[Openswan Users] "mycon" #1: ERROR: asynchronous network error report on ppp1 (sport=500) for message
Gopaal V Krishnan
vkrishnan at airfortnet.com
Fri Jun 20 07:47:23 EDT 2008
Gentlemen,
I am stuck with the above error and need urgent help.
The ipsec.conf file is
version 2
config setup
nat_traversal=yes
nhelpers=1
interfaces="ipsec1=ppp1"
klipsdebug=none
plutodebug=all
plutostderrlog=/var/log/pluto.log
# sample connection
conn mycon
left=68.247.6.41 #cellular ppp link on sprint
right=70.4.69.180 #cellular ppp link on sprint
rightsubnet=172.16.1.0/24
authby=secret
auto=add
The output of ipsec verify is
# ipsec verify
Checking your system to see if IPsec got installed and started correctly:
Version check and ipsec on-path [OK]
Linux Openswan U2.4.9/K2.6.24-19-generic (netkey)
Checking for IPsec support in kernel [OK]
NETKEY detected, testing for disabled ICMP send_redirects [OK]
NETKEY detected, testing for disabled ICMP accept_redirects [OK]
Checking for RSA private key (/etc/ipsec.secrets) [DISABLED]
ipsec showhostkey: no default key in "/etc/ipsec.secrets"
Checking that pluto is running [OK]
Two or more interfaces found, checking IP forwarding [OK]
Checking NAT and MASQUERADEing [N/A]
Checking for 'ip' command [OK]
Checking for 'iptables' command [OK]
Opportunistic Encryption DNS checks:
Looking for TXT in forward dns zone: ubuntu [MISSING]
Does the machine have at least one non-private address? [OK]
Looking for TXT in reverse dns zone: 41.6.247.68.in-addr.arpa. [MISSING]
after I start the conection using the statement
#ipsec auto --up mycon
The relevant portion of pluto debug log is
# cat pluto.log
Plutorun started on Fri Jun 20 07:36:40 EDT 2008
Starting Pluto (Openswan Version 2.4.9 LDAP_V3 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID OESJIo`rkcdb)
Setting NAT-Traversal port-4500 floating to on
port floating activation criteria nat_t=1/port_fload=1
including NAT-Traversal patch (Version 0.6c)
| opening /dev/urandom
| inserting event EVENT_REINIT_SECRET, timeout in 3600 seconds
| inserting event EVENT_PENDING_PHASE2, timeout in 120 seconds
ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
starting up 1 cryptographic helpers
| opening /dev/urandom
| certs and keys locked by 'free_preshared_secrets'
| certs and keys unlocked by 'free_preshard_secrets'
! helper 0 waiting on fd: 6
started helper pid=7101 (fd:5)
| process 7100 listening for PF_KEY_V2 on file descriptor 6
Using NETKEY IPsec interface code on 2.6.24-19-generic
| pfkey_lib_debug:pfkey_msg_hdr_build:
| pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0xbf9bf180 pfkey_ext=0p0xbf9bf19c *pfkey_ext=0p(nil).
| pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0xbf9bf180 pfkey_ext=0p0xbf9bf19c *pfkey_ext=0p0x8101ed8.
| pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x8101ef0 allocated 16 bytes, &(extensions[0])=0p0xbf9bf19c
| pfkey_lib_debug:pfkey_msg_build: extensions permitted=00000001, seen=00000001, required=00000001.
| pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=7(register), errno=0, satype=2(AH), len=2, res=0, seq=1, pid=7100.
| pfkey_lib_debug:pfkey_msg_parse: remain=0
| pfkey_lib_debug:pfkey_msg_parse: extensions permitted=00000001, required=00000001.
| pfkey_lib_debug:pfkey_msg_parse: extensions permitted=00000001, seen=00000001, required=00000001.
| finish_pfkey_msg: SADB_REGISTER message 1 for AH
| 02 07 00 02 02 00 00 00 01 00 00 00 bc 1b 00 00
| pfkey_get: SADB_REGISTER message 1
| AH registered with kernel.
| pfkey_lib_debug:pfkey_msg_hdr_build:
| pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0xbf9bf180 pfkey_ext=0p0xbf9bf19c *pfkey_ext=0p(nil).
| pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0xbf9bf180 pfkey_ext=0p0xbf9bf19c *pfkey_ext=0p0x8101ef0.
| pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x8101ed8 allocated 16 bytes, &(extensions[0])=0p0xbf9bf19c
| pfkey_lib_debug:pfkey_msg_build: extensions permitted=00000001, seen=00000001, required=00000001.
| pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=7(register), errno=0, satype=3(ESP), len=2, res=0, seq=2, pid=7100.
| pfkey_lib_debug:pfkey_msg_parse: remain=0
| pfkey_lib_debug:pfkey_msg_parse: extensions permitted=00000001, required=00000001.
| pfkey_lib_debug:pfkey_msg_parse: extensions permitted=00000001, seen=00000001, required=00000001.
| finish_pfkey_msg: SADB_REGISTER message 2 for ESP
| 02 07 00 03 02 00 00 00 02 00 00 00 bc 1b 00 00
| pfkey_get: SADB_REGISTER message 2
| alg_init():memset(0x80ffc60, 0, 2016) memset(0x8100440, 0, 2048)
| kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=17 sadb_supported_len=48
| kernel_alg_add():satype=3, exttype=14, alg_id=251
| kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[0], exttype=14, satype=3, alg_id=251, alg_ivlen=0, alg_minbits=0, alg_maxbits=0, res=0, ret=1
| kernel_alg_add():satype=3, exttype=14, alg_id=2
| kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[1], exttype=14, satype=3, alg_id=2, alg_ivlen=0, alg_minbits=128, alg_maxbits=128, res=0, ret=1
| kernel_alg_add():satype=3, exttype=14, alg_id=3
| kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[2], exttype=14, satype=3, alg_id=3, alg_ivlen=0, alg_minbits=160, alg_maxbits=160, res=0, ret=1
| kernel_alg_add():satype=3, exttype=14, alg_id=5
| kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[3], exttype=14, satype=3, alg_id=5, alg_ivlen=0, alg_minbits=256, alg_maxbits=256, res=0, ret=1
| kernel_alg_add():satype=3, exttype=14, alg_id=9
| kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[4], exttype=14, satype=3, alg_id=9, alg_ivlen=0, alg_minbits=128, alg_maxbits=128, res=0, ret=1
| kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=17 sadb_supported_len=72
| kernel_alg_add():satype=3, exttype=15, alg_id=11
| kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[5], exttype=15, satype=3, alg_id=11, alg_ivlen=0, alg_minbits=0, alg_maxbits=0, res=0, ret=1
| kernel_alg_add():satype=3, exttype=15, alg_id=2
| kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[6], exttype=15, satype=3, alg_id=2, alg_ivlen=8, alg_minbits=64, alg_maxbits=64, res=0, ret=1
| kernel_alg_add():satype=3, exttype=15, alg_id=3
| kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[7], exttype=15, satype=3, alg_id=3, alg_ivlen=8, alg_minbits=192, alg_maxbits=192, res=0, ret=1
| kernel_alg_add():satype=3, exttype=15, alg_id=7
| kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[8], exttype=15, satype=3, alg_id=7, alg_ivlen=8, alg_minbits=40, alg_maxbits=448, res=0, ret=1
| kernel_alg_add():satype=3, exttype=15, alg_id=12
| kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[9], exttype=15, satype=3, alg_id=12, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0, ret=1
| kernel_alg_add():satype=3, exttype=15, alg_id=252
| kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[10], exttype=15, satype=3, alg_id=252, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0, ret=1
| kernel_alg_add():satype=3, exttype=15, alg_id=22
| kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[11], exttype=15, satype=3, alg_id=22, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0, ret=1
| kernel_alg_add():satype=3, exttype=15, alg_id=253
| kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[12], exttype=15, satype=3, alg_id=253, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0, ret=1
| ESP registered with kernel.
| pfkey_lib_debug:pfkey_msg_hdr_build:
| pfkey_lib_debug:pfkey_msg_hdr_build: on_entry &pfkey_ext=0p0xbf9bf180 pfkey_ext=0p0xbf9bf19c *pfkey_ext=0p(nil).
| pfkey_lib_debug:pfkey_msg_hdr_build: on_exit &pfkey_ext=0p0xbf9bf180 pfkey_ext=0p0xbf9bf19c *pfkey_ext=0p0x8101ed8.
| pfkey_lib_debug:pfkey_msg_build: pfkey_msg=0p0x8101ef0 allocated 16 bytes, &(extensions[0])=0p0xbf9bf19c
| pfkey_lib_debug:pfkey_msg_build: extensions permitted=00000001, seen=00000001, required=00000001.
| pfkey_lib_debug:pfkey_msg_parse: parsing message ver=2, type=7(register), errno=0, satype=9(IPIP), len=2, res=0, seq=3, pid=7100.
| pfkey_lib_debug:pfkey_msg_parse: remain=0
| pfkey_lib_debug:pfkey_msg_parse: extensions permitted=00000001, required=00000001.
| pfkey_lib_debug:pfkey_msg_parse: extensions permitted=00000001, seen=00000001, required=00000001.
| finish_pfkey_msg: SADB_REGISTER message 3 for IPCOMP
| 02 07 00 09 02 00 00 00 03 00 00 00 bc 1b 00 00
| pfkey_get: SADB_REGISTER message 3
| IPCOMP registered with kernel.
Changing to directory '/etc/ipsec.d/cacerts'
Changing to directory '/etc/ipsec.d/aacerts'
Changing to directory '/etc/ipsec.d/ocspcerts'
Changing to directory '/etc/ipsec.d/crls'
Warning: empty directory
| inserting event EVENT_LOG_DAILY, timeout in 58999 seconds
| next event EVENT_PENDING_PHASE2 in 119 seconds
|
| *received whack message
| certs and keys locked by 'free_preshared_secrets'
| certs and keys unlocked by 'free_preshard_secrets'
loading secrets from "/etc/ipsec.secrets"
| certs and keys locked by 'process_secret'
| certs and keys unlocked by 'process_secrets'
| next event EVENT_PENDING_PHASE2 in 119 seconds
|
| *received whack message
| Added new connection mycon with policy PSK+ENCRYPT+TUNNEL+PFS
| counting wild cards for (none) is 15
| counting wild cards for (none) is 15
added connection description "mycon"
| 68.247.6.41...70.4.69.180===172.16.1.0/24
| ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; policy: PSK+ENCRYPT+TUNNEL+PFS
| next event EVENT_PENDING_PHASE2 in 119 seconds
|
| *received whack message
listening for IKE messages
| found ppp1 with address 68.247.6.41
adding interface ppp1/ppp1 68.247.6.41:500
adding interface ppp1/ppp1 68.247.6.41:4500
| connect_to_host_pair: 68.247.6.41:500 70.4.69.180:500 -> hp:none
| certs and keys locked by 'free_preshared_secrets'
forgetting secrets
| certs and keys unlocked by 'free_preshard_secrets'
loading secrets from "/etc/ipsec.secrets"
| certs and keys locked by 'process_secret'
| certs and keys unlocked by 'process_secrets'
| next event EVENT_PENDING_PHASE2 in 119 seconds
|
| *received whack message
| next event EVENT_PENDING_PHASE2 in 119 seconds
|
| *received whack message
| next event EVENT_PENDING_PHASE2 in 119 seconds
|
| *received whack message
| next event EVENT_PENDING_PHASE2 in 119 seconds
|
| *received whack message
| next event EVENT_PENDING_PHASE2 in 119 seconds
|
| *received whack message
| next event EVENT_PENDING_PHASE2 in 119 seconds
|
| *received whack message
| next event EVENT_PENDING_PHASE2 in 119 seconds
|
| *received whack message
| processing connection mycon
| empty esp_info, returning empty
| creating state object #1 at 0x81029c0
| processing connection mycon
| ICOOKIE: 3f 44 12 37 b9 ad 33 f4
| RCOOKIE: 00 00 00 00 00 00 00 00
| peer: 46 04 45 b4
| state hash entry 22
| inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #1
| Queuing pending Quick Mode with 70.4.69.180 "mycon"
"mycon" #1: initiating Main Mode
| **emit ISAKMP Message:
| initiator cookie:
| 3f 44 12 37 b9 ad 33 f4
| responder cookie:
| 00 00 00 00 00 00 00 00
| next payload type: ISAKMP_NEXT_SA
| ISAKMP version: ISAKMP Version 1.0
| exchange type: ISAKMP_XCHG_IDPROT
| flags: none
| message ID: 00 00 00 00
| no IKE algorithms for this connection
| ***emit ISAKMP Security Association Payload:
| next payload type: ISAKMP_NEXT_VID
| DOI: ISAKMP_DOI_IPSEC
| ****emit IPsec DOI SIT:
| IPsec DOI SIT: SIT_IDENTITY_ONLY
| out_sa pcn: 0 has 1 valid proposals
| out_sa pcn: 0 pn: 0<1 valid_count: 1
| ****emit ISAKMP Proposal Payload:
| next payload type: ISAKMP_NEXT_NONE
| proposal number: 0
| protocol ID: PROTO_ISAKMP
| SPI size: 0
| number of transforms: 4
| *****emit ISAKMP Transform Payload (ISAKMP):
| next payload type: ISAKMP_NEXT_T
| transform number: 0
| transform ID: KEY_IKE
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_LIFE_TYPE
| length/value: 1
| [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_LIFE_DURATION
| length/value: 3600
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_ENCRYPTION_ALGORITHM
| length/value: 5
| [5 is OAKLEY_3DES_CBC]
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_HASH_ALGORITHM
| length/value: 1
| [1 is OAKLEY_MD5]
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_AUTHENTICATION_METHOD
| length/value: 1
| [1 is OAKLEY_PRESHARED_KEY]
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_GROUP_DESCRIPTION
| length/value: 5
| [5 is OAKLEY_GROUP_MODP1536]
| emitting length of ISAKMP Transform Payload (ISAKMP): 32
| *****emit ISAKMP Transform Payload (ISAKMP):
| next payload type: ISAKMP_NEXT_T
| transform number: 1
| transform ID: KEY_IKE
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_LIFE_TYPE
| length/value: 1
| [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_LIFE_DURATION
| length/value: 3600
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_ENCRYPTION_ALGORITHM
| length/value: 5
| [5 is OAKLEY_3DES_CBC]
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_HASH_ALGORITHM
| length/value: 2
| [2 is OAKLEY_SHA1]
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_AUTHENTICATION_METHOD
| length/value: 1
| [1 is OAKLEY_PRESHARED_KEY]
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_GROUP_DESCRIPTION
| length/value: 5
| [5 is OAKLEY_GROUP_MODP1536]
| emitting length of ISAKMP Transform Payload (ISAKMP): 32
| *****emit ISAKMP Transform Payload (ISAKMP):
| next payload type: ISAKMP_NEXT_T
| transform number: 2
| transform ID: KEY_IKE
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_LIFE_TYPE
| length/value: 1
| [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_LIFE_DURATION
| length/value: 3600
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_ENCRYPTION_ALGORITHM
| length/value: 5
| [5 is OAKLEY_3DES_CBC]
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_HASH_ALGORITHM
| length/value: 2
| [2 is OAKLEY_SHA1]
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_AUTHENTICATION_METHOD
| length/value: 1
| [1 is OAKLEY_PRESHARED_KEY]
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_GROUP_DESCRIPTION
| length/value: 2
| [2 is OAKLEY_GROUP_MODP1024]
| emitting length of ISAKMP Transform Payload (ISAKMP): 32
| *****emit ISAKMP Transform Payload (ISAKMP):
| next payload type: ISAKMP_NEXT_NONE
| transform number: 3
| transform ID: KEY_IKE
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_LIFE_TYPE
| length/value: 1
| [1 is OAKLEY_LIFE_SECONDS]
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_LIFE_DURATION
| length/value: 3600
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_ENCRYPTION_ALGORITHM
| length/value: 5
| [5 is OAKLEY_3DES_CBC]
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_HASH_ALGORITHM
| length/value: 1
| [1 is OAKLEY_MD5]
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_AUTHENTICATION_METHOD
| length/value: 1
| [1 is OAKLEY_PRESHARED_KEY]
| ******emit ISAKMP Oakley attribute:
| af+type: OAKLEY_GROUP_DESCRIPTION
| length/value: 2
| [2 is OAKLEY_GROUP_MODP1024]
| emitting length of ISAKMP Transform Payload (ISAKMP): 32
| emitting length of ISAKMP Proposal Payload: 136
| emitting length of ISAKMP Security Association Payload: 148
| ***emit ISAKMP Vendor ID Payload:
| next payload type: ISAKMP_NEXT_NONE
| emitting 12 raw bytes of Vendor ID into ISAKMP Vendor ID Payload
| Vendor ID 4f 45 53 4a 49 6f 60 72 6b 63 64 62
| emitting length of ISAKMP Vendor ID Payload: 16
| ***emit ISAKMP Vendor ID Payload:
| next payload type: ISAKMP_NEXT_NONE
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00
| emitting length of ISAKMP Vendor ID Payload: 20
| nat traversal enabled: 1
| nat add vid. port: 1 nonike: 1
| out_vendorid(): sending [RFC 3947]
| ***emit ISAKMP Vendor ID Payload:
| next payload type: ISAKMP_NEXT_NONE
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f
| emitting length of ISAKMP Vendor ID Payload: 20
| out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-03]
| ***emit ISAKMP Vendor ID Payload:
| next payload type: ISAKMP_NEXT_NONE
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56
| emitting length of ISAKMP Vendor ID Payload: 20
| out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-02]
| ***emit ISAKMP Vendor ID Payload:
| next payload type: ISAKMP_NEXT_NONE
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48
| emitting length of ISAKMP Vendor ID Payload: 20
| out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-02_n]
| ***emit ISAKMP Vendor ID Payload:
| next payload type: ISAKMP_NEXT_NONE
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f
| emitting length of ISAKMP Vendor ID Payload: 20
| out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-00]
| ***emit ISAKMP Vendor ID Payload:
| next payload type: ISAKMP_NEXT_NONE
| emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
| V_ID 44 85 15 2d 18 b6 bb cd 0b e8 a8 46 95 79 dd cc
| emitting length of ISAKMP Vendor ID Payload: 20
| emitting length of ISAKMP Message: 312
| sending 312 bytes for main_outI1 through ppp1:500 to 70.4.69.180:500:
| 3f 44 12 37 b9 ad 33 f4 00 00 00 00 00 00 00 00
| 01 10 02 00 00 00 00 00 00 00 01 38 0d 00 00 94
| 00 00 00 01 00 00 00 01 00 00 00 88 00 01 00 04
| 03 00 00 20 00 01 00 00 80 0b 00 01 80 0c 0e 10
| 80 01 00 05 80 02 00 01 80 03 00 01 80 04 00 05
| 03 00 00 20 01 01 00 00 80 0b 00 01 80 0c 0e 10
| 80 01 00 05 80 02 00 02 80 03 00 01 80 04 00 05
| 03 00 00 20 02 01 00 00 80 0b 00 01 80 0c 0e 10
| 80 01 00 05 80 02 00 02 80 03 00 01 80 04 00 02
| 00 00 00 20 03 01 00 00 80 0b 00 01 80 0c 0e 10
| 80 01 00 05 80 02 00 01 80 03 00 01 80 04 00 02
| 0d 00 00 10 4f 45 53 4a 49 6f 60 72 6b 63 64 62
| 0d 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc
| 77 57 01 00 0d 00 00 14 4a 13 1c 81 07 03 58 45
| 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 7d 94 19 a6
| 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 0d 00 00 14
| cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48
| 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5
| ec 42 7b 1f 00 00 00 14 44 85 15 2d 18 b6 bb cd
| 0b e8 a8 46 95 79 dd cc
| inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #1
| next event EVENT_RETRANSMIT in 10 seconds for #1
| rejected packet:
| 3f 44 12 37 b9 ad 33 f4 00 00 00 00 00 00 00 00
| 01 10 02 00 00 00 00 00 00 00 01 38 0d 00 00 94
| 00 00 00 01 00 00 00 01 00 00 00 88 00 01 00 04
| 03 00 00 20 00 01 00 00 80 0b 00 01 80 0c 0e 10
| 80 01 00 05 80 02 00 01 80 03 00 01 80 04 00 05
| 03 00 00 20 01 01 00 00 80 0b 00 01 80 0c 0e 10
| 80 01 00 05 80 02 00 02 80 03 00 01 80 04 00 05
| 03 00 00 20 02 01 00 00 80 0b 00 01 80 0c 0e 10
| 80 01 00 05 80 02 00 02 80 03 00 01 80 04 00 02
| 00 00 00 20 03 01 00 00 80 0b 00 01 80 0c 0e 10
| 80 01 00 05 80 02 00 01 80 03 00 01 80 04 00 02
| 0d 00 00 10 4f 45 53 4a 49 6f 60 72 6b 63 64 62
| 0d 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc
| 77 57 01 00 0d 00 00 14 4a 13 1c 81 07 03 58 45
| 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 7d 94 19 a6
| 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 0d 00 00 14
| cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48
| 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5
| ec 42 7b 1f 00 00 00 14 44 85 15 2d 18 b6 bb cd
| 0b e8 a8 46 95 79 dd cc
| control:
| 18 00 00 00 00 00 00 00 08 00 00 00 04 00 00 00
| 44 f7 06 29 44 f7 06 29 2c 00 00 00 00 00 00 00
| 0b 00 00 00 6f 00 00 00 02 03 03 00 00 00 00 00
| 00 00 00 00 02 00 00 00 46 04 45 b4 00 00 00 00
| 00 00 00 00
| name:
| 02 00 01 f4 46 04 45 b4 00 00 00 00 00 00 00 00
"mycon" #1: ERROR: asynchronous network error report on ppp1 (sport=500) for message to 70.4.69.180 port 500, complainant 70.4.69.180: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)]
| next event EVENT_RETRANSMIT in 7 seconds for #1
|
| *time to handle event
| handling event EVENT_RETRANSMIT
| event after this is EVENT_PENDING_PHASE2 in 90 seconds
| processing connection mycon
| handling event EVENT_RETRANSMIT for 70.4.69.180 "mycon" #1
| sending 312 bytes for EVENT_RETRANSMIT through ppp1:500 to 70.4.69.180:500:
| 3f 44 12 37 b9 ad 33 f4 00 00 00 00 00 00 00 00
| 01 10 02 00 00 00 00 00 00 00 01 38 0d 00 00 94
and it repeats
Please help
Thanks in advance
More information about the Users
mailing list