[Openswan Users] Aggressive mode connection error with Netopia

Ozai ozai.tien at gmail.com
Fri Dec 6 09:55:51 UTC 2013


Dear Sirs,

The following is the debug message.Is anythong I need to do?Please help,thank's.

Best Regards,
Ozai

Dec  5 01:19:04 authpriv debug pluto[30859]: | hashing 48 bytes of SA
Dec  5 01:19:04 authpriv debug pluto[30859]: | ***emit ISAKMP Hash Payload:
Dec  5 01:19:04 authpriv debug pluto[30859]: |    next payload type: 
ISAKMP_NEXT_VID
Dec  5 01:19:04 authpriv debug pluto[30859]: | emitting 16 raw bytes of 
HASH_R into ISAKMP Hash Payload
Dec  5 01:19:04 authpriv debug pluto[30859]: | HASH_R  3c e1 03 dc  ea 4f cc 
aa  5d 3d 06 40  15 aa d5 14
Dec  5 01:19:04 authpriv debug pluto[30859]: | emitting length of ISAKMP 
Hash Payload: 20
Dec  5 01:19:04 authpriv debug pluto[30859]: | out_vendorid(): sending [Dead 
Peer Detection]
Dec  5 01:19:04 authpriv debug pluto[30859]: | ***emit ISAKMP Vendor ID 
Payload:
Dec  5 01:19:04 authpriv debug pluto[30859]: |    next payload type: 
ISAKMP_NEXT_NONE
Dec  5 01:19:04 authpriv debug pluto[30859]: | emitting 16 raw bytes of V_ID 
into ISAKMP Vendor ID Payload
Dec  5 01:19:04 authpriv debug pluto[30859]: | V_ID  af ca d7 13  68 a1 f1 
c9  6b 86 96 fc  77 57 01 00
Dec  5 01:19:04 authpriv debug pluto[30859]: | emitting length of ISAKMP 
Vendor ID Payload: 20
Dec  5 01:19:04 authpriv debug pluto[30859]: | emitting length of ISAKMP 
Message: 252
Dec  5 01:19:04 authpriv debug pluto[30859]: | complete state transition 
with STF_OK
Dec  5 01:19:04 authpriv warn pluto[30859]: "ciprian"[1] 70.27.135.87 #1: 
transition from state STATE_AGGR_R0 to state STATE_AGGR_R1
Dec  5 01:19:04 authpriv debug pluto[30859]: | deleting event for #1
Dec  5 01:19:04 authpriv debug pluto[30859]: | sending reply packet to 
70.27.135.87:500 (from port 500)
Dec  5 01:19:04 authpriv debug pluto[30859]: | sending 252 bytes for 
STATE_AGGR_R0 through ppp0.1:500 to 70.27.135.87:500 (using #1)
Dec  5 01:19:04 authpriv debug pluto[30859]: |   3e 81 bf 08  ff 77 8c de 
0f 0c 3f 11  73 b2 5c fe
Dec  5 01:19:04 authpriv debug pluto[30859]: |   01 10 04 00  00 00 00 00 
00 00 00 fc  04 00 00 34
Dec  5 01:19:04 authpriv debug pluto[30859]: |   00 00 00 01  00 00 00 01 
00 00 00 28  01 01 00 01
Dec  5 01:19:04 authpriv debug pluto[30859]: |   00 00 00 20  01 01 00 00 
80 0b 00 01  80 0c 70 80
Dec  5 01:19:04 authpriv debug pluto[30859]: |   80 01 00 01  80 03 00 01 
80 02 00 01  80 04 00 01
Dec  5 01:19:04 authpriv debug pluto[30859]: |   0a 00 00 64  9a 5e 23 27 
75 ba 77 b1  c6 23 60 71
Dec  5 01:19:04 authpriv debug pluto[30859]: |   75 d4 9e 02  b9 69 cb 53 
cf 27 2f ef  de b3 76 ec
Dec  5 01:19:04 authpriv debug pluto[30859]: |   b3 c6 02 9b  55 65 3b 9a 
05 70 16 b2  c1 91 9b 04
Dec  5 01:19:04 authpriv debug pluto[30859]: |   c5 2d 20 2f  c6 32 2a a4 
95 bc 9d 93  55 21 5b bd
Dec  5 01:19:04 authpriv debug pluto[30859]: |   62 85 13 97  c9 dc 0f 1a 
5f cf d6 e6  98 7c 11 1d
Dec  5 01:19:04 authpriv debug pluto[30859]: |   ee 06 38 c1  04 47 94 4d 
de ba 73 1d  cf 5c 03 3c
Dec  5 01:19:04 authpriv debug pluto[30859]: |   76 2e 2a ab  05 00 00 14 
56 7a 54 9d  a8 d8 3d 75
Dec  5 01:19:04 authpriv debug pluto[30859]: |   8b c6 6b ed  3c bf ca a7 
08 00 00 0c  01 00 00 00
Dec  5 01:19:04 authpriv debug pluto[30859]: |   3f fa 6f c5  0d 00 00 14 
3c e1 03 dc  ea 4f cc aa
Dec  5 01:19:04 authpriv debug pluto[30859]: |   5d 3d 06 40  15 aa d5 14 
00 00 00 14  af ca d7 13
Dec  5 01:19:04 authpriv debug pluto[30859]: |   68 a1 f1 c9  6b 86 96 fc 
77 57 01 00
Dec  5 01:19:04 authpriv debug pluto[30859]: | inserting event 
EVENT_RETRANSMIT, timeout in 10 seconds for #1
Dec  5 01:19:04 authpriv debug pluto[30859]: | event added at head of queue
Dec  5 01:19:04 authpriv warn pluto[30859]: "ciprian"[1] 70.27.135.87 #1: 
STATE_AGGR_R1: sent AR1, expecting AI2
Dec  5 01:19:04 authpriv debug pluto[30859]: | modecfg pull: noquirk 
policy:push not-client
Dec  5 01:19:04 authpriv debug pluto[30859]: | phase 1 is done, looking for 
phase 2 to unpend
Dec  5 01:19:04 authpriv debug pluto[30859]: | * processed 1 messages from 
cryptographic helpers
Dec  5 01:19:04 authpriv debug pluto[30859]: | next event EVENT_RETRANSMIT 
in 10 seconds for #1
Dec  5 01:19:04 authpriv debug pluto[30859]: | next event EVENT_RETRANSMIT 
in 10 seconds for #1
Dec  5 01:19:04 authpriv debug pluto[30859]: |
Dec  5 01:19:04 authpriv debug pluto[30859]: | *received 48 bytes from 
70.27.135.87:500 on ppp0.1 (port=500)
Dec  5 01:19:04 authpriv debug pluto[30859]: |   3e 81 bf 08  ff 77 8c de 
0f 0c 3f 11  73 b2 5c fe
Dec  5 01:19:04 authpriv debug pluto[30859]: |   08 10 04 00  00 00 00 00 
00 00 00 30  00 00 00 14
Dec  5 01:19:04 authpriv debug pluto[30859]: |   0a 4e 5f 67  ff 3a 9d 4e 
e9 15 3c b1  65 af 55 fa
Dec  5 01:19:04 authpriv debug pluto[30859]: | **parse ISAKMP Message:
Dec  5 01:19:04 authpriv debug pluto[30859]: |    initiator cookie:
Dec  5 01:19:04 authpriv debug pluto[30859]: |   3e 81 bf 08  ff 77 8c de
Dec  5 01:19:04 authpriv debug pluto[30859]: |    responder cookie:
Dec  5 01:19:04 authpriv debug pluto[30859]: |   0f 0c 3f 11  73 b2 5c fe
Dec  5 01:19:04 authpriv debug pluto[30859]: |    next payload type: 
ISAKMP_NEXT_HASH
Dec  5 01:19:04 authpriv debug pluto[30859]: |    ISAKMP version: ISAKMP 
Version 1.0 (rfc2407)
Dec  5 01:19:04 authpriv debug pluto[30859]: |    exchange type: 
ISAKMP_XCHG_AGGR
Dec  5 01:19:04 authpriv debug pluto[30859]: |    flags: none
Dec  5 01:19:04 authpriv debug pluto[30859]: |    message ID:  00 00 00 00
Dec  5 01:19:04 authpriv debug pluto[30859]: |    length: 48
Dec  5 01:19:04 authpriv debug pluto[30859]: |  processing version=1.0 
packet with exchange type=ISAKMP_XCHG_AGGR (4)
Dec  5 01:19:04 authpriv debug pluto[30859]: | ICOOKIE:  3e 81 bf 08  ff 77 
8c de
Dec  5 01:19:04 authpriv debug pluto[30859]: | RCOOKIE:  0f 0c 3f 11  73 b2 
5c fe
Dec  5 01:19:04 authpriv debug pluto[30859]: | state hash entry 14
Dec  5 01:19:04 authpriv debug pluto[30859]: | v1 peer and cookies match on 
#1, provided msgid 00000000 vs 00000000
Dec  5 01:19:04 authpriv debug pluto[30859]: | v1 state object #1 found, in 
STATE_AGGR_R1
Dec  5 01:19:04 authpriv debug pluto[30859]: | processing connection 
ciprian[1] 70.27.135.87
Dec  5 01:19:04 authpriv warn pluto[30859]: "ciprian"[1] 70.27.135.87 #1: 
packet rejected: should have been encrypted
Dec  5 01:19:04 authpriv warn pluto[30859]: "ciprian"[1] 70.27.135.87 #1: 
sending notification INVALID_FLAGS to 70.27.135.87:500
Dec  5 01:19:04 authpriv debug pluto[30859]: | **emit ISAKMP Message:
Dec  5 01:19:04 authpriv debug pluto[30859]: |    initiator cookie:
Dec  5 01:19:04 authpriv debug pluto[30859]: |   3e 81 bf 08  ff 77 8c de
Dec  5 01:19:04 authpriv debug pluto[30859]: |    responder cookie:
Dec  5 01:19:04 authpriv debug pluto[30859]: |   0f 0c 3f 11  73 b2 5c fe
Dec  5 01:19:04 authpriv debug pluto[30859]: |    next payload type: 
ISAKMP_NEXT_N
Dec  5 01:19:04 authpriv debug pluto[30859]: |    ISAKMP version: ISAKMP 
Version 1.0 (rfc2407)
Dec  5 01:19:04 authpriv debug pluto[30859]: |    exchange type: 
ISAKMP_XCHG_INFO
Dec  5 01:19:04 authpriv debug pluto[30859]: |    flags: none
Dec  5 01:19:04 authpriv debug pluto[30859]: |    message ID:  30 9f f5 72
Dec  5 01:19:04 authpriv debug pluto[30859]: | ***emit ISAKMP Notification 
Payload:
Dec  5 01:19:04 authpriv debug pluto[30859]: |    next payload type: 
ISAKMP_NEXT_NONE
Dec  5 01:19:04 authpriv debug pluto[30859]: |    DOI: ISAKMP_DOI_IPSEC
Dec  5 01:19:04 authpriv debug pluto[30859]: |    protocol ID: 1
Dec  5 01:19:04 authpriv debug pluto[30859]: |    SPI size: 0
Dec  5 01:19:04 authpriv debug pluto[30859]: |    Notify Message Type: 
INVALID_FLAGS
Dec  5 01:19:04 authpriv debug pluto[30859]: | emitting length of ISAKMP 
Notification Payload: 12
Dec  5 01:19:04 authpriv debug pluto[30859]: | emitting length of ISAKMP 
Message: 40
Dec  5 01:19:04 authpriv debug pluto[30859]: | sending 40 bytes for 
notification packet through ppp0.1:500 to 70.27.135.87:500 (using #1)
Dec  5 01:19:04 authpriv debug pluto[30859]: |   3e 81 bf 08  ff 77 8c de 
0f 0c 3f 11  73 b2 5c fe
Dec  5 01:19:04 authpriv debug pluto[30859]: |   0b 10 05 00  30 9f f5 72 
00 00 00 28  00 00 00 0c
Dec  5 01:19:04 authpriv debug pluto[30859]: |   00 00 00 01  01 00 00 08
Dec  5 01:19:04 authpriv debug pluto[30859]: | * processed 0 messages from 
cryptographic helpers
Dec  5 01:19:04 authpriv debug pluto[30859]: | next event EVENT_RETRANSMIT 
in 10 seconds for #1
Dec  5 01:19:04 authpriv debug pluto[30859]: | next event EVENT_RETRANSMIT 
in 10 seconds for #1
Dec  5 01:19:09 authpriv debug pluto[30859]: |
Dec  5 01:19:09 authpriv debug pluto[30859]: | *received 260 bytes from 
70.27.135.87:500 on ppp0.1 (port=500)
Dec  5 01:19:09 authpriv debug pluto[30859]: |   3e 81 bf 08  ff 77 8c de 
0f 0c 3f 11  73 b2 5c fe
Dec  5 01:19:09 authpriv debug pluto[30859]: |   08 10 20 01  ed 34 d7 14 
00 00 01 04  f9 27 8a 8c
Dec  5 01:19:09 authpriv debug pluto[30859]: |   2b 46 75 d1  b2 54 0e 11 
55 4c 74 02  08 df 64 4d
Dec  5 01:19:09 authpriv debug pluto[30859]: |   c3 e2 2f 3f  a9 3b 35 c0 
83 93 13 6b  12 72 0d 98
Dec  5 01:19:09 authpriv debug pluto[30859]: |   c7 b0 96 f5  5a 93 0f dc 
63 2b 10 32  d9 09 2d ea
Dec  5 01:19:09 authpriv debug pluto[30859]: |   63 9f 72 29  0d f7 dc 3e 
84 34 63 64  37 ab 61 4f
Dec  5 01:19:09 authpriv debug pluto[30859]: |   e3 66 47 6a  61 ef db d3 
79 f7 6f ee  ab 55 3d 9f
Dec  5 01:19:09 authpriv debug pluto[30859]: |   ca da 91 c3  70 1c 66 74 
32 d5 4e 67  4b bb a1 45
Dec  5 01:19:09 authpriv debug pluto[30859]: |   2c a3 0b cc  13 34 64 80 
4f 47 2e 29  b5 9a e3 fb
Dec  5 01:19:09 authpriv debug pluto[30859]: |   11 27 65 a1  0e dc ca 11 
a6 e0 72 0d  ed 32 89 fe
Dec  5 01:19:09 authpriv debug pluto[30859]: |   24 f1 56 86  66 fb eb 5a 
e7 7f e7 0b  51 c8 39 f9
Dec  5 01:19:09 authpriv debug pluto[30859]: |   16 72 8c 7a  94 85 ba a7 
44 c2 9b ee  3a 20 93 8e
Dec  5 01:19:09 authpriv debug pluto[30859]: |   a1 53 ca a4  58 cc b8 56 
95 e6 36 1f  47 a6 1b 45
Dec  5 01:19:09 authpriv debug pluto[30859]: |   9b fb 4a 09  a2 45 66 89 
dc 47 17 fc  85 98 8a 69
Dec  5 01:19:09 authpriv debug pluto[30859]: |   7c 42 9a a1  f6 1a 87 45 
cb 05 5f 99  12 2b 40 60
Dec  5 01:19:09 authpriv debug pluto[30859]: |   2e 29 09 4d  e1 17 06 a8 
3e 3d 3c 7a  19 c1 99 43
Dec  5 01:19:09 authpriv debug pluto[30859]: |   6f f6 c3 b2
Dec  5 01:19:09 authpriv debug pluto[30859]: | **parse ISAKMP Message:
Dec  5 01:19:09 authpriv debug pluto[30859]: |    initiator cookie:
Dec  5 01:19:09 authpriv debug pluto[30859]: |   3e 81 bf 08  ff 77 8c de
Dec  5 01:19:09 authpriv debug pluto[30859]: |    responder cookie:
Dec  5 01:19:09 authpriv debug pluto[30859]: |   0f 0c 3f 11  73 b2 5c fe
Dec  5 01:19:09 authpriv debug pluto[30859]: |    next payload type: 
ISAKMP_NEXT_HASH
Dec  5 01:19:09 authpriv debug pluto[30859]: |    ISAKMP version: ISAKMP 
Version 1.0 (rfc2407)
Dec  5 01:19:09 authpriv debug pluto[30859]: |    exchange type: 
ISAKMP_XCHG_QUICK
Dec  5 01:19:09 authpriv debug pluto[30859]: |    flags: 
ISAKMP_FLAG_ENCRYPTION
Dec  5 01:19:09 authpriv debug pluto[30859]: |    message ID:  ed 34 d7 14
Dec  5 01:19:09 authpriv debug pluto[30859]: |    length: 260
Dec  5 01:19:09 authpriv debug pluto[30859]: |  processing version=1.0 
packet with exchange type=ISAKMP_XCHG_QUICK (32)
Dec  5 01:19:09 authpriv debug pluto[30859]: | ICOOKIE:  3e 81 bf 08  ff 77 
8c de
Dec  5 01:19:09 authpriv debug pluto[30859]: | RCOOKIE:  0f 0c 3f 11  73 b2 
5c fe
Dec  5 01:19:09 authpriv debug pluto[30859]: | state hash entry 14
Dec  5 01:19:09 authpriv debug pluto[30859]: | v1 peer and cookies match on 
#1, provided msgid ed34d714 vs 00000000
Dec  5 01:19:09 authpriv debug pluto[30859]: | v1 state object not found
Dec  5 01:19:09 authpriv debug pluto[30859]: | ICOOKIE:  3e 81 bf 08  ff 77 
8c de
Dec  5 01:19:09 authpriv debug pluto[30859]: | RCOOKIE:  0f 0c 3f 11  73 b2 
5c fe
Dec  5 01:19:09 authpriv debug pluto[30859]: | state hash entry 14
Dec  5 01:19:09 authpriv debug pluto[30859]: | v1 peer and cookies match on 
#1, provided msgid 00000000 vs 00000000
Dec  5 01:19:09 authpriv debug pluto[30859]: | v1 state object #1 found, in 
STATE_AGGR_R1
Dec  5 01:19:09 authpriv debug pluto[30859]: | processing connection 
ciprian[1] 70.27.135.87
Dec  5 01:19:09 authpriv warn pluto[30859]: "ciprian"[1] 70.27.135.87 #1: 
Quick Mode message is unacceptable because it is for an incomplete ISAKMP SA
Dec  5 01:19:09 authpriv debug pluto[30859]: | payload malformed after IV
Dec  5 01:19:09 authpriv debug pluto[30859]: |   ae 91 5a f7  c4 66 16 24 
44 21 f8 ea  46 a0 d1 f1
Dec  5 01:19:09 authpriv warn pluto[30859]: "ciprian"[1] 70.27.135.87 #1: 
sending notification PAYLOAD_MALFORMED to 70.27.135.87:500
Dec  5 01:19:09 authpriv debug pluto[30859]: | **emit ISAKMP Message:
Dec  5 01:19:09 authpriv debug pluto[30859]: |    initiator cookie:
Dec  5 01:19:09 authpriv debug pluto[30859]: |   3e 81 bf 08  ff 77 8c de
Dec  5 01:19:09 authpriv debug pluto[30859]: |    responder cookie:
Dec  5 01:19:09 authpriv debug pluto[30859]: |   0f 0c 3f 11  73 b2 5c fe
Dec  5 01:19:09 authpriv debug pluto[30859]: |    next payload type: 
ISAKMP_NEXT_N
Dec  5 01:19:09 authpriv debug pluto[30859]: |    ISAKMP version: ISAKMP 
Version 1.0 (rfc2407)
Dec  5 01:19:09 authpriv debug pluto[30859]: |    exchange type: 
ISAKMP_XCHG_INFO
Dec  5 01:19:09 authpriv debug pluto[30859]: |    flags: none
Dec  5 01:19:09 authpriv debug pluto[30859]: |    message ID:  12 e6 49 2d
Dec  5 01:19:09 authpriv debug pluto[30859]: | ***emit ISAKMP Notification 
Payload:
Dec  5 01:19:09 authpriv debug pluto[30859]: |    next payload type: 
ISAKMP_NEXT_NONE
Dec  5 01:19:09 authpriv debug pluto[30859]: |    DOI: ISAKMP_DOI_IPSEC
Dec  5 01:19:09 authpriv debug pluto[30859]: |    protocol ID: 1
Dec  5 01:19:09 authpriv debug pluto[30859]: |    SPI size: 0
Dec  5 01:19:09 authpriv debug pluto[30859]: |    Notify Message Type: 
PAYLOAD_MALFORMED
Dec  5 01:19:09 authpriv debug pluto[30859]: | emitting length of ISAKMP 
Notification Payload: 12
Dec  5 01:19:09 authpriv debug pluto[30859]: | emitting length of ISAKMP 
Message: 40
Dec  5 01:19:09 authpriv debug pluto[30859]: | sending 40 bytes for 
notification packet through ppp0.1:500 to 70.27.135.87:500 (using #1)
Dec  5 01:19:09 authpriv debug pluto[30859]: |   3e 81 bf 08  ff 77 8c de 
0f 0c 3f 11  73 b2 5c fe
Dec  5 01:19:09 authpriv debug pluto[30859]: |   0b 10 05 00  12 e6 49 2d 
00 00 00 28  00 00 00 0c
Dec  5 01:19:09 authpriv debug pluto[30859]: |   00 00 00 01  01 00 00 10
Dec  5 01:19:09 authpriv debug pluto[30859]: | * processed 0 messages from 
cryptographic helpers
Dec  5 01:19:09 authpriv debug pluto[30859]: | next event EVENT_RETRANSMIT 
in 5 seconds for #1
Dec  5 01:19:09 authpriv debug pluto[30859]: | next event EVENT_RETRANSMIT 
in 5 seconds for #1

  ----- Original Message ----- 
  From: Ozai 
  To: users at lists.openswan.org 
  Sent: Friday, November 29, 2013 11:52 AM
  Subject: [Openswan Users] Aggressive mode connection error with Netopia


  Dear Sirs,

  Do you have any experience for the connection with Netopia?I try to setup the VPN tunnel with Netopia.Our environment is the openswan 2.6.38.Aggressive mode.
  The following are the error logs.It seem that the openswan reject connection from Netopia.Because no any encrypted.Is it the configuration issue?or is there anything else I lose?

  Can someone point me in the right direction?Please help,Thank's.

  pluto[9450]: packet from 63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
  Nov 26 09:35:03 authpriv warn pluto[9450]: packet from 63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
  Nov 26 09:35:06 authpriv warn pluto[9450]: packet from 63.250.111.205:500: Informational Exchange is for an unknown (expired?) SA with MSGID:0xc11d6c7f
  Nov 26 09:35:13 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: Aggressive mode peer ID is ID_USER_FQDN: 'testvpn at dsl4u.ca'
  Nov 26 09:35:13 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: responding to Aggressive Mode, state #4, connection "ACI1" from 63.250.111.205
  Nov 26 09:35:13 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: transition from state STATE_AGGR_R0 to state STATE_AGGR_R1
  Nov 26 09:35:13 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: STATE_AGGR_R1: sent AR1, expecting AI2
  Nov 26 09:35:13 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: packet rejected: should have been encrypted
  Nov 26 09:35:13 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: sending notification INVALID_FLAGS to 63.250.111.205:500
  Nov 26 09:35:13 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: next payload type of ISAKMP Hash Payload has an unknown value: 115
  Nov 26 09:35:13 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: malformed payload in packet
  Nov 26 09:35:13 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: sending notification PAYLOAD_MALFORMED to 63.250.111.205:500
  Nov 26 09:35:14 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: Quick Mode message is unacceptable because it is for an incomplete ISAKMP SA
  Nov 26 09:35:14 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: sending notification PAYLOAD_MALFORMED to 63.250.111.205:500
  Nov 26 09:35:29 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: Quick Mode message is unacceptable because it is for an incomplete ISAKMP SA
  Nov 26 09:35:29 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: sending notification PAYLOAD_MALFORMED to 63.250.111.205:500
  Nov 26 09:35:44 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: Quick Mode message is unacceptable because it is for an incomplete ISAKMP SA
  Nov 26 09:35:44 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: sending notification PAYLOAD_MALFORMED to 63.250.111.205:500
  Nov 26 09:35:59 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: Quick Mode message is unacceptable because it is for an incomplete ISAKMP SA
  Nov 26 09:35:59 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: sending notification PAYLOAD_MALFORMED to 63.250.111.205:500
  Nov 26 09:36:14 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: Quick Mode message is unacceptable because it is for an incomplete ISAKMP SA
  Nov 26 09:36:14 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: sending notification PAYLOAD_MALFORMED to 63.250.111.205:500
  Nov 26 09:36:23 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205 #4: max number of retransmissions (2) reached STATE_AGGR_R1
  Nov 26 09:36:23 authpriv warn pluto[9450]: "ACI1"[2] 63.250.111.205: deleting connection "ACI1" instance with peer 63.250.111.205 {isakmp=#0/ipsec=#0}
  Nov 26 09:36:29 authpriv warn pluto[9450]: packet from 63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
  Nov 26 09:36:31 authpriv warn pluto[9450]: packet from 63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
  Nov 26 09:36:46 authpriv warn pluto[9450]: packet from 63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
  Nov 26 09:37:01 authpriv warn pluto[9450]: packet from 63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
  Nov 26 09:37:16 authpriv warn pluto[9450]: packet from 63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
  Nov 26 09:37:31 authpriv warn pluto[9450]: packet from 63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
  Nov 26 09:37:46 authpriv warn pluto[9450]: packet from 63.250.111.205:500: Quick Mode message is for a non-existent (expired?) ISAKMP SA
  Nov 26 09:37:48 authpriv warn pluto[9450]: packet from 63.250.111.205:500: Informational Exchange is for an unknown (expired?) SA with MSGID:0x7f43dac9
  Nov 26 09:37:58 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: Aggressive mode peer ID is ID_USER_FQDN: 'testvpn at dsl4u.ca'
  Nov 26 09:37:58 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: responding to Aggressive Mode, state #5, connection "ACI1" from 63.250.111.205
  Nov 26 09:37:58 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: transition from state STATE_AGGR_R0 to state STATE_AGGR_R1
  Nov 26 09:37:58 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: STATE_AGGR_R1: sent AR1, expecting AI2
  Nov 26 09:37:59 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: packet rejected: should have been encrypted
  Nov 26 09:37:59 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: sending notification INVALID_FLAGS to 63.250.111.205:500
  Nov 26 09:37:59 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: next payload type of ISAKMP Hash Payload has an unknown value: 192
  Nov 26 09:37:59 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: malformed payload in packet
  Nov 26 09:37:59 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: sending notification PAYLOAD_MALFORMED to 63.250.111.205:500
  Nov 26 09:37:59 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: Quick Mode message is unacceptable because it is for an incomplete ISAKMP SA
  Nov 26 09:38:14 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: Quick Mode message is unacceptable because it is for an incomplete ISAKMP SA
  Nov 26 09:38:14 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: sending notification PAYLOAD_MALFORMED to 63.250.111.205:500
  Nov 26 09:38:29 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: Quick Mode message is unacceptable because it is for an incomplete ISAKMP SA
  Nov 26 09:38:29 authpriv warn pluto[9450]: "ACI1"[3] 63.250.111.205 #5: sending notification PAYLOAD_MALFORMED to 63.250.111.205:500

  Best Regards
  Ozai
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20131206/8a355e5a/attachment-0001.html>


More information about the Users mailing list