch
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): vendor ID is NAT-T v3
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but
major 123 mismatch
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): vendor ID is NAT-T v2
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but
major 164 mismatch
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_MAIN_MODE
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0):Old State = IKE_R_MM1 New State =
IKE_R_MM1
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): constructed NAT-T vendor-03 ID
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): sending packet to 192.199.19.91
my_port 500 peer_port 500 (R) MM_SA_SETUP
.Dec 12 11:16:50.416 MEZ: ISAKMP:(0):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_COMPLETE
.Dec 12 11:16:50.416 MEZ: ISAKMP:(0):Old State = IKE_R_MM1 New State =
IKE_R_MM2
.Dec 12 11:16:50.560 MEZ: ISAKMP (0:0): received packet from
192.199.19.91 dport 500 sport 500 Global (R) MM_SA_SETUP
.Dec 12 11:16:50.560 MEZ: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
.Dec 12 11:16:50.560 MEZ: ISAKMP:(0):Old State = IKE_R_MM2 New State =
IKE_R_MM3
.Dec 12 11:16:50.564 MEZ: ISAKMP:(0): processing KE payload. message ID = 0
.Dec 12 11:16:50.568 MEZ: ISAKMP:(0): processing NONCE payload. message
ID = 0
.Dec 12 11:16:50.568 MEZ: ISAKMP:(0):found peer pre-shared key matching
192.199.19.91
.Dec 12 11:16:50.572 MEZ: ISAKMP:received payload type 20
.Dec 12 11:16:50.572 MEZ: ISAKMP:received payload type 20
.Dec 12 11:16:50.572 MEZ: ISAKMP:(2108):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_MAIN_MODE
.Dec 12 11:16:50.572 MEZ: ISAKMP:(2108):Old State = IKE_R_MM3 New State
= IKE_R_MM3
.Dec 12 11:16:50.572 MEZ: ISAKMP:(2108): sending packet to 192.199.19.91
my_port 500 peer_port 500 (R) MM_KEY_EXCH
.Dec 12 11:16:50.572 MEZ: ISAKMP:(2108):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_COMPLETE
.Dec 12 11:16:50.572 MEZ: ISAKMP:(2108):Old State = IKE_R_MM3 New State
= IKE_R_MM4
.Dec 12 11:16:50.712 MEZ: ISAKMP (0:2108): received packet from
192.199.19.91 dport 500 sport 500 Global (R) MM_KEY_EXCH
.Dec 12 11:16:50.712 MEZ: ISAKMP:(2108):Input = IKE_MESG_FROM_PEER,
IKE_MM_EXCH
.Dec 12 11:16:50.712 MEZ: ISAKMP:(2108):Old State = IKE_R_MM4 New State
= IKE_R_MM5
.Dec 12 11:16:50.712 MEZ: ISAKMP:(2108): processing ID payload. message
ID = 0
.Dec 12 11:16:50.712 MEZ: ISAKMP (0:2108): ID payload
next-payload : 8
type : 1
address : 192.199.19.91
protocol : 0
port : 0
length : 12
.Dec 12 11:16:50.712 MEZ: ISAKMP:(0):: peer matches *none* of the profiles
.Dec 12 11:16:50.712 MEZ: ISAKMP:(2108): processing HASH payload.
message ID = 0
.Dec 12 11:16:50.716 MEZ: ISAKMP:(2108):SA authentication status:
authenticated
.Dec 12 11:16:50.716 MEZ: ISAKMP:(2108):SA has been authenticated with
192.199.19.91
.Dec 12 11:16:50.716 MEZ: ISAKMP: Trying to insert a peer
223.31.46.223/192.199.19.91/500/, and inserted successfully 82C2FD84.
.Dec 12 11:16:50.716 MEZ: ISAKMP:(2108):IKE_DPD is enabled, initializing
timers
.Dec 12 11:16:50.716 MEZ: ISAKMP:(2108):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_MAIN_MODE
.Dec 12 11:16:50.716 MEZ: ISAKMP:(2108):Old State = IKE_R_MM5 New State
= IKE_R_MM5
--------------------------------------------------
s15318887:~ # ipsec auto --verbose --up L2TPPSKCLIENT &
[1] 18727
s15318887:~ # 002 "L2TPPSKCLIENT" #1: initiating Main Mode
104 "L2TPPSKCLIENT" #1: STATE_MAIN_I1: initiate
003 "L2TPPSKCLIENT" #1: received Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-03] method set to=108
002 "L2TPPSKCLIENT" #1: enabling possible NAT-traversal with method
draft-ietf-ipsec-nat-t-ike-05
002 "L2TPPSKCLIENT" #1: transition from state STATE_MAIN_I1 to state
STATE_MAIN_I2
106 "L2TPPSKCLIENT" #1: STATE_MAIN_I2: sent MI2, expecting MR2
003 "L2TPPSKCLIENT" #1: received Vendor ID payload [Cisco-Unity]
003 "L2TPPSKCLIENT" #1: received Vendor ID payload [Dead Peer Detection]
003 "L2TPPSKCLIENT" #1: ignoring unknown Vendor ID payload
[4d20822dd69aa37a378d51757973dfcf]
003 "L2TPPSKCLIENT" #1: received Vendor ID payload [XAUTH]
003 "L2TPPSKCLIENT" #1: NAT-Traversal: Result using
draft-ietf-ipsec-nat-t-ike-02/03: no NAT detected
002 "L2TPPSKCLIENT" #1: transition from state STATE_MAIN_I2 to state
STATE_MAIN_I3
108 "L2TPPSKCLIENT" #1: STATE_MAIN_I3: sent MI3, expecting MR3
002 "L2TPPSKCLIENT" #1: Main mode peer ID is ID_IPV4_ADDR: '223.31.46.223'
002 "L2TPPSKCLIENT" #1: transition from state STATE_MAIN_I3 to state
STATE_MAIN_I4
004 "L2TPPSKCLIENT" #1: STATE_MAIN_I4: ISAKMP SA established
{auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha
group=modp1024}
002 "L2TPPSKCLIENT" #1: Dead Peer Detection (RFC 3706): enabled
002 "L2TPPSKCLIENT" #2: initiating Quick Mode
PSK+ENCRYPT+PFS+UP+IKEv2ALLOW {using isakmp#1 msgid:6ecaa780
proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=OAKLEY_GROUP_MODP1024}
117 "L2TPPSKCLIENT" #2: STATE_QUICK_I1: initiate
010 "L2TPPSKCLIENT" #2: STATE_QUICK_I1: retransmission; will wait 20s
for response
---------------------------------------------------------------
Dec 12 11:16:50 s15318887 pluto[18630]: | length: 24
Dec 12 11:16:50 s15318887 pluto[18630]: | removing 4 bytes of padding
Dec 12 11:16:50 s15318887 pluto[18630]: "L2TPPSKCLIENT" #1: Main mode
peer ID is ID_IPV4_ADDR: '223.31.46.223'
Dec 12 11:16:50 s15318887 pluto[18630]: | complete state transition with
STF_OK
Dec 12 11:16:50 s15318887 pluto[18630]: "L2TPPSKCLIENT" #1: transition
from state STATE_MAIN_I3 to state STATE_MAIN_I4
Dec 12 11:16:50 s15318887 pluto[18630]: | inserting event
EVENT_SA_REPLACE, timeout in 2808 seconds for #1
Dec 12 11:16:50 s15318887 pluto[18630]: "L2TPPSKCLIENT" #1:
STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY
cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
Dec 12 11:16:50 s15318887 pluto[18630]: | ICOOKIE: b9 85 10 7b 62 d2 5a ac
Dec 12 11:16:50 s15318887 pluto[18630]: | RCOOKIE: b8 e7 25 30 d6 9b a3 7a
Dec 12 11:16:50 s15318887 pluto[18630]: | state hash entry 23
Dec 12 11:16:50 s15318887 pluto[18630]: | v1 peer and cookies match on
#1, provided msgid 00000000 vs 00000000
Dec 12 11:16:50 s15318887 pluto[18630]: | v1 state object #1 found, in
STATE_MAIN_I4
Dec 12 11:16:50 s15318887 pluto[18630]: "L2TPPSKCLIENT" #1: Dead Peer
Detection (RFC 3706): enabled
Dec 12 11:16:50 s15318887 pluto[18630]: | state: 1 requesting event none
to be deleted by /root/resources/openswan-2.6.19/programs/pluto/dpd.c:160
Dec 12 11:16:50 s15318887 pluto[18630]: | inserting event EVENT_DPD,
timeout in 30 seconds for #1
Dec 12 11:16:50 s15318887 pluto[18630]: | modecfg pull: noquirk
policy:push not-client
Dec 12 11:16:50 s15318887 pluto[18630]: | phase 1 is done, looking for
phase 2 to unpend
Dec 12 11:16:50 s15318887 pluto[18630]: | unqueuing pending Quick Mode
with 223.31.46.223 "L2TPPSKCLIENT" import:admin initiate
Dec 12 11:16:50 s15318887 pluto[18630]: | duplicating state object #1
Dec 12 11:16:50 s15318887 pluto[18630]: | creating state object #2 at
0x722a20
Dec 12 11:16:50 s15318887 pluto[18630]: | processing connection
L2TPPSKCLIENT
Dec 12 11:16:50 s15318887 pluto[18630]: | ICOOKIE: b9 85 10 7b 62 d2 5a ac
Dec 12 11:16:50 s15318887 pluto[18630]: | RCOOKIE: b8 e7 25 30 d6 9b a3 7a
Dec 12 11:16:50 s15318887 pluto[18630]: | state hash entry 23
Dec 12 11:16:50 s15318887 pluto[18630]: | inserting state object #2 on
chain 23
Dec 12 11:16:50 s15318887 pluto[18630]: | inserting event
EVENT_SO_DISCARD, timeout in 0 seconds for #2
Dec 12 11:16:50 s15318887 pluto[18630]: |
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Dec 12 11:16:50 s15318887 pluto[18630]: "L2TPPSKCLIENT" #2: initiating
Quick Mode PSK+ENCRYPT+PFS+UP+IKEv2ALLOW {using isakmp#1 msgid:6ecaa780
proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=OAKLEY_GROUP_MODP1024}
Dec 12 11:16:50 s15318887 pluto[18630]: | 0: w->pcw_dead: 0 w->pcw_work:
0 cnt: 1
Dec 12 11:16:50 s15318887 pluto[18630]: | asking helper 0 to do
build_kenonce op on seq: 3 (len=2752, pcw_work=1)
Dec 12 11:16:50 s15318887 pluto[18630]: | crypto helper write of
request: cnt=2752<wlen=2752.
Dec 12 11:16:50 s15318887 pluto[18630]: | *inserting event
EVENT_CRYPTO_FAILED, timeout in 300 seconds for #2*
Dec 12 11:16:50 s15318887 pluto[18630]: | * processed 0 messages from
cryptographic helpers
Dec 12 11:16:50 s15318887 pluto[18630]: | next event
EVENT_NAT_T_KEEPALIVE in 20 seconds
Dec 12 11:16:50 s15318887 pluto[18638]: ! helper 0 read 2744+4/2752
bytesfd: 8
Dec 12 11:16:50 s15318887 pluto[18638]: ! helper 0 doing build_kenonce
op id: 3
Dec 12 11:16:50 s15318887 pluto[18630]: |
Dec 12 11:16:50 s15318887 pluto[18630]: | helper 0 has finished work
(cnt now 1)
Dec 12 11:16:50 s15318887 pluto[18630]: | helper 0 replies to id: q#3
Dec 12 11:16:50 s15318887 pluto[18630]: | processing connection
L2TPPSKCLIENT
Dec 12 11:16:50 s15318887 pluto[18630]: | kernel_alg_db_new() will
return p_new->protoid=3, p_new->trans_cnt=1
Dec 12 11:16:50 s15318887 pluto[18630]: | kernel_alg_db_new()
trans[0]: transid=3, attr_cnt=1, attrs[0].type=5, attrs[0].val=2
Dec 12 11:16:50 s15318887 pluto[18630]: | returning new proposal from
esp_info
Dec 12 11:16:50 s15318887 pluto[18630]: | sending 284 bytes for
quick_outI1 through eth0:500 to 223.31.46.223:500 (using #2)
Dec 12 11:16:50 s15318887 pluto[18630]: | inserting event
EVENT_RETRANSMIT, timeout in 10 seconds for #2
Dec 12 11:16:50 s15318887 pluto[18630]: | * processed 1 messages from
cryptographic helpers
Dec 12 11:16:50 s15318887 pluto[18630]: | next event EVENT_RETRANSMIT in
10 seconds for #2
Dec 12 11:16:50 s15318887 pluto[18630]: |
Dec 12 11:16:50 s15318887 pluto[18630]: | *received 124 bytes from
223.31.46.223:500 on eth0 (port=500)
Dec 12 11:16:50 s15318887 pluto[18630]: | **parse ISAKMP Message:
Dec 12 11:16:50 s15318887 pluto[18630]: | initiator cookie:
Dec 12 11:16:50 s15318887 pluto[18630]: | b9 85 10 7b 62 d2 5a ac
Dec 12 11:16:50 s15318887 pluto[18630]: | responder cookie:
Dec 12 11:16:50 s15318887 pluto[18630]: | b8 e7 25 30 d6 9b a3 7a
Dec 12 11:16:50 s15318887 pluto[18630]: | next payload type:
ISAKMP_NEXT_HASH
Dec 12 11:16:50 s15318887 pluto[18630]: | ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Dec 12 11:16:50 s15318887 pluto[18630]: | exchange type: ISAKMP_XCHG_INFO
Dec 12 11:16:50 s15318887 pluto[18630]: | flags: ISAKMP_FLAG_ENCRYPTION
Dec 12 11:16:50 s15318887 pluto[18630]: | message ID: 1e 80 3c 72
Dec 12 11:16:50 s15318887 pluto[18630]: | length: 124
Dec 12 11:16:50 s15318887 pluto[18630]: | processing version=1.0 packet
with exchange type=ISAKMP_XCHG_INFO (5)
Dec 12 11:16:50 s15318887 pluto[18630]: | ICOOKIE: b9 85 10 7b 62 d2 5a ac
Dec 12 11:16:50 s15318887 pluto[18630]: | RCOOKIE: b8 e7 25 30 d6 9b a3 7a
Dec 12 11:16:50 s15318887 pluto[18630]: | state hash entry 23
Dec 12 11:16:50 s15318887 pluto[18630]: | peer and cookies match on #2,
provided msgid 00000000 vs 80a7ca6e/00000000
Dec 12 11:16:50 s15318887 pluto[18630]: | peer and cookies match on #1,
provided msgid 00000000 vs 00000000/00000000
Dec 12 11:16:50 s15318887 pluto[18630]: | p15 state object #1 found, in
STATE_MAIN_I4
Dec 12 11:16:50 s15318887 pluto[18630]: | processing connection
L2TPPSKCLIENT
Dec 12 11:16:50 s15318887 pluto[18630]: | got payload
0x100(ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
Dec 12 11:16:50 s15318887 pluto[18630]: | ***parse ISAKMP Hash Payload:
Dec 12 11:16:50 s15318887 pluto[18630]: | next payload type:
ISAKMP_NEXT_N
Dec 12 11:16:50 s15318887 pluto[18630]: | length: 24
Dec 12 11:16:50 s15318887 pluto[18630]: | got payload
0x800(ISAKMP_NEXT_N) needed: 0x0 opt: 0x0
Dec 12 11:16:50 s15318887 pluto[18630]: | ***parse ISAKMP Notification
Payload:
Dec 12 11:16:50 s15318887 pluto[18630]: | next payload type:
ISAKMP_NEXT_NONE
Dec 12 11:16:50 s15318887 pluto[18630]: | length: 68
Dec 12 11:16:50 s15318887 pluto[18630]: | DOI: ISAKMP_DOI_IPSEC
Dec 12 11:16:50 s15318887 pluto[18630]: | protocol ID: 3
Dec 12 11:16:50 s15318887 pluto[18630]: | SPI size: 4
Dec 12 11:16:50 s15318887 pluto[18630]: | Notify Message Type:
NO_PROPOSAL_CHOSEN
Dec 12 11:16:50 s15318887 pluto[18630]: | removing 4 bytes of padding
Dec 12 11:16:50 s15318887 pluto[18630]: "L2TPPSKCLIENT" #1: ignoring
informational payload, type NO_PROPOSAL_CHOSEN msgid=00000000
Dec 12 11:16:50 s15318887 pluto[18630]: | info: 6c ef 38 8d 0a 00 00
34 00 00 00 01 00 00 00 01
Dec 12 11:16:50 s15318887 pluto[18630]: | info: 81 85 9a f8 83 97 ef
78 81 84 c7 3c 00 00 00 20
Dec 12 11:16:50 s15318887 pluto[18630]: | info: 00 00 00 00 83 97 ef
a0 84 1f 3b a8 83 97 ef 98
Dec 12 11:16:50 s15318887 pluto[18630]: | info: 81 84 c8 9c 01 00 00 18
Dec 12 11:16:50 s15318887 pluto[18630]: | processing informational
NO_PROPOSAL_CHOSEN (14)
Dec 12 11:16:50 s15318887 pluto[18630]: "L2TPPSKCLIENT" #1: received and
ignored informational message
Dec 12 11:16:50 s15318887 pluto[18630]: | complete state transition with
STF_IGNORE
Dec 12 11:16:50 s15318887 pluto[18630]: | * processed 0 messages from
cryptographic helpers
Dec 12 11:16:50 s15318887 pluto[18630]: | next event EVENT_RETRANSMIT in
10 seconds for #2
Dec 12 11:17:00 s15318887 pluto[18630]: |
Dec 12 11:17:00 s15318887 pluto[18630]: | *time to handle event
Dec 12 11:17:00 s15318887 pluto[18630]: | handling event EVENT_RETRANSMIT
Dec 12 11:17:00 s15318887 pluto[18630]: | event after this is
EVENT_NAT_T_KEEPALIVE in 10 seconds
Dec 12 11:17:00 s15318887 pluto[18630]: | processing connection
L2TPPSKCLIENT
Dec 12 11:17:00 s15318887 pluto[18630]: | handling event
EVENT_RETRANSMIT for <invalid> "L2TPPSKCLIENT" #2
Dec 12 11:17:00 s15318887 pluto[18630]: | sending 284 bytes for
EVENT_RETRANSMIT through eth0:500 to 223.31.46.223:500 (using #2)
Dec 12 11:17:00 s15318887 pluto[18630]: | inserting event
EVENT_RETRANSMIT, timeout in 20 seconds for #2
Dec 12 11:17:00 s15318887 pluto[18630]: | next event
EVENT_NAT_T_KEEPALIVE in 10 seconds
Dec 12 11:17:01 s15318887 /usr/sbin/cron[18737]: (root) CMD
(/usr/local/psa/admin/sbin/backupmng >/dev/null 2>&1)
Dec 12 11:17:10 s15318887 pluto[18630]: |
Dec 12 11:17:10 s15318887 pluto[18630]: | *time to handle event
Dec 12 11:17:10 s15318887 pluto[18630]: | handling event
EVENT_NAT_T_KEEPALIVE
Dec 12 11:17:10 s15318887 pluto[18630]: | event after this is
EVENT_RETRANSMIT in 10 seconds
Dec 12 11:17:10 s15318887 pluto[18630]: | processing connection
L2TPPSKCLIENT
Dec 12 11:17:10 s15318887 pluto[18630]: | processing connection
L2TPPSKCLIENT
Dec 12 11:17:10 s15318887 pluto[18630]: | next event EVENT_RETRANSMIT in
10 seconds for #2
Dec 12 11:17:20 s15318887 pluto[18630]: |
Dec 12 11:17:20 s15318887 pluto[18630]: | *received kernel message
Dec 12 11:17:20 s15318887 pluto[18630]: | * processed 0 messages from
cryptographic helpers
Dec 12 11:17:20 s15318887 pluto[18630]: | next event EVENT_RETRANSMIT in
0 seconds for #2
Dec 12 11:17:20 s15318887 pluto[18630]: |
Dec 12 11:17:20 s15318887 pluto[18630]: | *time to handle event
Dec 12 11:17:20 s15318887 pluto[18630]: | handling event EVENT_RETRANSMIT
Dec 12 11:17:20 s15318887 pluto[18630]: | event after this is EVENT_DPD
in 0 seconds
Dec 12 11:17:20 s15318887 pluto[18630]: | processing connection
L2TPPSKCLIENT
Dec 12 11:17:20 s15318887 pluto[18630]: | handling event
EVENT_RETRANSMIT for <invalid> "L2TPPSKCLIENT" #2
Dec 12 11:17:20 s15318887 pluto[18630]: | sending 284 bytes for
EVENT_RETRANSMIT through eth0:500 to 223.31.46.223:500 (using #2)
Dec 12 11:17:20 s15318887 pluto[18630]: | inserting event
EVENT_RETRANSMIT, timeout in 40 seconds for #2
Dec 12 11:17:20 s15318887 pluto[18630]: | next event EVENT_DPD in 0
seconds for #1
Dec 12 11:17:20 s15318887 pluto[18630]: |
Dec 12 11:17:20 s15318887 pluto[18630]: | *time to handle event
Dec 12 11:17:20 s15318887 pluto[18630]: | handling event EVENT_DPD
Dec 12 11:17:20 s15318887 pluto[18630]: | event after this is
EVENT_RETRANSMIT in 40 seconds
Dec 12 11:17:20 s15318887 pluto[18630]: | processing connection
L2TPPSKCLIENT
Dec 12 11:17:20 s15318887 pluto[18630]: | state: 1 requesting event none
to be deleted by /root/resources/openswan-2.6.19/programs/pluto/dpd.c:193
Dec 12 11:17:20 s15318887 pluto[18630]: | inserting event
EVENT_DPD_TIMEOUT, timeout in 120 seconds for #1
Dec 12 11:17:20 s15318887 pluto[18630]: | sending 84 bytes for ISAKMP
notify through eth0:500 to 223.31.46.223:500 (using #1)
Dec 12 11:17:20 s15318887 pluto[18630]: | next event EVENT_RETRANSMIT in
40 seconds for #2
Dec 12 11:17:20 s15318887 pluto[18630]: |
Dec 12 11:17:20 s15318887 pluto[18630]: | *received 92 bytes from
223.31.46.223:500 on eth0 (port=500)
Dec 12 11:17:20 s15318887 pluto[18630]: | **parse ISAKMP Message:
Dec 12 11:17:20 s15318887 pluto[18630]: | initiator cookie:
Dec 12 11:17:20 s15318887 pluto[18630]: | b9 85 10 7b 62 d2 5a ac
Dec 12 11:17:20 s15318887 pluto[18630]: | responder cookie:
Dec 12 11:17:20 s15318887 pluto[18630]: | b8 e7 25 30 d6 9b a3 7a
Dec 12 11:17:20 s15318887 pluto[18630]: | next payload type:
ISAKMP_NEXT_HASH
Dec 12 11:17:20 s15318887 pluto[18630]: | ISAKMP version: ISAKMP
Version 1.0 (rfc2407)
Dec 12 11:17:20 s15318887 pluto[18630]: | exchange type: ISAKMP_XCHG_INFO
Dec 12 11:17:20 s15318887 pluto[18630]: | flags: ISAKMP_FLAG_ENCRYPTION
Dec 12 11:17:20 s15318887 pluto[18630]: | message ID: 0d 6a aa 6e
Dec 12 11:17:20 s15318887 pluto[18630]: | length: 92
Dec 12 11:17:20 s15318887 pluto[18630]: | processing version=1.0 packet
with exchange type=ISAKMP_XCHG_INFO (5)
Dec 12 11:17:20 s15318887 pluto[18630]: | ICOOKIE: b9 85 10 7b 62 d2 5a ac
Dec 12 11:17:20 s15318887 pluto[18630]: | RCOOKIE: b8 e7 25 30 d6 9b a3 7a
Dec 12 11:17:20 s15318887 pluto[18630]: | state hash entry 23
Dec 12 11:17:20 s15318887 pluto[18630]: | peer and cookies match on #2,
provided msgid 00000000 vs 80a7ca6e/00000000
Dec 12 11:17:20 s15318887 pluto[18630]: | peer and cookies match on #1,
provided msgid 00000000 vs 00000000/00000000
Dec 12 11:17:20 s15318887 pluto[18630]: | p15 state object #1 found, in
STATE_MAIN_I4
Dec 12 11:17:20 s15318887 pluto[18630]: | processing connection
L2TPPSKCLIENT
Dec 12 11:17:20 s15318887 pluto[18630]: | got payload
0x100(ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
Dec 12 11:17:20 s15318887 pluto[18630]: | ***parse ISAKMP Hash Payload:
Dec 12 11:17:20 s15318887 pluto[18630]: | next payload type:
ISAKMP_NEXT_N
Dec 12 11:17:20 s15318887 pluto[18630]: | length: 24
Dec 12 11:17:20 s15318887 pluto[18630]: | got payload
0x800(ISAKMP_NEXT_N) needed: 0x0 opt: 0x0
Dec 12 11:17:20 s15318887 pluto[18630]: | ***parse ISAKMP Notification
Payload:
Dec 12 11:17:20 s15318887 pluto[18630]: | next payload type:
ISAKMP_NEXT_NONE
Dec 12 11:17:20 s15318887 pluto[18630]: | length: 32
Dec 12 11:17:20 s15318887 pluto[18630]: | DOI: ISAKMP_DOI_IPSEC
Dec 12 11:17:20 s15318887 pluto[18630]: | protocol ID: 1
Dec 12 11:17:20 s15318887 pluto[18630]: | SPI size: 16
Dec 12 11:17:20 s15318887 pluto[18630]: | Notify Message Type:
R_U_THERE_ACK
Dec 12 11:17:20 s15318887 pluto[18630]: | removing 8 bytes of padding
Dec 12 11:17:20 s15318887 pluto[18630]: | info: b9 85 10 7b 62 d2 5a
ac b8 e7 25 30 d6 9b a3 7a
Dec 12 11:17:20 s15318887 pluto[18630]: | info: 00 00 44 3e
Dec 12 11:17:20 s15318887 pluto[18630]: | processing informational
R_U_THERE_ACK (36137)
Dec 12 11:17:20 s15318887 pluto[18630]: | state: 1 requesting event
EVENT_DPD_TIMEOUT to be deleted by
/root/resources/openswan-2.6.19/programs/pluto/dpd.c:515
Dec 12 11:17:20 s15318887 pluto[18630]: | complete state transition with
STF_IGNORE
Dec 12 11:17:20 s15318887 pluto[18630]: | * processed 0 messages from
cryptographic helpers
Dec 12 11:17:20 s15318887 pluto[18630]: | next event EVENT_RETRANSMIT in
40 seconds for #2
Dec 12 11:17:24 s15318887 ipsec_setup: Stopping Openswan IPsec...
Dec 12 11:17:24 s15318887 pluto[18630]: |
Dec 12 11:17:24 s15318887 pluto[18630]: | *received whack message
Dec 12 11:17:24 s15318887 pluto[18630]: shutting down
Dec 12 11:17:24 s15318887 pluto[18630]: forgetting secrets
Dec 12 11:17:24 s15318887 pluto[18630]: | processing connection
L2TPPSKCLIENT
Dec 12 11:17:24 s15318887 pluto[18630]: "L2TPPSKCLIENT": deleting connection
Dec 12 11:17:24 s15318887 pluto[18630]: | processing connection
L2TPPSKCLIENT
Dec 12 11:17:24 s15318887 pluto[18630]: "L2TPPSKCLIENT" #2: deleting
state (STATE_QUICK_I1)
Dec 12 11:17:24 s15318887 pluto[18630]: | deleting state #2
Dec 12 11:17:24 s15318887 pluto[18630]: | ICOOKIE: b9 85 10 7b 62 d2 5a ac
Dec 12 11:17:24 s15318887 pluto[18630]: | RCOOKIE: b8 e7 25 30 d6 9b a3 7a
Dec 12 11:17:24 s15318887 pluto[18630]: | state hash entry 23
Dec 12 11:17:24 s15318887 pluto[18630]: | processing connection
L2TPPSKCLIENT
Dec 12 11:17:24 s15318887 pluto[18630]: "L2TPPSKCLIENT" #1: deleting
state (STATE_MAIN_I4)
Dec 12 11:17:24 s15318887 pluto[18630]: | deleting state #1
Dec 12 11:17:24 s15318887 pluto[18630]: | sending 84 bytes for delete
notify through eth0:500 to 223.31.46.223:500 (using #1)
Dec 12 11:17:24 s15318887 pluto[18630]: | ICOOKIE: b9 85 10 7b 62 d2 5a ac
Dec 12 11:17:24 s15318887 pluto[18630]: | RCOOKIE: b8 e7 25 30 d6 9b a3 7a
Dec 12 11:17:24 s15318887 pluto[18630]: | state hash entry 23
Dec 12 11:17:24 s15318887 pluto[18630]: | alg_info_delref(0x71dc40)
alg_info->ref_cnt=2
Dec 12 11:17:24 s15318887 pluto[18630]: | alg_info_delref(0x71cff0)
alg_info->ref_cnt=2
Dec 12 11:17:24 s15318887 pluto[18630]: shutting down interface lo/lo
::1:500
Dec 12 11:17:24 s15318887 pluto[18630]: shutting down interface lo/lo
127.0.0.1:4500
Dec 12 11:17:24 s15318887 pluto[18630]: shutting down interface lo/lo
127.0.0.1:500
Dec 12 11:17:24 s15318887 pluto[18630]: shutting down interface
eth0/eth0 192.199.19.91:4500
Dec 12 11:17:24 s15318887 pluto[18630]: shutting down interface
eth0/eth0 192.199.19.91:500
Dec 12 11:17:26 s15318887 ipsec_setup: ...Openswan IPsec stopped
--------- end messages ---------------------
----------- CICSO LOG -------------------
.Dec 12 11:16:50.716 MEZ: ISAKMP:(2108):SA is doing pre-shared key
authentication using id type ID_IPV4_ADDR
.Dec 12 11:16:50.716 MEZ: ISAKMP (0:2108): ID payload
next-payload : 8
type : 1
address : 223.31.46.223
protocol : 17
port : 500
length : 12
.Dec 12 11:16:50.716 MEZ: ISAKMP:(2108):Total payload length: 12
.Dec 12 11:16:50.716 MEZ: ISAKMP:(2108): sending packet to 192.199.19.91
my_port 500 peer_port 500 (R) MM_KEY_EXCH
.Dec 12 11:16:50.720 MEZ: ISAKMP:(2108):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_COMPLETE
.Dec 12 11:16:50.720 MEZ: ISAKMP:(2108):Old State = IKE_R_MM5 New State
= IKE_P1_COMPLETE
.Dec 12 11:16:50.720 MEZ: ISAKMP:(2108):Input = IKE_MESG_INTERNAL,
IKE_PHASE1_COMPLETE
.Dec 12 11:16:50.720 MEZ: ISAKMP:(2108):Old State = IKE_P1_COMPLETE New
State = IKE_P1_COMPLETE
.Dec 12 11:16:50.836 MEZ: ISAKMP (0:2108): received packet from
192.199.19.91 dport 500 sport 500 Global (R) QM_IDLE
.Dec 12 11:16:50.836 MEZ: ISAKMP: set new node -2136487314 to QM_IDLE
.Dec 12 11:16:50.840 MEZ: ISAKMP:(2108): processing HASH payload.
message ID = -2136487314
.Dec 12 11:16:50.840 MEZ: ISAKMP:(2108): processing SA payload. message
ID = -2136487314
.Dec 12 11:16:50.840 MEZ: ISAKMP:(2108):Checking IPSec proposal 0
.Dec 12 11:16:50.840 MEZ: ISAKMP: transform 0, ESP_3DES
.Dec 12 11:16:50.840 MEZ: ISAKMP: attributes in transform:
.Dec 12 11:16:50.840 MEZ: ISAKMP: group is 2
.Dec 12 11:16:50.840 MEZ: ISAKMP: encaps is 2 (Transport)
.Dec 12 11:16:50.840 MEZ: ISAKMP: SA life type in seconds
.Dec 12 11:16:50.840 MEZ: ISAKMP: SA life duration (basic) of 28800
.Dec 12 11:16:50.840 MEZ: ISAKMP: authenticator is HMAC-SHA
.Dec 12 11:16:50.840 MEZ: ISAKMP:(2108):atts are acceptable.
.Dec 12 11:16:50.840 MEZ: ISAKMP:(2108): *IPSec policy invalidated
proposal with error 1024*
.Dec 12 11:16:50.840 MEZ: ISAKMP:(2108): *phase 2 SA policy not
acceptable! (local 223.31.46.223 remote 192.199.19.91)*
.Dec 12 11:16:50.840 MEZ: ISAKMP: set new node 511720562 to QM_IDLE
.Dec 12 11:16:50.840 MEZ: ISAKMP:(2108):Sending NOTIFY
PROPOSAL_NOT_CHOSEN protocol 3
spi 2207772352, message ID = 511720562
.Dec 12 11:16:50.840 MEZ: ISAKMP:(2108): sending packet to 192.199.19.91
my_port 500 peer_port 500 (R) QM_IDLE
.Dec 12 11:16:50.844 MEZ: ISAKMP:(2108):purging node 511720562
.Dec 12 11:16:50.844 MEZ: ISAKMP:(2108):deleting node -2136487314 error
TRUE reason "QM rejected"
.Dec 12 11:16:50.844 MEZ: ISAKMP:(2108):Node -2136487314, Input =
IKE_MESG_FROM_PEER, IKE_QM_EXCH
.Dec 12 11:16:50.844 MEZ: ISAKMP:(2108):Old State = IKE_QM_READY New
State = IKE_QM_READY
.Dec 12 11:17:00.917 MEZ: ISAKMP (0:2108): received packet from
192.199.19.91 dport 500 sport 500 Global (R) QM_IDLE
.Dec 12 11:17:00.917 MEZ: ISAKMP:(2108): *phase 2 packet is a duplicate
of a previous packet.*
.Dec 12 11:17:00.917 MEZ: ISAKMP:(2108): retransmitting due to
retransmit phase 2
.Dec 12 11:17:00.917 MEZ: ISAKMP:(2108): ignoring retransmission,because
phase2 node marked dead -2136487314
.Dec 12 11:17:20.831 MEZ: ISAKMP (0:2108): received packet from
192.199.19.91 dport 500 sport 500 Global (R) QM_IDLE
.Dec 12 11:17:20.831 MEZ: ISAKMP: set new node 1938031181 to QM_IDLE
.Dec 12 11:17:20.831 MEZ: ISAKMP:(2108): processing HASH payload.
message ID = 1938031181
.Dec 12 11:17:20.831 MEZ: ISAKMP:(2108): processing NOTIFY DPD/R_U_THERE
protocol 1
spi 0, message ID = 1938031181, sa = 8420638C
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108):deleting node 1938031181 error
FALSE reason "Informational (in) state 1"
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108):Input = IKE_MESG_FROM_PEER,
IKE_INFO_NOTIFY
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108):Old State = IKE_P1_COMPLETE New
State = IKE_P1_COMPLETE
.Dec 12 11:17:20.835 MEZ: ISAKMP (0:2108): received packet from
192.199.19.91 dport 500 sport 500 Global (R) QM_IDLE
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108): *phase 2 packet is a duplicate
of a previous packet.*
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108): retransmitting due to
retransmit phase 2
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108): ignoring retransmission,because
phase2 node marked dead -2136487314
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108):DPD/R_U_THERE received from peer
192.199.19.91, sequence 0x443E
.Dec 12 11:17:20.835 MEZ: ISAKMP: set new node 225094254 to QM_IDLE
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108):Sending NOTIFY DPD/R_U_THERE_ACK
protocol 1
spi 2207773184, message ID = 225094254
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108): seq. no 0x443E
.Dec 12 11:17:20.839 MEZ: ISAKMP:(2108): sending packet to 192.199.19.91
my_port 500 peer_port 500 (R) QM_IDLE
.Dec 12 11:17:20.839 MEZ: ISAKMP:(2108):purging node 225094254
.Dec 12 11:17:20.839 MEZ: ISAKMP:(2108):Input = IKE_MESG_FROM_PEER,
IKE_MESG_KEEP_ALIVE
.Dec 12 11:17:20.839 MEZ: ISAKMP:(2108):Old State = IKE_P1_COMPLETE New
State = IKE_P1_COMPLETE
.Dec 12 11:17:24.766 MEZ: ISAKMP (0:2108): received packet from
192.199.19.91 dport 500 sport 500 Global (R) QM_IDLE
.Dec 12 11:17:24.766 MEZ: ISAKMP: set new node -1823789155 to QM_IDLE
.Dec 12 11:17:24.770 MEZ: ISAKMP:(2108): processing HASH payload.
message ID = -1823789155
.Dec 12 11:17:24.770 MEZ: ISAKMP:(2108): processing DELETE payload.
message ID = -1823789155
.Dec 12 11:17:24.770 MEZ: ISAKMP:(2108):peer does not do paranoid
keepalives.
.Dec 12 11:17:24.770 MEZ: ISAKMP:(2108):deleting SA reason "No reason"
state (R) QM_IDLE (peer 192.199.19.91)
.Dec 12 11:17:24.770 MEZ: ISAKMP:(2108):deleting node -1823789155 error
FALSE reason "Informational (in) state 1"
.Dec 12 11:17:24.770 MEZ: ISAKMP: set new node 21968057 to QM_IDLE
.Dec 12 11:17:24.770 MEZ: ISAKMP:(2108): sending packet to 192.199.19.91
my_port 500 peer_port 500 (R) QM_IDLE
.Dec 12 11:17:24.770 MEZ: ISAKMP:(2108):purging node 21968057
.Dec 12 11:17:24.774 MEZ: ISAKMP:(2108):Input = IKE_MESG_INTERNAL,
IKE_PHASE1_DEL
.Dec 12 11:17:24.774 MEZ: ISAKMP:(2108):Old State = IKE_P1_COMPLETE New
State = IKE_DEST_SA
.Dec 12 11:17:24.774 MEZ: ISAKMP:(2108):deleting SA reason "No reason"
state (R) QM_IDLE (peer 192.199.19.91)
.Dec 12 11:17:24.774 MEZ: ISAKMP: Unlocking peer struct 0x82C2FD84 for
isadb_mark_sa_deleted(), count 0
.Dec 12 11:17:24.774 MEZ: ISAKMP: Deleting peer node by peer_reap for
192.199.19.91: 82C2FD84
.Dec 12 11:17:24.774 MEZ: ISAKMP:(2108):deleting node -2136487314 error
FALSE reason "IKE deleted"
.Dec 12 11:17:24.774 MEZ: ISAKMP:(2108):deleting node 1938031181 error
FALSE reason "IKE deleted"
.Dec 12 11:17:24.774 MEZ: ISAKMP:(2108):deleting node -1823789155 error
FALSE reason "IKE deleted"
.Dec 12 11:17:24.774 MEZ: ISAKMP:(2108):Input = IKE_MESG_FROM_PEER,
IKE_MM_EXCH
.Dec 12 11:17:24.774 MEZ: ISAKMP:(2108):Old State = IKE_DEST_SA New
State = IKE_DEST_SA
---------------end cisco log- -----------------
---------- cmd output from connection try -----------
s15318887:~ # ipsec auto --verbose --up L2TPPSKCLIENT &
[1] 18727
s15318887:~ # 002 "L2TPPSKCLIENT" #1: initiating Main Mode
104 "L2TPPSKCLIENT" #1: STATE_MAIN_I1: initiate
003 "L2TPPSKCLIENT" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] method set to=108
002 "L2TPPSKCLIENT" #1: enabling possible NAT-traversal with method draft-ietf-ipsec-nat-t-ike-05
002 "L2TPPSKCLIENT" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2
106 "L2TPPSKCLIENT" #1: STATE_MAIN_I2: sent MI2, expecting MR2
003 "L2TPPSKCLIENT" #1: received Vendor ID payload [Cisco-Unity]
003 "L2TPPSKCLIENT" #1: received Vendor ID payload [Dead Peer Detection]
003 "L2TPPSKCLIENT" #1: ignoring unknown Vendor ID payload [4d20822dd69aa37a378d51757973dfcf]
003 "L2TPPSKCLIENT" #1: received Vendor ID payload [XAUTH]
003 "L2TPPSKCLIENT" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: no NAT detected
002 "L2TPPSKCLIENT" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3
108 "L2TPPSKCLIENT" #1: STATE_MAIN_I3: sent MI3, expecting MR3
002 "L2TPPSKCLIENT" #1: Main mode peer ID is ID_IPV4_ADDR: '223.31.46.223'
002 "L2TPPSKCLIENT" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4
004 "L2TPPSKCLIENT" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
002 "L2TPPSKCLIENT" #1: Dead Peer Detection (RFC 3706): enabled
002 "L2TPPSKCLIENT" #2: initiating Quick Mode PSK+ENCRYPT+PFS+UP+IKEv2ALLOW {using isakmp#1 msgid:6ecaa780 proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=OAKLEY_GROUP_MODP1024}
117 "L2TPPSKCLIENT" #2: STATE_QUICK_I1: initiate
010 "L2TPPSKCLIENT" #2: STATE_QUICK_I1: retransmission; will wait 20s for respons
-----------------------------end conn try ------------
More information about the Users
mailing list