[Openswan Users] Message ID is 0 with openswan as client to cisco 876W]

Markus Locher ml at as-support.com
Fri Dec 12 05:39:39 EST 2008


--- last again because was html --- sorry!!

Hi all,

I have a new situation now and I will document this for the next reader 
coming up with same problem.

I deleted the line (which I don´t know how it came into router config) I 
mentioned in the last mail with:
no crypto isakmp key # address 192.199.19.91

Problem changed but we are not through this now. So I search for the 
reason this fails on my new tries.

So the connection has passed Pahse 1 and stucks in Phase 2 now. Here are 
the logs:

Regards Markus

-------- /var/log/messages --------------------
.Dec 12 11:16:50.400 MEZ: ISAKMP (0:0): received packet from 
192.199.19.91 dport 500 sport 500 Global (N) NEW SA
.Dec 12 11:16:50.400 MEZ: ISAKMP: Created a peer struct for 
192.199.19.91, peer port 500
.Dec 12 11:16:50.400 MEZ: ISAKMP: New peer created peer = 0x82C2FD84 
peer_handle = 0x80000115
.Dec 12 11:16:50.400 MEZ: ISAKMP: Locking peer struct 0x82C2FD84, 
refcount 1 for crypto_isakmp_process_block
.Dec 12 11:16:50.400 MEZ: ISAKMP: local port 500, remote port 500
.Dec 12 11:16:50.404 MEZ: insert sa successfully sa = 8420638C
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0):Old State = IKE_READY  New State = 
IKE_R_MM1

.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): processing SA payload. message ID = 0
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but 
major 0 mismatch
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): vendor ID is DPD
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but 
major 69 mismatch
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but 
major 157 mismatch
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): vendor ID is NAT-T v3
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.404 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but 
major 123 mismatch
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): vendor ID is NAT-T v2
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but 
major 164 mismatch
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0):found peer pre-shared key matching 
192.199.19.91
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): local preshared key found
.Dec 12 11:16:50.408 MEZ: ISAKMP : Scanning profiles for xauth ...
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0):Checking ISAKMP transform 0 against 
priority 1 policy
.Dec 12 11:16:50.408 MEZ: ISAKMP:      life type in seconds
.Dec 12 11:16:50.408 MEZ: ISAKMP:      life duration (basic) of 3600
.Dec 12 11:16:50.408 MEZ: ISAKMP:      encryption 3DES-CBC
.Dec 12 11:16:50.408 MEZ: ISAKMP:      hash SHA
.Dec 12 11:16:50.408 MEZ: ISAKMP:      auth pre-share
.Dec 12 11:16:50.408 MEZ: ISAKMP:      default group 2
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0):atts are acceptable. Next payload is 0
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but 
major 0 mismatch
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): vendor ID is DPD
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.408 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but 
major 69 mismatch
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but 
major 157 mismatch
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): vendor ID is NAT-T v3
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but 
major 123 mismatch
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): vendor ID is NAT-T v2
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): processing vendor id payload
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): vendor ID seems Unity/DPD but 
major 164 mismatch
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0):Input = IKE_MESG_INTERNAL, 
IKE_PROCESS_MAIN_MODE
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0):Old State = IKE_R_MM1  New State = 
IKE_R_MM1

.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): constructed NAT-T vendor-03 ID
.Dec 12 11:16:50.412 MEZ: ISAKMP:(0): sending packet to 192.199.19.91 
my_port 500 peer_port 500 (R) MM_SA_SETUP
.Dec 12 11:16:50.416 MEZ: ISAKMP:(0):Input = IKE_MESG_INTERNAL, 
IKE_PROCESS_COMPLETE
.Dec 12 11:16:50.416 MEZ: ISAKMP:(0):Old State = IKE_R_MM1  New State = 
IKE_R_MM2

.Dec 12 11:16:50.560 MEZ: ISAKMP (0:0): received packet from 
192.199.19.91 dport 500 sport 500 Global (R) MM_SA_SETUP
.Dec 12 11:16:50.560 MEZ: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
.Dec 12 11:16:50.560 MEZ: ISAKMP:(0):Old State = IKE_R_MM2  New State = 
IKE_R_MM3

.Dec 12 11:16:50.564 MEZ: ISAKMP:(0): processing KE payload. message ID = 0
.Dec 12 11:16:50.568 MEZ: ISAKMP:(0): processing NONCE payload. message 
ID = 0
.Dec 12 11:16:50.568 MEZ: ISAKMP:(0):found peer pre-shared key matching 
192.199.19.91
.Dec 12 11:16:50.572 MEZ: ISAKMP:received payload type 20
.Dec 12 11:16:50.572 MEZ: ISAKMP:received payload type 20
.Dec 12 11:16:50.572 MEZ: ISAKMP:(2108):Input = IKE_MESG_INTERNAL, 
IKE_PROCESS_MAIN_MODE
.Dec 12 11:16:50.572 MEZ: ISAKMP:(2108):Old State = IKE_R_MM3  New State 
= IKE_R_MM3

.Dec 12 11:16:50.572 MEZ: ISAKMP:(2108): sending packet to 192.199.19.91 
my_port 500 peer_port 500 (R) MM_KEY_EXCH
.Dec 12 11:16:50.572 MEZ: ISAKMP:(2108):Input = IKE_MESG_INTERNAL, 
IKE_PROCESS_COMPLETE
.Dec 12 11:16:50.572 MEZ: ISAKMP:(2108):Old State = IKE_R_MM3  New State 
= IKE_R_MM4

.Dec 12 11:16:50.712 MEZ: ISAKMP (0:2108): received packet from 
192.199.19.91 dport 500 sport 500 Global (R) MM_KEY_EXCH
.Dec 12 11:16:50.712 MEZ: ISAKMP:(2108):Input = IKE_MESG_FROM_PEER, 
IKE_MM_EXCH
.Dec 12 11:16:50.712 MEZ: ISAKMP:(2108):Old State = IKE_R_MM4  New State 
= IKE_R_MM5

.Dec 12 11:16:50.712 MEZ: ISAKMP:(2108): processing ID payload. message 
ID = 0
.Dec 12 11:16:50.712 MEZ: ISAKMP (0:2108): ID payload
        next-payload : 8
        type         : 1
        address      : 192.199.19.91
        protocol     : 0
        port         : 0
        length       : 12
.Dec 12 11:16:50.712 MEZ: ISAKMP:(0):: peer matches *none* of the profiles
.Dec 12 11:16:50.712 MEZ: ISAKMP:(2108): processing HASH payload. 
message ID = 0
.Dec 12 11:16:50.716 MEZ: ISAKMP:(2108):SA authentication status:
        authenticated
.Dec 12 11:16:50.716 MEZ: ISAKMP:(2108):SA has been authenticated with 
192.199.19.91
.Dec 12 11:16:50.716 MEZ: ISAKMP: Trying to insert a peer 
223.31.46.223/192.199.19.91/500/,  and inserted successfully 82C2FD84.
.Dec 12 11:16:50.716 MEZ: ISAKMP:(2108):IKE_DPD is enabled, initializing 
timers
.Dec 12 11:16:50.716 MEZ: ISAKMP:(2108):Input = IKE_MESG_INTERNAL, 
IKE_PROCESS_MAIN_MODE
.Dec 12 11:16:50.716 MEZ: ISAKMP:(2108):Old State = IKE_R_MM5  New State 
= IKE_R_MM5
--------------------------------------------------
s15318887:~ # ipsec auto --verbose --up L2TPPSKCLIENT &
[1] 18727
s15318887:~ # 002 "L2TPPSKCLIENT" #1: initiating Main Mode
104 "L2TPPSKCLIENT" #1: STATE_MAIN_I1: initiate
003 "L2TPPSKCLIENT" #1: received Vendor ID payload 
[draft-ietf-ipsec-nat-t-ike-03] method set to=108
002 "L2TPPSKCLIENT" #1: enabling possible NAT-traversal with method 
draft-ietf-ipsec-nat-t-ike-05
002 "L2TPPSKCLIENT" #1: transition from state STATE_MAIN_I1 to state 
STATE_MAIN_I2
106 "L2TPPSKCLIENT" #1: STATE_MAIN_I2: sent MI2, expecting MR2
003 "L2TPPSKCLIENT" #1: received Vendor ID payload [Cisco-Unity]
003 "L2TPPSKCLIENT" #1: received Vendor ID payload [Dead Peer Detection]
003 "L2TPPSKCLIENT" #1: ignoring unknown Vendor ID payload 
[4d20822dd69aa37a378d51757973dfcf]
003 "L2TPPSKCLIENT" #1: received Vendor ID payload [XAUTH]
003 "L2TPPSKCLIENT" #1: NAT-Traversal: Result using 
draft-ietf-ipsec-nat-t-ike-02/03: no NAT detected
002 "L2TPPSKCLIENT" #1: transition from state STATE_MAIN_I2 to state 
STATE_MAIN_I3
108 "L2TPPSKCLIENT" #1: STATE_MAIN_I3: sent MI3, expecting MR3
002 "L2TPPSKCLIENT" #1: Main mode peer ID is ID_IPV4_ADDR: '223.31.46.223'
002 "L2TPPSKCLIENT" #1: transition from state STATE_MAIN_I3 to state 
STATE_MAIN_I4
004 "L2TPPSKCLIENT" #1: STATE_MAIN_I4: ISAKMP SA established 
{auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha 
group=modp1024}
002 "L2TPPSKCLIENT" #1: Dead Peer Detection (RFC 3706): enabled
002 "L2TPPSKCLIENT" #2: initiating Quick Mode 
PSK+ENCRYPT+PFS+UP+IKEv2ALLOW {using isakmp#1 msgid:6ecaa780 
proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=OAKLEY_GROUP_MODP1024}
117 "L2TPPSKCLIENT" #2: STATE_QUICK_I1: initiate
010 "L2TPPSKCLIENT" #2: STATE_QUICK_I1: retransmission; will wait 20s 
for response
---------------------------------------------------------------

Dec 12 11:16:50 s15318887 pluto[18630]: |    length: 24
Dec 12 11:16:50 s15318887 pluto[18630]: | removing 4 bytes of padding
Dec 12 11:16:50 s15318887 pluto[18630]: "L2TPPSKCLIENT" #1: Main mode 
peer ID is ID_IPV4_ADDR: '223.31.46.223'
Dec 12 11:16:50 s15318887 pluto[18630]: | complete state transition with 
STF_OK
Dec 12 11:16:50 s15318887 pluto[18630]: "L2TPPSKCLIENT" #1: transition 
from state STATE_MAIN_I3 to state STATE_MAIN_I4
Dec 12 11:16:50 s15318887 pluto[18630]: | inserting event 
EVENT_SA_REPLACE, timeout in 2808 seconds for #1
Dec 12 11:16:50 s15318887 pluto[18630]: "L2TPPSKCLIENT" #1: 
STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY 
cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}
Dec 12 11:16:50 s15318887 pluto[18630]: | ICOOKIE:  b9 85 10 7b  62 d2 5a ac
Dec 12 11:16:50 s15318887 pluto[18630]: | RCOOKIE:  b8 e7 25 30  d6 9b a3 7a
Dec 12 11:16:50 s15318887 pluto[18630]: | state hash entry 23
Dec 12 11:16:50 s15318887 pluto[18630]: | v1 peer and cookies match on 
#1, provided msgid 00000000 vs 00000000
Dec 12 11:16:50 s15318887 pluto[18630]: | v1 state object #1 found, in 
STATE_MAIN_I4
Dec 12 11:16:50 s15318887 pluto[18630]: "L2TPPSKCLIENT" #1: Dead Peer 
Detection (RFC 3706): enabled
Dec 12 11:16:50 s15318887 pluto[18630]: | state: 1 requesting event none 
to be deleted by /root/resources/openswan-2.6.19/programs/pluto/dpd.c:160
Dec 12 11:16:50 s15318887 pluto[18630]: | inserting event EVENT_DPD, 
timeout in 30 seconds for #1
Dec 12 11:16:50 s15318887 pluto[18630]: | modecfg pull: noquirk 
policy:push not-client
Dec 12 11:16:50 s15318887 pluto[18630]: | phase 1 is done, looking for 
phase 2 to unpend
Dec 12 11:16:50 s15318887 pluto[18630]: | unqueuing pending Quick Mode 
with 223.31.46.223 "L2TPPSKCLIENT" import:admin initiate
Dec 12 11:16:50 s15318887 pluto[18630]: | duplicating state object #1
Dec 12 11:16:50 s15318887 pluto[18630]: | creating state object #2 at 
0x722a20
Dec 12 11:16:50 s15318887 pluto[18630]: | processing connection 
L2TPPSKCLIENT
Dec 12 11:16:50 s15318887 pluto[18630]: | ICOOKIE:  b9 85 10 7b  62 d2 5a ac
Dec 12 11:16:50 s15318887 pluto[18630]: | RCOOKIE:  b8 e7 25 30  d6 9b a3 7a
Dec 12 11:16:50 s15318887 pluto[18630]: | state hash entry 23
Dec 12 11:16:50 s15318887 pluto[18630]: | inserting state object #2 on 
chain 23
Dec 12 11:16:50 s15318887 pluto[18630]: | inserting event 
EVENT_SO_DISCARD, timeout in 0 seconds for #2
Dec 12 11:16:50 s15318887 pluto[18630]: | 
kernel_alg_esp_auth_keylen(auth=2, sadb_aalg=3): a_keylen=20
Dec 12 11:16:50 s15318887 pluto[18630]: "L2TPPSKCLIENT" #2: initiating 
Quick Mode PSK+ENCRYPT+PFS+UP+IKEv2ALLOW {using isakmp#1 msgid:6ecaa780 
proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=OAKLEY_GROUP_MODP1024}
Dec 12 11:16:50 s15318887 pluto[18630]: | 0: w->pcw_dead: 0 w->pcw_work: 
0 cnt: 1
Dec 12 11:16:50 s15318887 pluto[18630]: | asking helper 0 to do 
build_kenonce op on seq: 3 (len=2752, pcw_work=1)
Dec 12 11:16:50 s15318887 pluto[18630]: | crypto helper write of 
request: cnt=2752<wlen=2752.
Dec 12 11:16:50 s15318887 pluto[18630]: | *inserting event 
EVENT_CRYPTO_FAILED, timeout in 300 seconds for #2*
Dec 12 11:16:50 s15318887 pluto[18630]: | * processed 0 messages from 
cryptographic helpers
Dec 12 11:16:50 s15318887 pluto[18630]: | next event 
EVENT_NAT_T_KEEPALIVE in 20 seconds
Dec 12 11:16:50 s15318887 pluto[18638]: ! helper 0 read 2744+4/2752 
bytesfd: 8
Dec 12 11:16:50 s15318887 pluto[18638]: ! helper 0 doing build_kenonce 
op id: 3
Dec 12 11:16:50 s15318887 pluto[18630]: |
Dec 12 11:16:50 s15318887 pluto[18630]: | helper 0 has finished work 
(cnt now 1)
Dec 12 11:16:50 s15318887 pluto[18630]: | helper 0 replies to id: q#3
Dec 12 11:16:50 s15318887 pluto[18630]: | processing connection 
L2TPPSKCLIENT
Dec 12 11:16:50 s15318887 pluto[18630]: | kernel_alg_db_new() will 
return p_new->protoid=3, p_new->trans_cnt=1
Dec 12 11:16:50 s15318887 pluto[18630]: | kernel_alg_db_new()     
trans[0]: transid=3, attr_cnt=1, attrs[0].type=5, attrs[0].val=2
Dec 12 11:16:50 s15318887 pluto[18630]: | returning new proposal from 
esp_info
Dec 12 11:16:50 s15318887 pluto[18630]: | sending 284 bytes for 
quick_outI1 through eth0:500 to 223.31.46.223:500 (using #2)
Dec 12 11:16:50 s15318887 pluto[18630]: | inserting event 
EVENT_RETRANSMIT, timeout in 10 seconds for #2
Dec 12 11:16:50 s15318887 pluto[18630]: | * processed 1 messages from 
cryptographic helpers
Dec 12 11:16:50 s15318887 pluto[18630]: | next event EVENT_RETRANSMIT in 
10 seconds for #2
Dec 12 11:16:50 s15318887 pluto[18630]: |
Dec 12 11:16:50 s15318887 pluto[18630]: | *received 124 bytes from 
223.31.46.223:500 on eth0 (port=500)
Dec 12 11:16:50 s15318887 pluto[18630]: | **parse ISAKMP Message:
Dec 12 11:16:50 s15318887 pluto[18630]: |    initiator cookie:
Dec 12 11:16:50 s15318887 pluto[18630]: |   b9 85 10 7b  62 d2 5a ac
Dec 12 11:16:50 s15318887 pluto[18630]: |    responder cookie:
Dec 12 11:16:50 s15318887 pluto[18630]: |   b8 e7 25 30  d6 9b a3 7a
Dec 12 11:16:50 s15318887 pluto[18630]: |    next payload type: 
ISAKMP_NEXT_HASH
Dec 12 11:16:50 s15318887 pluto[18630]: |    ISAKMP version: ISAKMP 
Version 1.0 (rfc2407)
Dec 12 11:16:50 s15318887 pluto[18630]: |    exchange type: ISAKMP_XCHG_INFO
Dec 12 11:16:50 s15318887 pluto[18630]: |    flags: ISAKMP_FLAG_ENCRYPTION
Dec 12 11:16:50 s15318887 pluto[18630]: |    message ID:  1e 80 3c 72
Dec 12 11:16:50 s15318887 pluto[18630]: |    length: 124
Dec 12 11:16:50 s15318887 pluto[18630]: |  processing version=1.0 packet 
with exchange type=ISAKMP_XCHG_INFO (5)
Dec 12 11:16:50 s15318887 pluto[18630]: | ICOOKIE:  b9 85 10 7b  62 d2 5a ac
Dec 12 11:16:50 s15318887 pluto[18630]: | RCOOKIE:  b8 e7 25 30  d6 9b a3 7a
Dec 12 11:16:50 s15318887 pluto[18630]: | state hash entry 23
Dec 12 11:16:50 s15318887 pluto[18630]: | peer and cookies match on #2, 
provided msgid 00000000 vs 80a7ca6e/00000000
Dec 12 11:16:50 s15318887 pluto[18630]: | peer and cookies match on #1, 
provided msgid 00000000 vs 00000000/00000000
Dec 12 11:16:50 s15318887 pluto[18630]: | p15 state object #1 found, in 
STATE_MAIN_I4
Dec 12 11:16:50 s15318887 pluto[18630]: | processing connection 
L2TPPSKCLIENT
Dec 12 11:16:50 s15318887 pluto[18630]: | got payload 
0x100(ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
Dec 12 11:16:50 s15318887 pluto[18630]: | ***parse ISAKMP Hash Payload:
Dec 12 11:16:50 s15318887 pluto[18630]: |    next payload type: 
ISAKMP_NEXT_N
Dec 12 11:16:50 s15318887 pluto[18630]: |    length: 24
Dec 12 11:16:50 s15318887 pluto[18630]: | got payload 
0x800(ISAKMP_NEXT_N) needed: 0x0 opt: 0x0
Dec 12 11:16:50 s15318887 pluto[18630]: | ***parse ISAKMP Notification 
Payload:
Dec 12 11:16:50 s15318887 pluto[18630]: |    next payload type: 
ISAKMP_NEXT_NONE
Dec 12 11:16:50 s15318887 pluto[18630]: |    length: 68
Dec 12 11:16:50 s15318887 pluto[18630]: |    DOI: ISAKMP_DOI_IPSEC
Dec 12 11:16:50 s15318887 pluto[18630]: |    protocol ID: 3
Dec 12 11:16:50 s15318887 pluto[18630]: |    SPI size: 4
Dec 12 11:16:50 s15318887 pluto[18630]: |    Notify Message Type: 
NO_PROPOSAL_CHOSEN
Dec 12 11:16:50 s15318887 pluto[18630]: | removing 4 bytes of padding
Dec 12 11:16:50 s15318887 pluto[18630]: "L2TPPSKCLIENT" #1: ignoring 
informational payload, type NO_PROPOSAL_CHOSEN msgid=00000000
Dec 12 11:16:50 s15318887 pluto[18630]: | info:  6c ef 38 8d  0a 00 00 
34  00 00 00 01  00 00 00 01
Dec 12 11:16:50 s15318887 pluto[18630]: | info:  81 85 9a f8  83 97 ef 
78  81 84 c7 3c  00 00 00 20
Dec 12 11:16:50 s15318887 pluto[18630]: | info:  00 00 00 00  83 97 ef 
a0  84 1f 3b a8  83 97 ef 98
Dec 12 11:16:50 s15318887 pluto[18630]: | info:  81 84 c8 9c  01 00 00 18
Dec 12 11:16:50 s15318887 pluto[18630]: | processing informational 
NO_PROPOSAL_CHOSEN (14)
Dec 12 11:16:50 s15318887 pluto[18630]: "L2TPPSKCLIENT" #1: received and 
ignored informational message
Dec 12 11:16:50 s15318887 pluto[18630]: | complete state transition with 
STF_IGNORE
Dec 12 11:16:50 s15318887 pluto[18630]: | * processed 0 messages from 
cryptographic helpers
Dec 12 11:16:50 s15318887 pluto[18630]: | next event EVENT_RETRANSMIT in 
10 seconds for #2
Dec 12 11:17:00 s15318887 pluto[18630]: |
Dec 12 11:17:00 s15318887 pluto[18630]: | *time to handle event
Dec 12 11:17:00 s15318887 pluto[18630]: | handling event EVENT_RETRANSMIT
Dec 12 11:17:00 s15318887 pluto[18630]: | event after this is 
EVENT_NAT_T_KEEPALIVE in 10 seconds
Dec 12 11:17:00 s15318887 pluto[18630]: | processing connection 
L2TPPSKCLIENT
Dec 12 11:17:00 s15318887 pluto[18630]: | handling event 
EVENT_RETRANSMIT for <invalid> "L2TPPSKCLIENT" #2
Dec 12 11:17:00 s15318887 pluto[18630]: | sending 284 bytes for 
EVENT_RETRANSMIT through eth0:500 to 223.31.46.223:500 (using #2)
Dec 12 11:17:00 s15318887 pluto[18630]: | inserting event 
EVENT_RETRANSMIT, timeout in 20 seconds for #2
Dec 12 11:17:00 s15318887 pluto[18630]: | next event 
EVENT_NAT_T_KEEPALIVE in 10 seconds
Dec 12 11:17:01 s15318887 /usr/sbin/cron[18737]: (root) CMD 
(/usr/local/psa/admin/sbin/backupmng >/dev/null 2>&1)
Dec 12 11:17:10 s15318887 pluto[18630]: |
Dec 12 11:17:10 s15318887 pluto[18630]: | *time to handle event
Dec 12 11:17:10 s15318887 pluto[18630]: | handling event 
EVENT_NAT_T_KEEPALIVE
Dec 12 11:17:10 s15318887 pluto[18630]: | event after this is 
EVENT_RETRANSMIT in 10 seconds
Dec 12 11:17:10 s15318887 pluto[18630]: | processing connection 
L2TPPSKCLIENT
Dec 12 11:17:10 s15318887 pluto[18630]: | processing connection 
L2TPPSKCLIENT
Dec 12 11:17:10 s15318887 pluto[18630]: | next event EVENT_RETRANSMIT in 
10 seconds for #2
Dec 12 11:17:20 s15318887 pluto[18630]: |
Dec 12 11:17:20 s15318887 pluto[18630]: | *received kernel message
Dec 12 11:17:20 s15318887 pluto[18630]: | * processed 0 messages from 
cryptographic helpers
Dec 12 11:17:20 s15318887 pluto[18630]: | next event EVENT_RETRANSMIT in 
0 seconds for #2
Dec 12 11:17:20 s15318887 pluto[18630]: |
Dec 12 11:17:20 s15318887 pluto[18630]: | *time to handle event
Dec 12 11:17:20 s15318887 pluto[18630]: | handling event EVENT_RETRANSMIT
Dec 12 11:17:20 s15318887 pluto[18630]: | event after this is EVENT_DPD 
in 0 seconds
Dec 12 11:17:20 s15318887 pluto[18630]: | processing connection 
L2TPPSKCLIENT
Dec 12 11:17:20 s15318887 pluto[18630]: | handling event 
EVENT_RETRANSMIT for <invalid> "L2TPPSKCLIENT" #2
Dec 12 11:17:20 s15318887 pluto[18630]: | sending 284 bytes for 
EVENT_RETRANSMIT through eth0:500 to 223.31.46.223:500 (using #2)
Dec 12 11:17:20 s15318887 pluto[18630]: | inserting event 
EVENT_RETRANSMIT, timeout in 40 seconds for #2
Dec 12 11:17:20 s15318887 pluto[18630]: | next event EVENT_DPD in 0 
seconds for #1
Dec 12 11:17:20 s15318887 pluto[18630]: |
Dec 12 11:17:20 s15318887 pluto[18630]: | *time to handle event
Dec 12 11:17:20 s15318887 pluto[18630]: | handling event EVENT_DPD
Dec 12 11:17:20 s15318887 pluto[18630]: | event after this is 
EVENT_RETRANSMIT in 40 seconds
Dec 12 11:17:20 s15318887 pluto[18630]: | processing connection 
L2TPPSKCLIENT
Dec 12 11:17:20 s15318887 pluto[18630]: | state: 1 requesting event none 
to be deleted by /root/resources/openswan-2.6.19/programs/pluto/dpd.c:193
Dec 12 11:17:20 s15318887 pluto[18630]: | inserting event 
EVENT_DPD_TIMEOUT, timeout in 120 seconds for #1
Dec 12 11:17:20 s15318887 pluto[18630]: | sending 84 bytes for ISAKMP 
notify through eth0:500 to 223.31.46.223:500 (using #1)
Dec 12 11:17:20 s15318887 pluto[18630]: | next event EVENT_RETRANSMIT in 
40 seconds for #2
Dec 12 11:17:20 s15318887 pluto[18630]: |
Dec 12 11:17:20 s15318887 pluto[18630]: | *received 92 bytes from 
223.31.46.223:500 on eth0 (port=500)
Dec 12 11:17:20 s15318887 pluto[18630]: | **parse ISAKMP Message:
Dec 12 11:17:20 s15318887 pluto[18630]: |    initiator cookie:
Dec 12 11:17:20 s15318887 pluto[18630]: |   b9 85 10 7b  62 d2 5a ac
Dec 12 11:17:20 s15318887 pluto[18630]: |    responder cookie:
Dec 12 11:17:20 s15318887 pluto[18630]: |   b8 e7 25 30  d6 9b a3 7a
Dec 12 11:17:20 s15318887 pluto[18630]: |    next payload type: 
ISAKMP_NEXT_HASH
Dec 12 11:17:20 s15318887 pluto[18630]: |    ISAKMP version: ISAKMP 
Version 1.0 (rfc2407)
Dec 12 11:17:20 s15318887 pluto[18630]: |    exchange type: ISAKMP_XCHG_INFO
Dec 12 11:17:20 s15318887 pluto[18630]: |    flags: ISAKMP_FLAG_ENCRYPTION
Dec 12 11:17:20 s15318887 pluto[18630]: |    message ID:  0d 6a aa 6e
Dec 12 11:17:20 s15318887 pluto[18630]: |    length: 92
Dec 12 11:17:20 s15318887 pluto[18630]: |  processing version=1.0 packet 
with exchange type=ISAKMP_XCHG_INFO (5)
Dec 12 11:17:20 s15318887 pluto[18630]: | ICOOKIE:  b9 85 10 7b  62 d2 5a ac
Dec 12 11:17:20 s15318887 pluto[18630]: | RCOOKIE:  b8 e7 25 30  d6 9b a3 7a
Dec 12 11:17:20 s15318887 pluto[18630]: | state hash entry 23
Dec 12 11:17:20 s15318887 pluto[18630]: | peer and cookies match on #2, 
provided msgid 00000000 vs 80a7ca6e/00000000
Dec 12 11:17:20 s15318887 pluto[18630]: | peer and cookies match on #1, 
provided msgid 00000000 vs 00000000/00000000
Dec 12 11:17:20 s15318887 pluto[18630]: | p15 state object #1 found, in 
STATE_MAIN_I4
Dec 12 11:17:20 s15318887 pluto[18630]: | processing connection 
L2TPPSKCLIENT
Dec 12 11:17:20 s15318887 pluto[18630]: | got payload 
0x100(ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0
Dec 12 11:17:20 s15318887 pluto[18630]: | ***parse ISAKMP Hash Payload:
Dec 12 11:17:20 s15318887 pluto[18630]: |    next payload type: 
ISAKMP_NEXT_N
Dec 12 11:17:20 s15318887 pluto[18630]: |    length: 24
Dec 12 11:17:20 s15318887 pluto[18630]: | got payload 
0x800(ISAKMP_NEXT_N) needed: 0x0 opt: 0x0
Dec 12 11:17:20 s15318887 pluto[18630]: | ***parse ISAKMP Notification 
Payload:
Dec 12 11:17:20 s15318887 pluto[18630]: |    next payload type: 
ISAKMP_NEXT_NONE
Dec 12 11:17:20 s15318887 pluto[18630]: |    length: 32
Dec 12 11:17:20 s15318887 pluto[18630]: |    DOI: ISAKMP_DOI_IPSEC
Dec 12 11:17:20 s15318887 pluto[18630]: |    protocol ID: 1
Dec 12 11:17:20 s15318887 pluto[18630]: |    SPI size: 16
Dec 12 11:17:20 s15318887 pluto[18630]: |    Notify Message Type: 
R_U_THERE_ACK
Dec 12 11:17:20 s15318887 pluto[18630]: | removing 8 bytes of padding
Dec 12 11:17:20 s15318887 pluto[18630]: | info:  b9 85 10 7b  62 d2 5a 
ac  b8 e7 25 30  d6 9b a3 7a
Dec 12 11:17:20 s15318887 pluto[18630]: | info:  00 00 44 3e
Dec 12 11:17:20 s15318887 pluto[18630]: | processing informational 
R_U_THERE_ACK (36137)
Dec 12 11:17:20 s15318887 pluto[18630]: | state: 1 requesting event 
EVENT_DPD_TIMEOUT to be deleted by 
/root/resources/openswan-2.6.19/programs/pluto/dpd.c:515
Dec 12 11:17:20 s15318887 pluto[18630]: | complete state transition with 
STF_IGNORE
Dec 12 11:17:20 s15318887 pluto[18630]: | * processed 0 messages from 
cryptographic helpers
Dec 12 11:17:20 s15318887 pluto[18630]: | next event EVENT_RETRANSMIT in 
40 seconds for #2
Dec 12 11:17:24 s15318887 ipsec_setup: Stopping Openswan IPsec...
Dec 12 11:17:24 s15318887 pluto[18630]: |
Dec 12 11:17:24 s15318887 pluto[18630]: | *received whack message
Dec 12 11:17:24 s15318887 pluto[18630]: shutting down
Dec 12 11:17:24 s15318887 pluto[18630]: forgetting secrets
Dec 12 11:17:24 s15318887 pluto[18630]: | processing connection 
L2TPPSKCLIENT
Dec 12 11:17:24 s15318887 pluto[18630]: "L2TPPSKCLIENT": deleting connection
Dec 12 11:17:24 s15318887 pluto[18630]: | processing connection 
L2TPPSKCLIENT
Dec 12 11:17:24 s15318887 pluto[18630]: "L2TPPSKCLIENT" #2: deleting 
state (STATE_QUICK_I1)
Dec 12 11:17:24 s15318887 pluto[18630]: | deleting state #2
Dec 12 11:17:24 s15318887 pluto[18630]: | ICOOKIE:  b9 85 10 7b  62 d2 5a ac
Dec 12 11:17:24 s15318887 pluto[18630]: | RCOOKIE:  b8 e7 25 30  d6 9b a3 7a
Dec 12 11:17:24 s15318887 pluto[18630]: | state hash entry 23
Dec 12 11:17:24 s15318887 pluto[18630]: | processing connection 
L2TPPSKCLIENT
Dec 12 11:17:24 s15318887 pluto[18630]: "L2TPPSKCLIENT" #1: deleting 
state (STATE_MAIN_I4)
Dec 12 11:17:24 s15318887 pluto[18630]: | deleting state #1
Dec 12 11:17:24 s15318887 pluto[18630]: | sending 84 bytes for delete 
notify through eth0:500 to 223.31.46.223:500 (using #1)
Dec 12 11:17:24 s15318887 pluto[18630]: | ICOOKIE:  b9 85 10 7b  62 d2 5a ac
Dec 12 11:17:24 s15318887 pluto[18630]: | RCOOKIE:  b8 e7 25 30  d6 9b a3 7a
Dec 12 11:17:24 s15318887 pluto[18630]: | state hash entry 23
Dec 12 11:17:24 s15318887 pluto[18630]: | alg_info_delref(0x71dc40) 
alg_info->ref_cnt=2
Dec 12 11:17:24 s15318887 pluto[18630]: | alg_info_delref(0x71cff0) 
alg_info->ref_cnt=2
Dec 12 11:17:24 s15318887 pluto[18630]: shutting down interface lo/lo 
::1:500
Dec 12 11:17:24 s15318887 pluto[18630]: shutting down interface lo/lo 
127.0.0.1:4500
Dec 12 11:17:24 s15318887 pluto[18630]: shutting down interface lo/lo 
127.0.0.1:500
Dec 12 11:17:24 s15318887 pluto[18630]: shutting down interface 
eth0/eth0 192.199.19.91:4500
Dec 12 11:17:24 s15318887 pluto[18630]: shutting down interface 
eth0/eth0 192.199.19.91:500
Dec 12 11:17:26 s15318887 ipsec_setup: ...Openswan IPsec stopped
--------- end messages ---------------------


----------- CICSO LOG -------------------
.Dec 12 11:16:50.716 MEZ: ISAKMP:(2108):SA is doing pre-shared key 
authentication using id type ID_IPV4_ADDR
.Dec 12 11:16:50.716 MEZ: ISAKMP (0:2108): ID payload
        next-payload : 8
        type         : 1
        address      : 223.31.46.223
        protocol     : 17
        port         : 500
        length       : 12
.Dec 12 11:16:50.716 MEZ: ISAKMP:(2108):Total payload length: 12
.Dec 12 11:16:50.716 MEZ: ISAKMP:(2108): sending packet to 192.199.19.91 
my_port 500 peer_port 500 (R) MM_KEY_EXCH
.Dec 12 11:16:50.720 MEZ: ISAKMP:(2108):Input = IKE_MESG_INTERNAL, 
IKE_PROCESS_COMPLETE
.Dec 12 11:16:50.720 MEZ: ISAKMP:(2108):Old State = IKE_R_MM5  New State 
= IKE_P1_COMPLETE

.Dec 12 11:16:50.720 MEZ: ISAKMP:(2108):Input = IKE_MESG_INTERNAL, 
IKE_PHASE1_COMPLETE
.Dec 12 11:16:50.720 MEZ: ISAKMP:(2108):Old State = IKE_P1_COMPLETE  New 
State = IKE_P1_COMPLETE

.Dec 12 11:16:50.836 MEZ: ISAKMP (0:2108): received packet from 
192.199.19.91 dport 500 sport 500 Global (R) QM_IDLE
.Dec 12 11:16:50.836 MEZ: ISAKMP: set new node -2136487314 to QM_IDLE
.Dec 12 11:16:50.840 MEZ: ISAKMP:(2108): processing HASH payload. 
message ID = -2136487314
.Dec 12 11:16:50.840 MEZ: ISAKMP:(2108): processing SA payload. message 
ID = -2136487314
.Dec 12 11:16:50.840 MEZ: ISAKMP:(2108):Checking IPSec proposal 0
.Dec 12 11:16:50.840 MEZ: ISAKMP: transform 0, ESP_3DES
.Dec 12 11:16:50.840 MEZ: ISAKMP:   attributes in transform:
.Dec 12 11:16:50.840 MEZ: ISAKMP:      group is 2
.Dec 12 11:16:50.840 MEZ: ISAKMP:      encaps is 2 (Transport)
.Dec 12 11:16:50.840 MEZ: ISAKMP:      SA life type in seconds
.Dec 12 11:16:50.840 MEZ: ISAKMP:      SA life duration (basic) of 28800
.Dec 12 11:16:50.840 MEZ: ISAKMP:      authenticator is HMAC-SHA
.Dec 12 11:16:50.840 MEZ: ISAKMP:(2108):atts are acceptable.
.Dec 12 11:16:50.840 MEZ: ISAKMP:(2108): *IPSec policy invalidated 
proposal with error 1024*
.Dec 12 11:16:50.840 MEZ: ISAKMP:(2108): *phase 2 SA policy not 
acceptable! (local 223.31.46.223 remote 192.199.19.91)*
.Dec 12 11:16:50.840 MEZ: ISAKMP: set new node 511720562 to QM_IDLE
.Dec 12 11:16:50.840 MEZ: ISAKMP:(2108):Sending NOTIFY 
PROPOSAL_NOT_CHOSEN protocol 3
        spi 2207772352, message ID = 511720562
.Dec 12 11:16:50.840 MEZ: ISAKMP:(2108): sending packet to 192.199.19.91 
my_port 500 peer_port 500 (R) QM_IDLE
.Dec 12 11:16:50.844 MEZ: ISAKMP:(2108):purging node 511720562
.Dec 12 11:16:50.844 MEZ: ISAKMP:(2108):deleting node -2136487314 error 
TRUE reason "QM rejected"
.Dec 12 11:16:50.844 MEZ: ISAKMP:(2108):Node -2136487314, Input = 
IKE_MESG_FROM_PEER, IKE_QM_EXCH
.Dec 12 11:16:50.844 MEZ: ISAKMP:(2108):Old State = IKE_QM_READY  New 
State = IKE_QM_READY
.Dec 12 11:17:00.917 MEZ: ISAKMP (0:2108): received packet from 
192.199.19.91 dport 500 sport 500 Global (R) QM_IDLE
.Dec 12 11:17:00.917 MEZ: ISAKMP:(2108): *phase 2 packet is a duplicate 
of a previous packet.*
.Dec 12 11:17:00.917 MEZ: ISAKMP:(2108): retransmitting due to 
retransmit phase 2
.Dec 12 11:17:00.917 MEZ: ISAKMP:(2108): ignoring retransmission,because 
phase2 node marked dead -2136487314
.Dec 12 11:17:20.831 MEZ: ISAKMP (0:2108): received packet from 
192.199.19.91 dport 500 sport 500 Global (R) QM_IDLE
.Dec 12 11:17:20.831 MEZ: ISAKMP: set new node 1938031181 to QM_IDLE
.Dec 12 11:17:20.831 MEZ: ISAKMP:(2108): processing HASH payload. 
message ID = 1938031181
.Dec 12 11:17:20.831 MEZ: ISAKMP:(2108): processing NOTIFY DPD/R_U_THERE 
protocol 1
        spi 0, message ID = 1938031181, sa = 8420638C
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108):deleting node 1938031181 error 
FALSE reason "Informational (in) state 1"
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108):Input = IKE_MESG_FROM_PEER, 
IKE_INFO_NOTIFY
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108):Old State = IKE_P1_COMPLETE  New 
State = IKE_P1_COMPLETE

.Dec 12 11:17:20.835 MEZ: ISAKMP (0:2108): received packet from 
192.199.19.91 dport 500 sport 500 Global (R) QM_IDLE
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108): *phase 2 packet is a duplicate 
of a previous packet.*
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108): retransmitting due to 
retransmit phase 2
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108): ignoring retransmission,because 
phase2 node marked dead -2136487314
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108):DPD/R_U_THERE received from peer 
192.199.19.91, sequence 0x443E
.Dec 12 11:17:20.835 MEZ: ISAKMP: set new node 225094254 to QM_IDLE
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108):Sending NOTIFY DPD/R_U_THERE_ACK 
protocol 1
        spi 2207773184, message ID = 225094254
.Dec 12 11:17:20.835 MEZ: ISAKMP:(2108): seq. no 0x443E
.Dec 12 11:17:20.839 MEZ: ISAKMP:(2108): sending packet to 192.199.19.91 
my_port 500 peer_port 500 (R) QM_IDLE
.Dec 12 11:17:20.839 MEZ: ISAKMP:(2108):purging node 225094254
.Dec 12 11:17:20.839 MEZ: ISAKMP:(2108):Input = IKE_MESG_FROM_PEER, 
IKE_MESG_KEEP_ALIVE
.Dec 12 11:17:20.839 MEZ: ISAKMP:(2108):Old State = IKE_P1_COMPLETE  New 
State = IKE_P1_COMPLETE

.Dec 12 11:17:24.766 MEZ: ISAKMP (0:2108): received packet from 
192.199.19.91 dport 500 sport 500 Global (R) QM_IDLE
.Dec 12 11:17:24.766 MEZ: ISAKMP: set new node -1823789155 to QM_IDLE
.Dec 12 11:17:24.770 MEZ: ISAKMP:(2108): processing HASH payload. 
message ID = -1823789155
.Dec 12 11:17:24.770 MEZ: ISAKMP:(2108): processing DELETE payload. 
message ID = -1823789155
.Dec 12 11:17:24.770 MEZ: ISAKMP:(2108):peer does not do paranoid 
keepalives.

.Dec 12 11:17:24.770 MEZ: ISAKMP:(2108):deleting SA reason "No reason" 
state (R) QM_IDLE       (peer 192.199.19.91)
.Dec 12 11:17:24.770 MEZ: ISAKMP:(2108):deleting node -1823789155 error 
FALSE reason "Informational (in) state 1"
.Dec 12 11:17:24.770 MEZ: ISAKMP: set new node 21968057 to QM_IDLE
.Dec 12 11:17:24.770 MEZ: ISAKMP:(2108): sending packet to 192.199.19.91 
my_port 500 peer_port 500 (R) QM_IDLE
.Dec 12 11:17:24.770 MEZ: ISAKMP:(2108):purging node 21968057
.Dec 12 11:17:24.774 MEZ: ISAKMP:(2108):Input = IKE_MESG_INTERNAL, 
IKE_PHASE1_DEL
.Dec 12 11:17:24.774 MEZ: ISAKMP:(2108):Old State = IKE_P1_COMPLETE  New 
State = IKE_DEST_SA

.Dec 12 11:17:24.774 MEZ: ISAKMP:(2108):deleting SA reason "No reason" 
state (R) QM_IDLE       (peer 192.199.19.91)
.Dec 12 11:17:24.774 MEZ: ISAKMP: Unlocking peer struct 0x82C2FD84 for 
isadb_mark_sa_deleted(), count 0
.Dec 12 11:17:24.774 MEZ: ISAKMP: Deleting peer node by peer_reap for 
192.199.19.91: 82C2FD84
.Dec 12 11:17:24.774 MEZ: ISAKMP:(2108):deleting node -2136487314 error 
FALSE reason "IKE deleted"
.Dec 12 11:17:24.774 MEZ: ISAKMP:(2108):deleting node 1938031181 error 
FALSE reason "IKE deleted"
.Dec 12 11:17:24.774 MEZ: ISAKMP:(2108):deleting node -1823789155 error 
FALSE reason "IKE deleted"
.Dec 12 11:17:24.774 MEZ: ISAKMP:(2108):Input = IKE_MESG_FROM_PEER, 
IKE_MM_EXCH
.Dec 12 11:17:24.774 MEZ: ISAKMP:(2108):Old State = IKE_DEST_SA  New 
State = IKE_DEST_SA


---------------end cisco log- -----------------


---------- cmd output from connection try -----------

s15318887:~ # ipsec auto --verbose --up L2TPPSKCLIENT &

[1] 18727

s15318887:~ # 002 "L2TPPSKCLIENT" #1: initiating Main Mode

104 "L2TPPSKCLIENT" #1: STATE_MAIN_I1: initiate

003 "L2TPPSKCLIENT" #1: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] method set to=108

002 "L2TPPSKCLIENT" #1: enabling possible NAT-traversal with method draft-ietf-ipsec-nat-t-ike-05

002 "L2TPPSKCLIENT" #1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2

106 "L2TPPSKCLIENT" #1: STATE_MAIN_I2: sent MI2, expecting MR2

003 "L2TPPSKCLIENT" #1: received Vendor ID payload [Cisco-Unity]

003 "L2TPPSKCLIENT" #1: received Vendor ID payload [Dead Peer Detection]

003 "L2TPPSKCLIENT" #1: ignoring unknown Vendor ID payload [4d20822dd69aa37a378d51757973dfcf]

003 "L2TPPSKCLIENT" #1: received Vendor ID payload [XAUTH]

003 "L2TPPSKCLIENT" #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: no NAT detected

002 "L2TPPSKCLIENT" #1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3

108 "L2TPPSKCLIENT" #1: STATE_MAIN_I3: sent MI3, expecting MR3

002 "L2TPPSKCLIENT" #1: Main mode peer ID is ID_IPV4_ADDR: '223.31.46.223'

002 "L2TPPSKCLIENT" #1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4

004 "L2TPPSKCLIENT" #1: STATE_MAIN_I4: ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=oakley_3des_cbc_192 prf=oakley_sha group=modp1024}

002 "L2TPPSKCLIENT" #1: Dead Peer Detection (RFC 3706): enabled

002 "L2TPPSKCLIENT" #2: initiating Quick Mode PSK+ENCRYPT+PFS+UP+IKEv2ALLOW {using isakmp#1 msgid:6ecaa780 proposal=3DES(3)_192-SHA1(2)_160 pfsgroup=OAKLEY_GROUP_MODP1024}

117 "L2TPPSKCLIENT" #2: STATE_QUICK_I1: initiate

010 "L2TPPSKCLIENT" #2: STATE_QUICK_I1: retransmission; will wait 20s for respons


-----------------------------end conn try ------------



More information about the Users mailing list