Skip to content

Instantly share code, notes, and snippets.

@martimarkov
Created February 26, 2018 14:11
Show Gist options
  • Save martimarkov/1b3c0b96faf106812a8adaddef3ac3b1 to your computer and use it in GitHub Desktop.
Save martimarkov/1b3c0b96faf106812a8adaddef3ac3b1 to your computer and use it in GitHub Desktop.
VPN config
FILE:/var/log/charon_debug.log
Mon, 2018-02-26 16:02 00[DMN] Starting IKE charon daemon (strongSwan 5.2.1, Linux 3.16.0-4-amd64, x86_64)
Mon, 2018-02-26 16:02 00[LIB] plugin 'aes': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'sha2': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'random': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'nonce': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'x509': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'revocation': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'pubkey': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'pkcs7': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'pkcs8': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'pkcs12': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'pgp': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'pem': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'openssl': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'hmac': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'gcm': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'kernel-netlink': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'socket-default': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'farp': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'stroke': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] plugin 'dhcp': loaded successfully
Mon, 2018-02-26 16:02 00[LIB] feature PUBKEY:DSA in plugin 'pem' has unmet dependency: PUBKEY:DSA
Mon, 2018-02-26 16:02 00[LIB] feature PRIVKEY:DSA in plugin 'pem' has unmet dependency: PRIVKEY:DSA
Mon, 2018-02-26 16:02 00[LIB] feature CERT_DECODE:X509_OCSP_REQUEST in plugin 'pem' has unmet dependency: CERT_DECODE:X509_OCSP_REQUEST
Mon, 2018-02-26 16:02 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'
Mon, 2018-02-26 16:02 00[CFG] loaded ca certificate "CN=vpn.scaladi.com" from '/etc/ipsec.d/cacerts/ca.pem'
Mon, 2018-02-26 16:02 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'
Mon, 2018-02-26 16:02 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'
Mon, 2018-02-26 16:02 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'
Mon, 2018-02-26 16:02 00[CFG] loading crls from '/etc/ipsec.d/crls'
Mon, 2018-02-26 16:02 00[CFG] loading secrets from '/etc/ipsec.secrets'
Mon, 2018-02-26 16:02 00[CFG] loading secrets from '/var/lib/strongswan/ipsec.secrets.inc'
Mon, 2018-02-26 16:02 00[CFG] loaded RSA private key from '/etc/ipsec.d/private/debian.pem'
Mon, 2018-02-26 16:02 00[LIB] loaded plugins: charon aes sha2 random nonce x509 revocation pubkey pkcs7 pkcs8 pkcs12 pgp pem openssl hmac gcm kernel-netlink socket-default farp stroke dhcp
Mon, 2018-02-26 16:02 00[LIB] unable to load 3 plugin features (3 due to unmet dependencies)
Mon, 2018-02-26 16:02 00[LIB] dropped capabilities, running as uid 0, gid 0
Mon, 2018-02-26 16:02 00[JOB] spawning 16 worker threads
Mon, 2018-02-26 16:02 07[LIB] created thread 07 [1488]
Mon, 2018-02-26 16:02 08[LIB] created thread 08 [1489]
Mon, 2018-02-26 16:02 09[LIB] created thread 09 [1490]
Mon, 2018-02-26 16:02 10[LIB] created thread 10 [1491]
Mon, 2018-02-26 16:02 11[LIB] created thread 11 [1492]
Mon, 2018-02-26 16:02 12[LIB] created thread 12 [1493]
Mon, 2018-02-26 16:02 13[LIB] created thread 13 [1494]
Mon, 2018-02-26 16:02 06[LIB] created thread 06 [1487]
Mon, 2018-02-26 16:02 14[LIB] created thread 14 [1495]
Mon, 2018-02-26 16:02 15[LIB] created thread 15 [1496]
Mon, 2018-02-26 16:02 16[LIB] created thread 16 [1497]
Mon, 2018-02-26 16:02 05[LIB] created thread 05 [1486]
Mon, 2018-02-26 16:02 04[LIB] created thread 04 [1485]
Mon, 2018-02-26 16:02 03[LIB] created thread 03 [1484]
Mon, 2018-02-26 16:02 02[LIB] created thread 02 [1483]
Mon, 2018-02-26 16:02 01[LIB] created thread 01 [1482]
Mon, 2018-02-26 16:02 11[CFG] received stroke: add connection 'ikev2-pubkey'
Mon, 2018-02-26 16:02 11[CFG] conn ikev2-pubkey
Mon, 2018-02-26 16:02 11[CFG] left=%any
Mon, 2018-02-26 16:02 11[CFG] leftsubnet=0.0.0.0/0
Mon, 2018-02-26 16:02 11[CFG] leftauth=pubkey
Mon, 2018-02-26 16:02 11[CFG] leftid=@vpn.scaladi.com
Mon, 2018-02-26 16:02 11[CFG] leftcert=/etc/ipsec.d/certs/debian.pem
Mon, 2018-02-26 16:02 11[CFG] right=%any
Mon, 2018-02-26 16:02 11[CFG] rightsourceip=10.0.3.0/24
Mon, 2018-02-26 16:02 11[CFG] rightdns=8.8.8.8
Mon, 2018-02-26 16:02 11[CFG] rightauth=pubkey
Mon, 2018-02-26 16:02 11[CFG] ike=aes128gcm16-sha2_256-prfsha256-ecp256!
Mon, 2018-02-26 16:02 11[CFG] esp=aes128gcm16-sha2_256-ecp256!
Mon, 2018-02-26 16:02 11[CFG] dpddelay=35
Mon, 2018-02-26 16:02 11[CFG] dpdtimeout=150
Mon, 2018-02-26 16:02 11[CFG] dpdaction=1
Mon, 2018-02-26 16:02 11[CFG] mediation=no
Mon, 2018-02-26 16:02 11[CFG] keyexchange=ikev2
Mon, 2018-02-26 16:02 11[CFG] left nor right host is our side, assuming left=local
Mon, 2018-02-26 16:02 11[CFG] adding virtual IP address pool 10.0.3.0/24
Mon, 2018-02-26 16:02 11[CFG] loaded certificate "CN=vpn.scaladi.com" from '/etc/ipsec.d/certs/debian.pem'
Mon, 2018-02-26 16:02 11[CFG] added configuration 'ikev2-pubkey'
Mon, 2018-02-26 16:02 15[NET] <1> received packet: from 84.43.92.130[1011] to 93.152.158.13[500] (232 bytes)
Mon, 2018-02-26 16:02 15[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
Mon, 2018-02-26 16:02 15[CFG] <1> looking for an ike config for 93.152.158.13...84.43.92.130
Mon, 2018-02-26 16:02 15[CFG] <1> candidate: %any...%any, prio 28
Mon, 2018-02-26 16:02 15[CFG] <1> found matching ike config: %any...%any with prio 28
Mon, 2018-02-26 16:02 15[IKE] <1> 84.43.92.130 is initiating an IKE_SA
Mon, 2018-02-26 16:02 15[IKE] <1> IKE_SA (unnamed)[1] state change: CREATED => CONNECTING
Mon, 2018-02-26 16:02 15[CFG] <1> selecting proposal:
Mon, 2018-02-26 16:02 15[CFG] <1> proposal matches
Mon, 2018-02-26 16:02 15[CFG] <1> received proposals: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_256/ECP_256
Mon, 2018-02-26 16:02 15[CFG] <1> configured proposals: IKE:AES_GCM_16_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
Mon, 2018-02-26 16:02 15[CFG] <1> selected proposal: IKE:AES_GCM_16_128/PRF_HMAC_SHA2_256/ECP_256
Mon, 2018-02-26 16:02 15[IKE] <1> remote host is behind NAT
Mon, 2018-02-26 16:02 15[IKE] <1> sending cert request for "CN=vpn.scaladi.com"
Mon, 2018-02-26 16:02 15[ENC] <1> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(MULT_AUTH) ]
Mon, 2018-02-26 16:02 15[NET] <1> sending packet: from 93.152.158.13[500] to 84.43.92.130[1011] (273 bytes)
Mon, 2018-02-26 16:02 04[NET] <1> received packet: from 93.152.159.55[62056] to 93.152.158.13[500] (232 bytes)
Mon, 2018-02-26 16:02 04[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
Mon, 2018-02-26 16:02 04[IKE] <1> received retransmit of request with ID 0, retransmitting response
Mon, 2018-02-26 16:02 04[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62056] (273 bytes)
Mon, 2018-02-26 16:02 02[NET] <1> received packet: from 93.152.159.55[62058] to 93.152.158.13[500] (232 bytes)
Mon, 2018-02-26 16:02 02[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
Mon, 2018-02-26 16:02 02[IKE] <1> received retransmit of request with ID 0, retransmitting response
Mon, 2018-02-26 16:02 02[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62058] (273 bytes)
Mon, 2018-02-26 16:02 01[NET] <1> received packet: from 93.152.159.55[62060] to 93.152.158.13[500] (232 bytes)
Mon, 2018-02-26 16:02 01[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
Mon, 2018-02-26 16:02 01[IKE] <1> received retransmit of request with ID 0, retransmitting response
Mon, 2018-02-26 16:02 01[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62060] (273 bytes)
Mon, 2018-02-26 16:02 11[NET] <1> received packet: from 93.152.159.55[62062] to 93.152.158.13[500] (232 bytes)
Mon, 2018-02-26 16:02 11[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
Mon, 2018-02-26 16:02 11[IKE] <1> received retransmit of request with ID 0, retransmitting response
Mon, 2018-02-26 16:02 11[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62062] (273 bytes)
Mon, 2018-02-26 16:02 12[NET] <1> received packet: from 93.152.159.55[62065] to 93.152.158.13[500] (232 bytes)
Mon, 2018-02-26 16:02 12[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
Mon, 2018-02-26 16:02 12[IKE] <1> received retransmit of request with ID 0, retransmitting response
Mon, 2018-02-26 16:02 12[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62065] (273 bytes)
Mon, 2018-02-26 16:02 13[NET] <1> received packet: from 93.152.159.55[62066] to 93.152.158.13[500] (232 bytes)
Mon, 2018-02-26 16:02 13[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
Mon, 2018-02-26 16:02 13[IKE] <1> received retransmit of request with ID 0, retransmitting response
Mon, 2018-02-26 16:02 13[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62066] (273 bytes)
Mon, 2018-02-26 16:02 06[NET] <1> received packet: from 93.152.159.55[62068] to 93.152.158.13[500] (232 bytes)
Mon, 2018-02-26 16:02 06[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
Mon, 2018-02-26 16:02 06[IKE] <1> received retransmit of request with ID 0, retransmitting response
Mon, 2018-02-26 16:02 06[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62068] (273 bytes)
Mon, 2018-02-26 16:02 14[NET] <1> received packet: from 93.152.159.55[62070] to 93.152.158.13[500] (232 bytes)
Mon, 2018-02-26 16:02 14[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
Mon, 2018-02-26 16:02 14[IKE] <1> received retransmit of request with ID 0, retransmitting response
Mon, 2018-02-26 16:02 14[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62070] (273 bytes)
Mon, 2018-02-26 16:02 16[NET] <1> received packet: from 93.152.159.55[62072] to 93.152.158.13[500] (232 bytes)
Mon, 2018-02-26 16:02 16[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
Mon, 2018-02-26 16:02 16[IKE] <1> received retransmit of request with ID 0, retransmitting response
Mon, 2018-02-26 16:02 16[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62072] (273 bytes)
Mon, 2018-02-26 16:02 05[NET] <1> received packet: from 93.152.159.55[62074] to 93.152.158.13[500] (232 bytes)
Mon, 2018-02-26 16:02 05[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
Mon, 2018-02-26 16:02 05[IKE] <1> received retransmit of request with ID 0, retransmitting response
Mon, 2018-02-26 16:02 05[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62074] (273 bytes)
Mon, 2018-02-26 16:02 15[NET] <1> received packet: from 93.152.159.55[62076] to 93.152.158.13[500] (232 bytes)
Mon, 2018-02-26 16:02 15[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ]
Mon, 2018-02-26 16:02 15[IKE] <1> received retransmit of request with ID 0, retransmitting response
Mon, 2018-02-26 16:02 15[NET] <1> sending packet: from 93.152.158.13[500] to 93.152.159.55[62076] (273 bytes)
Mon, 2018-02-26 16:02 02[NET] <1> received packet: from 84.43.92.130[64916] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 02[ENC] <1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 02[ENC] <1> received fragment #1 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 02[NET] <1> received packet: from 84.43.92.130[64916] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 02[ENC] <1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 02[ENC] <1> received fragment #2 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 02[NET] <1> received packet: from 84.43.92.130[64916] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 02[ENC] <1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 02[ENC] <1> received fragment #3 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 02[NET] <1> received packet: from 84.43.92.130[64916] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 02[ENC] <1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 02[ENC] <1> received fragment #4 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 02[NET] <1> received packet: from 84.43.92.130[64916] to 93.152.158.13[4500] (284 bytes)
Mon, 2018-02-26 16:02 02[ENC] <1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 02[ENC] <1> received fragment #5 of 5, reassembling fragmented IKE message
Mon, 2018-02-26 16:02 02[ENC] <1> unknown attribute type (25)
Mon, 2018-02-26 16:02 02[ENC] <1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
Mon, 2018-02-26 16:02 02[IKE] <1> received cert request for "CN=vpn.scaladi.com"
Mon, 2018-02-26 16:02 02[IKE] <1> received end entity cert "CN=marti-macbook-15"
Mon, 2018-02-26 16:02 02[CFG] <1> looking for peer configs matching 93.152.158.13[vpn.scaladi.com]...84.43.92.130[marti-macbook-15]
Mon, 2018-02-26 16:02 02[CFG] <1> candidate "ikev2-pubkey", match: 20/1/28 (me/other/ike)
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> selected peer config 'ikev2-pubkey'
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> using certificate "CN=marti-macbook-15"
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> certificate "CN=marti-macbook-15" key: 4096 bit RSA
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> using trusted ca certificate "CN=vpn.scaladi.com"
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> checking certificate status of "CN=marti-macbook-15"
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> ocsp check skipped, no ocsp found
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> certificate status is not available
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> certificate "CN=vpn.scaladi.com" key: 4096 bit RSA
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> reached self-signed root ca with a path length of 0
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> authentication of 'marti-macbook-15' with RSA signature successful
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> processing INTERNAL_IP4_ADDRESS attribute
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> processing INTERNAL_IP4_DHCP attribute
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> processing INTERNAL_IP4_DNS attribute
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> processing INTERNAL_IP4_NETMASK attribute
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> processing INTERNAL_IP6_ADDRESS attribute
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> processing INTERNAL_IP6_DHCP attribute
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> processing INTERNAL_IP6_DNS attribute
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> processing (25) attribute
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> peer supports MOBIKE
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> authentication of 'vpn.scaladi.com' (myself) with RSA signature successful
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> IKE_SA ikev2-pubkey[1] established between 93.152.158.13[vpn.scaladi.com]...84.43.92.130[marti-macbook-15]
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> IKE_SA ikev2-pubkey[1] state change: CONNECTING => ESTABLISHED
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> sending end entity cert "CN=vpn.scaladi.com"
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> peer requested virtual IP %any
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> assigning new lease to 'marti-macbook-15'
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> assigning virtual IP 10.0.3.1 to peer 'marti-macbook-15'
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> peer requested virtual IP %any6
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> no virtual IP found for %any6 requested by 'marti-macbook-15'
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> building INTERNAL_IP4_DNS attribute
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> looking for a child config for 0.0.0.0/0 ::/0 === 0.0.0.0/0 ::/0
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> proposing traffic selectors for us:
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> 0.0.0.0/0
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> proposing traffic selectors for other:
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> 10.0.3.1/32
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> candidate "ikev2-pubkey" with prio 10+2
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> found matching child config "ikev2-pubkey" with prio 12
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> selecting proposal:
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> proposal matches
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> received proposals: ESP:AES_GCM_16_128/NO_EXT_SEQ
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> configured proposals: ESP:AES_GCM_16_128/ECP_256/NO_EXT_SEQ
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> selected proposal: ESP:AES_GCM_16_128/NO_EXT_SEQ
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> selecting traffic selectors for us:
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> config: 0.0.0.0/0, received: 0.0.0.0/0 => match: 0.0.0.0/0
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> config: 0.0.0.0/0, received: ::/0 => no match
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> selecting traffic selectors for other:
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> config: 10.0.3.1/32, received: 0.0.0.0/0 => match: 10.0.3.1/32
Mon, 2018-02-26 16:02 02[CFG] <ikev2-pubkey|1> config: 10.0.3.1/32, received: ::/0 => no match
Mon, 2018-02-26 16:02 02[CHD] <ikev2-pubkey|1> using AES_GCM_16 for encryption
Mon, 2018-02-26 16:02 02[CHD] <ikev2-pubkey|1> adding inbound ESP SA
Mon, 2018-02-26 16:02 02[CHD] <ikev2-pubkey|1> SPI 0xc94fcf9a, src 84.43.92.130 dst 93.152.158.13
Mon, 2018-02-26 16:02 02[CHD] <ikev2-pubkey|1> adding outbound ESP SA
Mon, 2018-02-26 16:02 02[CHD] <ikev2-pubkey|1> SPI 0x07d1c1a1, src 93.152.158.13 dst 84.43.92.130
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> CHILD_SA ikev2-pubkey{1} established with SPIs c94fcf9a_i 07d1c1a1_o and TS 0.0.0.0/0 === 10.0.3.1/32
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ IDr CERT AUTH CPRP(ADDR DNS) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) ]
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> splitting IKE message with length of 2033 bytes into 5 fragments
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ EF ]
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ EF ]
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ EF ]
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ EF ]
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ EF ]
Mon, 2018-02-26 16:02 02[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 84.43.92.130[64916] (544 bytes)
Mon, 2018-02-26 16:02 02[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 84.43.92.130[64916] (544 bytes)
Mon, 2018-02-26 16:02 02[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 84.43.92.130[64916] (544 bytes)
Mon, 2018-02-26 16:02 02[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 84.43.92.130[64916] (544 bytes)
Mon, 2018-02-26 16:02 02[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 84.43.92.130[64916] (105 bytes)
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62495] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62500] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62500] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62500] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62500] to 93.152.158.13[4500] (284 bytes)
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> unknown attribute type (25)
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
Mon, 2018-02-26 16:02 06[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62500] (544 bytes)
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62500] (544 bytes)
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62500] (544 bytes)
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62500] (544 bytes)
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62500] (105 bytes)
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62502] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62502] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62502] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62502] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62497] to 93.152.158.13[4500] (284 bytes)
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> unknown attribute type (25)
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
Mon, 2018-02-26 16:02 01[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62497] (544 bytes)
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62497] (544 bytes)
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62497] (544 bytes)
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62497] (544 bytes)
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62497] (105 bytes)
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62502] to 93.152.158.13[4500] (284 bytes)
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> received fragment #5 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62504] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62504] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62504] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62504] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> received fragment #4 of 5, reassembling fragmented IKE message
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> unknown attribute type (25)
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
Mon, 2018-02-26 16:02 01[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62504] (544 bytes)
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62504] (544 bytes)
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62504] (544 bytes)
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62504] (544 bytes)
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62504] (105 bytes)
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62500] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62505] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> received duplicate fragment #1
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62505] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62505] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62505] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62505] to 93.152.158.13[4500] (284 bytes)
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> unknown attribute type (25)
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
Mon, 2018-02-26 16:02 13[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62505] (544 bytes)
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62505] (544 bytes)
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62505] (544 bytes)
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62505] (544 bytes)
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62505] (105 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62497] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62507] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62507] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62507] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received duplicate fragment #3
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62507] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62507] to 93.152.158.13[4500] (284 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> unknown attribute type (25)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
Mon, 2018-02-26 16:02 12[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62507] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62507] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62507] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62507] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62507] (105 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62509] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62509] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62509] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62509] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62509] to 93.152.158.13[4500] (284 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> unknown attribute type (25)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
Mon, 2018-02-26 16:02 12[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62509] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62509] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62509] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62509] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62509] (105 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62511] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62511] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62511] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62511] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62511] to 93.152.158.13[4500] (284 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> unknown attribute type (25)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
Mon, 2018-02-26 16:02 12[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62511] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62511] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62511] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62511] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62511] (105 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62514] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62514] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62514] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62514] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62514] to 93.152.158.13[4500] (284 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> unknown attribute type (25)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
Mon, 2018-02-26 16:02 12[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62514] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62514] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62514] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62514] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62514] (105 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62516] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62516] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62516] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62516] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62516] to 93.152.158.13[4500] (284 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> unknown attribute type (25)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
Mon, 2018-02-26 16:02 12[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62516] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62516] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62516] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62516] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62516] (105 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62517] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62517] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62517] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62517] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62517] to 93.152.158.13[4500] (284 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> received fragment #5 of 5, reassembling fragmented IKE message
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> unknown attribute type (25)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
Mon, 2018-02-26 16:02 12[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62517] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62517] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62517] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62517] (544 bytes)
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62517] (105 bytes)
Mon, 2018-02-26 16:02 11[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62497] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 11[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 11[ENC] <ikev2-pubkey|1> received fragment #4 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 11[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62519] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 11[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 11[ENC] <ikev2-pubkey|1> received duplicate fragment #4
Mon, 2018-02-26 16:02 11[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62519] to 93.152.158.13[4500] (284 bytes)
Mon, 2018-02-26 16:02 11[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 11[ENC] <ikev2-pubkey|1> received fragment #5 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 14[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62495] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 14[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 14[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 15[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62495] to 93.152.158.13[4500] (284 bytes)
Mon, 2018-02-26 16:02 15[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 15[ENC] <ikev2-pubkey|1> received duplicate fragment #5
Mon, 2018-02-26 16:02 05[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62495] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 05[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 05[ENC] <ikev2-pubkey|1> received duplicate fragment #4
Mon, 2018-02-26 16:02 03[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62497] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 03[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 03[ENC] <ikev2-pubkey|1> received duplicate fragment #2
Mon, 2018-02-26 16:02 04[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62497] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 04[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 04[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 16[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62495] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 16[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 16[ENC] <ikev2-pubkey|1> received fragment #3 of 5, reassembling fragmented IKE message
Mon, 2018-02-26 16:02 16[ENC] <ikev2-pubkey|1> unknown attribute type (25)
Mon, 2018-02-26 16:02 16[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CERTREQ AUTH CERT CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6 (25)) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ]
Mon, 2018-02-26 16:02 16[IKE] <ikev2-pubkey|1> received retransmit of request with ID 1, retransmitting response
Mon, 2018-02-26 16:02 16[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62495] (544 bytes)
Mon, 2018-02-26 16:02 16[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62495] (544 bytes)
Mon, 2018-02-26 16:02 16[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62495] (544 bytes)
Mon, 2018-02-26 16:02 16[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62495] (544 bytes)
Mon, 2018-02-26 16:02 16[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 93.152.159.55[62495] (105 bytes)
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62519] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> received fragment #1 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62504] to 93.152.158.13[4500] (284 bytes)
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> received fragment #5 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62519] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> received fragment #2 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 02[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62519] to 93.152.158.13[4500] (540 bytes)
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> parsed IKE_AUTH request 1 [ EF ]
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> received fragment #3 of 5, waiting for complete IKE message
Mon, 2018-02-26 16:02 04[IKE] <ikev2-pubkey|1> sending DPD request
Mon, 2018-02-26 16:02 04[IKE] <ikev2-pubkey|1> queueing IKE_DPD task
Mon, 2018-02-26 16:02 04[IKE] <ikev2-pubkey|1> activating new tasks
Mon, 2018-02-26 16:02 04[IKE] <ikev2-pubkey|1> activating IKE_DPD task
Mon, 2018-02-26 16:02 04[ENC] <ikev2-pubkey|1> generating INFORMATIONAL request 0 [ ]
Mon, 2018-02-26 16:02 04[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 84.43.92.130[64916] (57 bytes)
Mon, 2018-02-26 16:02 16[NET] <ikev2-pubkey|1> received packet: from 84.43.92.130[64916] to 93.152.158.13[4500] (64 bytes)
Mon, 2018-02-26 16:02 16[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ]
Mon, 2018-02-26 16:02 16[IKE] <ikev2-pubkey|1> activating new tasks
Mon, 2018-02-26 16:02 16[IKE] <ikev2-pubkey|1> nothing to initiate
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62495] to 93.152.158.13[4500] (64 bytes)
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ]
Mon, 2018-02-26 16:02 13[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored
Mon, 2018-02-26 16:02 06[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62497] to 93.152.158.13[4500] (64 bytes)
Mon, 2018-02-26 16:02 06[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ]
Mon, 2018-02-26 16:02 06[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored
Mon, 2018-02-26 16:02 01[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62500] to 93.152.158.13[4500] (64 bytes)
Mon, 2018-02-26 16:02 01[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ]
Mon, 2018-02-26 16:02 01[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored
Mon, 2018-02-26 16:02 02[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62502] to 93.152.158.13[4500] (64 bytes)
Mon, 2018-02-26 16:02 02[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ]
Mon, 2018-02-26 16:02 02[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored
Mon, 2018-02-26 16:02 12[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62504] to 93.152.158.13[4500] (64 bytes)
Mon, 2018-02-26 16:02 12[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ]
Mon, 2018-02-26 16:02 12[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored
Mon, 2018-02-26 16:02 11[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62505] to 93.152.158.13[4500] (64 bytes)
Mon, 2018-02-26 16:02 11[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ]
Mon, 2018-02-26 16:02 11[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored
Mon, 2018-02-26 16:02 14[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62507] to 93.152.158.13[4500] (64 bytes)
Mon, 2018-02-26 16:02 14[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ]
Mon, 2018-02-26 16:02 14[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored
Mon, 2018-02-26 16:02 15[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62509] to 93.152.158.13[4500] (64 bytes)
Mon, 2018-02-26 16:02 15[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ]
Mon, 2018-02-26 16:02 15[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored
Mon, 2018-02-26 16:02 05[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62511] to 93.152.158.13[4500] (64 bytes)
Mon, 2018-02-26 16:02 05[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ]
Mon, 2018-02-26 16:02 05[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored
Mon, 2018-02-26 16:02 03[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62514] to 93.152.158.13[4500] (64 bytes)
Mon, 2018-02-26 16:02 03[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ]
Mon, 2018-02-26 16:02 03[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored
Mon, 2018-02-26 16:02 04[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62516] to 93.152.158.13[4500] (64 bytes)
Mon, 2018-02-26 16:02 04[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ]
Mon, 2018-02-26 16:02 04[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored
Mon, 2018-02-26 16:02 16[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62517] to 93.152.158.13[4500] (64 bytes)
Mon, 2018-02-26 16:02 16[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ]
Mon, 2018-02-26 16:02 16[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored
Mon, 2018-02-26 16:02 13[NET] <ikev2-pubkey|1> received packet: from 93.152.159.55[62519] to 93.152.158.13[4500] (64 bytes)
Mon, 2018-02-26 16:02 13[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL response 0 [ ]
Mon, 2018-02-26 16:02 13[IKE] <ikev2-pubkey|1> received message ID 0, expected 1. Ignored
Mon, 2018-02-26 16:03 04[NET] <ikev2-pubkey|1> received packet: from 84.43.92.130[64916] to 93.152.158.13[4500] (72 bytes)
Mon, 2018-02-26 16:03 04[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL request 2 [ D ]
Mon, 2018-02-26 16:03 04[IKE] <ikev2-pubkey|1> received DELETE for IKE_SA ikev2-pubkey[1]
Mon, 2018-02-26 16:03 04[IKE] <ikev2-pubkey|1> deleting IKE_SA ikev2-pubkey[1] between 93.152.158.13[vpn.scaladi.com]...84.43.92.130[marti-macbook-15]
Mon, 2018-02-26 16:03 04[IKE] <ikev2-pubkey|1> IKE_SA ikev2-pubkey[1] state change: ESTABLISHED => DELETING
Mon, 2018-02-26 16:03 04[IKE] <ikev2-pubkey|1> IKE_SA deleted
Mon, 2018-02-26 16:03 04[ENC] <ikev2-pubkey|1> generating INFORMATIONAL response 2 [ ]
Mon, 2018-02-26 16:03 04[NET] <ikev2-pubkey|1> sending packet: from 93.152.158.13[4500] to 84.43.92.130[64916] (57 bytes)
Mon, 2018-02-26 16:03 04[IKE] <ikev2-pubkey|1> IKE_SA ikev2-pubkey[1] state change: DELETING => DESTROYING
Mon, 2018-02-26 16:03 04[CFG] <ikev2-pubkey|1> lease 10.0.3.1 by 'marti-macbook-15' went offline
Martis-FF-MacBook-Pro:~ marti$ ifconfig
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP>
inet 127.0.0.1 netmask 0xff000000
inet6 ::1 prefixlen 128
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
nd6 options=201<PERFORMNUD,DAD>
gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
stf0: flags=0<> mtu 1280
XHC0: flags=0<> mtu 0
XHC20: flags=0<> mtu 0
en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
ether 8c:85:90:06:b9:f4
inet6 fe80::404:73b1:b87e:160a%en0 prefixlen 64 secured scopeid 0x6
inet 192.168.11.83 netmask 0xfffffe00 broadcast 192.168.11.255
nd6 options=201<PERFORMNUD,DAD>
media: autoselect
status: active
p2p0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 2304
ether 0e:85:90:06:b9:f4
media: autoselect
status: inactive
awdl0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1484
ether 9a:fe:2a:c6:27:be
inet6 fe80::98fe:2aff:fec6:27be%awdl0 prefixlen 64 scopeid 0x8
nd6 options=201<PERFORMNUD,DAD>
media: autoselect
status: active
en2: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=60<TSO4,TSO6>
ether 56:00:08:d0:03:01
media: autoselect <full-duplex>
status: inactive
en1: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=60<TSO4,TSO6>
ether 56:00:08:d0:03:00
media: autoselect <full-duplex>
status: inactive
bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=63<RXCSUM,TXCSUM,TSO4,TSO6>
ether 56:00:08:d0:03:00
Configuration:
id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0
maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200
root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0
ipfilter disabled flags 0x2
member: en1 flags=3<LEARNING,DISCOVER>
ifmaxaddr 0 port 10 priority 0 path cost 0
member: en2 flags=3<LEARNING,DISCOVER>
ifmaxaddr 0 port 9 priority 0 path cost 0
nd6 options=201<PERFORMNUD,DAD>
media: <unknown type>
status: inactive
utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000
inet6 fe80::bbda:1a30:9c37:c3fe%utun0 prefixlen 64 scopeid 0xc
nd6 options=201<PERFORMNUD,DAD>
utun1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380
inet6 fe80::6157:a184:b5be:bf0b%utun1 prefixlen 64 scopeid 0xd
inet6 fd60:51cd:af20:f438:6157:a184:b5be:bf0b prefixlen 64
nd6 options=201<PERFORMNUD,DAD>
utun2: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380
inet6 fe80::8f5d:42c6:eb75:5197%utun2 prefixlen 64 scopeid 0x10
nd6 options=201<PERFORMNUD,DAD>
ipsec0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1400
inet 10.0.3.1 --> 10.0.3.1 netmask 0xff000000
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
link/ether 08:00:27:3a:9d:24 brd ff:ff:ff:ff:ff:ff
inet 93.152.158.13/24 brd 93.152.158.255 scope global eth0
valid_lft forever preferred_lft forever
inet6 fe80::a00:27ff:fe3a:9d24/64 scope link tentative dadfailed
valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
link/ether 08:00:27:38:fc:19 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.171/24 brd 192.168.1.255 scope global eth1
valid_lft forever preferred_lft forever
inet6 fe80::a00:27ff:fe38:fc19/64 scope link
valid_lft forever preferred_lft forever
default via 93.152.158.1 dev eth0
93.152.158.0/24 dev eth0 proto kernel scope link src 93.152.158.13
192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.171
broadcast 93.152.158.0 dev eth0 table local proto kernel scope link src 93.152.158.13
local 93.152.158.13 dev eth0 table local proto kernel scope host src 93.152.158.13
broadcast 93.152.158.255 dev eth0 table local proto kernel scope link src 93.152.158.13
broadcast 127.0.0.0 dev lo table local proto kernel scope link src 127.0.0.1
local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1
local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1
broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1
broadcast 192.168.1.0 dev eth1 table local proto kernel scope link src 192.168.1.171
local 192.168.1.171 dev eth1 table local proto kernel scope host src 192.168.1.171
broadcast 192.168.1.255 dev eth1 table local proto kernel scope link src 192.168.1.171
unreachable default dev lo table unspec proto kernel metric 4294967295 error -101
local ::1 dev lo proto kernel metric 256
fe80::/64 dev eth0 proto kernel metric 256
fe80::/64 dev eth1 proto kernel metric 256
default via fe80::ea37:7aff:fef2:1327 dev eth1 proto ra metric 1024 expires 1419sec hoplimit 64
unreachable default dev lo table unspec proto kernel metric 4294967295 error -101
local ::1 dev lo table local proto none metric 0
local fe80::a00:27ff:fe38:fc19 dev lo table local proto none metric 0
ff00::/8 dev eth0 table local metric 256
ff00::/8 dev eth1 table local metric 256
unreachable default dev lo table unspec proto kernel metric 4294967295 error -101
src 10.0.3.1/32 dst 93.152.158.13/32
dir fwd priority 2819 ptype main
tmpl src 84.43.92.130 dst 93.152.158.13
proto esp reqid 1 mode tunnel
src 10.0.3.1/32 dst 93.152.158.13/32
dir in priority 2819 ptype main
tmpl src 84.43.92.130 dst 93.152.158.13
proto esp reqid 1 mode tunnel
src 93.152.158.13/32 dst 10.0.3.1/32
dir out priority 2819 ptype main
tmpl src 93.152.158.13 dst 84.43.92.130
proto esp reqid 1 mode tunnel
src 0.0.0.0/0 dst 0.0.0.0/0
socket in priority 0 ptype main
src 0.0.0.0/0 dst 0.0.0.0/0
socket out priority 0 ptype main
src 0.0.0.0/0 dst 0.0.0.0/0
socket in priority 0 ptype main
src 0.0.0.0/0 dst 0.0.0.0/0
socket out priority 0 ptype main
src ::/0 dst ::/0
socket in priority 0 ptype main
src ::/0 dst ::/0
socket out priority 0 ptype main
src ::/0 dst ::/0
socket in priority 0 ptype main
src ::/0 dst ::/0
socket out priority 0 ptype main
Status of IKE charon daemon (strongSwan 5.2.1, Linux 3.16.0-4-amd64, x86_64):
uptime: 32 minutes, since Feb 26 15:16:37 2018
malloc: sbrk 1490944, mmap 0, used 307104, free 1183840
worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 0
loaded plugins: charon aes sha2 random nonce x509 revocation pubkey pkcs7 pkcs8 pkcs12 pgp pem openssl hmac gcm kernel-netlink socket-default farp stroke dhcp
Virtual IP pools (size/online/offline):
10.0.3.0/24: 254/0/1
Listening IP addresses:
93.152.158.13
192.168.1.171
Connections:
ikev2-pubkey: %any...%any IKEv2, dpddelay=35s
ikev2-pubkey: local: [vpn.scaladi.com] uses public key authentication
ikev2-pubkey: cert: "CN=vpn.scaladi.com"
ikev2-pubkey: remote: uses public key authentication
ikev2-pubkey: child: dynamic === 0.0.0.0/0 TUNNEL, dpdaction=clear
Security Associations (0 up, 0 connecting):
none
FILE:/etc/ipsec.conf
# ipsec.conf - strongSwan IPsec configuration file
# basic configuration
config setup
# strictcrlpolicy=yes
# uniqueids = no
charondebug="ike 4, knl 4, cfg 4, dmn 4"
uniqueids=no
# Add connections here.
# Sample VPN connections
#conn sample-self-signed
# leftsubnet=10.1.0.0/16
# leftcert=selfCert.der
# leftsendcert=never
# right=192.168.0.2
# rightsubnet=10.2.0.0/16
# rightcert=peerCert.der
# auto=start
#conn sample-with-ca-cert
# leftsubnet=10.1.0.0/16
# leftcert=myCert.pem
# right=192.168.0.2
# rightsubnet=10.2.0.0/16
# rightid="C=CH, O=Linux strongSwan CN=peer name"
# auto=start
include /var/lib/strongswan/ipsec.conf.inc
FILE:/var/lib/strongswan/ipsec.conf.inc
#include /etc/ipsec.d/examples/oe.conf
conn %default
keyexchange=ikev2
ike=aes128gcm16-sha2_256-prfsha256-ecp256!
esp=aes128gcm16-sha2_256-ecp256!
# ike=aes256gcm16-sha256-ecp521,aes256-sha256-ecp384,aes256gcm16-sha256-ecp256!
# esp=aes256gcm16-sha256,aes256-sha256!
fragmentation=yes
rekey=no
compress=yes
dpdaction=clear
dpddelay=35s
left=%any
leftauth=pubkey
leftid=@vpn.scaladi.com
leftcert=/etc/ipsec.d/certs/debian.pem
leftsendcert=always
leftsubnet=0.0.0.0/0,
# leftsubnet=192.168.1.0/24
# leftfirewall=yes
right=%any
rightauth=pubkey
# rightsourceip=192.168.1.0/24,
# rightsubnet=192.168.1.0/24
# rightsourceip=%dhcp
# rightsubnet=0.0.0.0/0
rightsourceip=10.0.3.0/24
rightdns=8.8.8.8
conn ikev2-pubkey
auto=add
FILE:/etc/ipsec.secrets
# This file holds shared secrets or RSA private keys for authentication.
# RSA private key for this host, authenticating it to any other host
# which knows the public part.
# this file is managed with debconf and will contain the automatically created private key
include /var/lib/strongswan/ipsec.secrets.inc
FILE:/var/lib/strongswan/ipsec.secrets.inc
: RSA "/etc/ipsec.d/private/debian.pem"
# Generated by iptables-save v1.4.21 on Mon Feb 26 15:51:46 2018
*filter
:INPUT ACCEPT [16169997:2085910279]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [7369413:358398884]
COMMIT
# Completed on Mon Feb 26 15:51:46 2018
@martimarkov
Copy link
Author

vpn-map

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment