Jul 7 00:11:59 irkalla charon: 05[NET] received packet: from 1.1.1.1[500] to 2.2.2.2[500] (604 bytes) Jul 7 00:11:59 irkalla charon: 05[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ] Jul 7 00:11:59 irkalla charon: 05[IKE] 1.1.1.1 is initiating an IKE_SA Jul 7 00:11:59 irkalla charon: 05[IKE] remote host is behind NAT Jul 7 00:11:59 irkalla charon: 05[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(MULT_AUTH) ] Jul 7 00:11:59 irkalla charon: 05[NET] sending packet: from 2.2.2.2[500] to 1.1.1.1[500] (448 bytes) Jul 7 00:11:59 irkalla charon: 13[NET] received packet: from 1.1.1.1[4500] to 2.2.2.2[4500] (496 bytes) Jul 7 00:11:59 irkalla charon: 13[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ] Jul 7 00:11:59 irkalla charon: 13[CFG] looking for peer configs matching 2.2.2.2[some.host.domain]...1.1.1.1[laurens2] Jul 7 00:12:00 irkalla charon: 13[CFG] selected peer config 'iOS-radius' Jul 7 00:12:00 irkalla charon: 13[IKE] initiating EAP_IDENTITY method (id 0x00) Jul 7 00:12:00 irkalla charon: 13[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding Jul 7 00:12:00 irkalla charon: 13[IKE] peer supports MOBIKE Jul 7 00:12:00 irkalla charon: 13[IKE] authentication of 'some.host.domain' (myself) with RSA signature successful Jul 7 00:12:00 irkalla charon: 13[IKE] sending end entity cert "CN=some.host.domain" Jul 7 00:12:00 irkalla charon: 13[ENC] generating IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ] Jul 7 00:12:00 irkalla charon: 13[ENC] splitting IKE message with length of 1648 bytes into 4 fragments Jul 7 00:12:00 irkalla charon: 13[ENC] payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response Jul 7 00:12:00 irkalla charon: 13[ENC] generating IKE_AUTH response 1 [ EF ] Jul 7 00:12:00 irkalla charon: 13[ENC] payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response Jul 7 00:12:00 irkalla charon: 13[ENC] generating IKE_AUTH response 1 [ EF ] Jul 7 00:12:00 irkalla charon: 13[ENC] payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response Jul 7 00:12:00 irkalla charon: 13[ENC] generating IKE_AUTH response 1 [ EF ] Jul 7 00:12:00 irkalla charon: 13[ENC] payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response Jul 7 00:12:00 irkalla charon: 13[ENC] generating IKE_AUTH response 1 [ EF ] Jul 7 00:12:00 irkalla charon: 13[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (532 bytes) Jul 7 00:12:00 irkalla charon: 13[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (532 bytes) Jul 7 00:12:00 irkalla charon: 13[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (532 bytes) Jul 7 00:12:00 irkalla charon: 13[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (260 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 10[IKE] DH group ECP_256 inacceptable, requesting MODP_2048 Jul 7 00:12:00 irkalla ipsec[24225]: 10[ENC] generating IKE_SA_INIT response 0 [ N(INVAL_KE) ] Jul 7 00:12:00 irkalla ipsec[24225]: 10[NET] sending packet: from 2.2.2.2[500] to 1.1.1.1[51331] (38 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 06[NET] received packet: from 1.1.1.1[56201] to 2.2.2.2[500] (732 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 06[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N((16431)) N(REDIR_SUP) ] Jul 7 00:12:00 irkalla ipsec[24225]: 06[IKE] 1.1.1.1 is initiating an IKE_SA Jul 7 00:12:00 irkalla ipsec[24225]: 06[IKE] remote host is behind NAT Jul 7 00:12:00 irkalla ipsec[24225]: 06[IKE] DH group ECP_256 inacceptable, requesting MODP_2048 Jul 7 00:12:00 irkalla ipsec[24225]: 06[ENC] generating IKE_SA_INIT response 0 [ N(INVAL_KE) ] Jul 7 00:12:00 irkalla ipsec[24225]: 06[NET] sending packet: from 2.2.2.2[500] to 1.1.1.1[56201] (38 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 13[NET] received packet: from 1.1.1.1[56201] to 2.2.2.2[500] (924 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 13[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N((16431)) N(REDIR_SUP) ] Jul 7 00:12:00 irkalla ipsec[24225]: 13[IKE] 1.1.1.1 is initiating an IKE_SA Jul 7 00:12:00 irkalla ipsec[24225]: 13[IKE] remote host is behind NAT Jul 7 00:12:00 irkalla ipsec[24225]: 13[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(MULT_AUTH) ] Jul 7 00:12:00 irkalla ipsec[24225]: 13[NET] sending packet: from 2.2.2.2[500] to 1.1.1.1[56201] (448 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 10[NET] received packet: from 1.1.1.1[52708] to 2.2.2.2[4500] (1248 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 10[ENC] parsed IKE_AUTH request 1 [ EF ] Jul 7 00:12:00 irkalla ipsec[24225]: 10[ENC] received fragment #1 of 4, waiting for complete IKE message Jul 7 00:12:00 irkalla ipsec[24225]: 06[NET] received packet: from 1.1.1.1[52708] to 2.2.2.2[4500] (1248 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 06[ENC] parsed IKE_AUTH request 1 [ EF ] Jul 7 00:12:00 irkalla ipsec[24225]: 06[ENC] received fragment #2 of 4, waiting for complete IKE message Jul 7 00:12:00 irkalla ipsec[24225]: 16[JOB] deleting half open IKE_SA after timeout Jul 7 00:12:00 irkalla ipsec[24225]: 08[NET] received packet: from 1.1.1.1[52708] to 2.2.2.2[4500] (1248 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 08[ENC] parsed IKE_AUTH request 1 [ EF ] Jul 7 00:12:00 irkalla ipsec[24225]: 08[ENC] received duplicate fragment #1 Jul 7 00:12:00 irkalla ipsec[24225]: 10[NET] received packet: from 1.1.1.1[52708] to 2.2.2.2[4500] (1248 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 10[ENC] parsed IKE_AUTH request 1 [ EF ] Jul 7 00:12:00 irkalla ipsec[24225]: 10[ENC] received duplicate fragment #2 Jul 7 00:12:00 irkalla ipsec[24225]: 08[NET] received packet: from 1.1.1.1[52708] to 2.2.2.2[4500] (1248 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 08[ENC] parsed IKE_AUTH request 1 [ EF ] Jul 7 00:12:00 irkalla ipsec[24225]: 08[ENC] received duplicate fragment #1 Jul 7 00:12:00 irkalla ipsec[24225]: 12[NET] received packet: from 1.1.1.1[52708] to 2.2.2.2[4500] (1248 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 12[ENC] parsed IKE_AUTH request 1 [ EF ] Jul 7 00:12:00 irkalla ipsec[24225]: 12[ENC] received duplicate fragment #1 Jul 7 00:12:00 irkalla ipsec[24225]: 13[NET] received packet: from 1.1.1.1[56201] to 2.2.2.2[500] (732 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 13[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N((16431)) N(REDIR_SUP) ] Jul 7 00:12:00 irkalla ipsec[24225]: 13[IKE] 1.1.1.1 is initiating an IKE_SA Jul 7 00:12:00 irkalla ipsec[24225]: 13[IKE] remote host is behind NAT Jul 7 00:12:00 irkalla ipsec[24225]: 13[IKE] DH group ECP_256 inacceptable, requesting MODP_2048 Jul 7 00:12:00 irkalla ipsec[24225]: 13[ENC] generating IKE_SA_INIT response 0 [ N(INVAL_KE) ] Jul 7 00:12:00 irkalla ipsec[24225]: 13[NET] sending packet: from 2.2.2.2[500] to 1.1.1.1[56201] (38 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 16[JOB] deleting half open IKE_SA after timeout Jul 7 00:12:00 irkalla ipsec[24225]: 05[NET] received packet: from 1.1.1.1[500] to 2.2.2.2[500] (604 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 05[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) ] Jul 7 00:12:00 irkalla ipsec[24225]: 05[IKE] 1.1.1.1 is initiating an IKE_SA Jul 7 00:12:00 irkalla ipsec[24225]: 05[IKE] remote host is behind NAT Jul 7 00:12:00 irkalla ipsec[24225]: 05[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(MULT_AUTH) ] Jul 7 00:12:00 irkalla ipsec[24225]: 05[NET] sending packet: from 2.2.2.2[500] to 1.1.1.1[500] (448 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 13[NET] received packet: from 1.1.1.1[4500] to 2.2.2.2[4500] (496 bytes) Jul 7 00:12:00 irkalla ipsec[24225]: 13[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) N(MOBIKE_SUP) IDr CPRQ(ADDR DHCP DNS MASK ADDR6 DHCP6 DNS6) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr ] Jul 7 00:12:00 irkalla ipsec[24225]: 13[CFG] looking for peer configs matching 2.2.2.2[some.host.domain]...1.1.1.1[laurens2] Jul 7 00:12:00 irkalla ipsec[24225]: 13[CFG] selected peer config 'iOS-radius' Jul 7 00:12:00 irkalla ipsec[24225]: 13[IKE] initiating EAP_IDENTITY method (id 0x00) Jul 7 00:12:00 irkalla ipsec[24225]: 13[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding Jul 7 00:12:00 irkalla ipsec[24225]: 13[IKE] peer supports MOBIKE Jul 7 00:12:00 irkalla ipsec[24225]: 13[IKE] authentication of 'some.host.domain' (myself) with RSA signature successful Jul 7 00:12:00 irkalla ipsec[24225]: 13[IKE] sending end entity cert "CN=some.host.domain" Jul 7 00:12:00 irkalla ipsec[24225]: 13[ENC] generating IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ] Jul 7 00:12:00 irkalla ipsec[24225]: 13[ENC] splitting IKE message with length of 1648 bytes into 4 fragments Jul 7 00:12:00 irkalla ipsec[24225]: 13[ENC] payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response Jul 7 00:12:00 irkalla charon: 11[NET] received packet: from 1.1.1.1[4500] to 2.2.2.2[4500] (96 bytes) Jul 7 00:12:00 irkalla charon: 11[ENC] parsed IKE_AUTH request 2 [ EAP/RES/ID ] Jul 7 00:12:00 irkalla charon: 11[IKE] received EAP identity 'laurens2' Jul 7 00:12:00 irkalla charon: 11[CFG] sending RADIUS Access-Request to server 'server-a' Jul 7 00:12:00 irkalla charon: 11[CFG] received RADIUS Access-Challenge from server 'server-a' Jul 7 00:12:00 irkalla charon: 11[IKE] initiating EAP_MD5 method (id 0x01) Jul 7 00:12:00 irkalla charon: 11[ENC] generating IKE_AUTH response 2 [ EAP/REQ/MD5 ] Jul 7 00:12:00 irkalla charon: 11[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (96 bytes) Jul 7 00:12:00 irkalla charon: 08[NET] received packet: from 1.1.1.1[4500] to 2.2.2.2[4500] (80 bytes) Jul 7 00:12:00 irkalla charon: 08[ENC] parsed IKE_AUTH request 3 [ EAP/RES/NAK ] Jul 7 00:12:00 irkalla charon: 08[CFG] sending RADIUS Access-Request to server 'server-a' Jul 7 00:12:00 irkalla charon: 08[CFG] received RADIUS Access-Challenge from server 'server-a' Jul 7 00:12:00 irkalla charon: 08[ENC] generating IKE_AUTH response 3 [ EAP/REQ/MSCHAPV2 ] Jul 7 00:12:00 irkalla charon: 08[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (112 bytes) Jul 7 00:12:00 irkalla charon: 06[NET] received packet: from 1.1.1.1[4500] to 2.2.2.2[4500] (144 bytes) Jul 7 00:12:00 irkalla charon: 06[ENC] parsed IKE_AUTH request 4 [ EAP/RES/MSCHAPV2 ] Jul 7 00:12:00 irkalla charon: 06[CFG] sending RADIUS Access-Request to server 'server-a' Jul 7 00:12:00 irkalla charon: 06[CFG] received RADIUS Access-Challenge from server 'server-a' Jul 7 00:12:00 irkalla charon: 06[ENC] generating IKE_AUTH response 4 [ EAP/REQ/MSCHAPV2 ] Jul 7 00:12:00 irkalla charon: 06[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (128 bytes) Jul 7 00:12:00 irkalla charon: 09[NET] received packet: from 1.1.1.1[4500] to 2.2.2.2[4500] (80 bytes) Jul 7 00:12:00 irkalla charon: 09[ENC] parsed IKE_AUTH request 5 [ EAP/RES/MSCHAPV2 ] Jul 7 00:12:00 irkalla charon: 09[CFG] sending RADIUS Access-Request to server 'server-a' Jul 7 00:12:00 irkalla charon: 09[CFG] received RADIUS Access-Accept from server 'server-a' Jul 7 00:12:00 irkalla charon: 09[LIB] 5 bytes insufficient to parse 6 bytes of data Jul 7 00:12:00 irkalla charon: 09[IKE] RADIUS authentication of 'laurens2' successful Jul 7 00:12:00 irkalla charon: 09[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established Jul 7 00:12:00 irkalla charon: 09[ENC] generating IKE_AUTH response 5 [ EAP/SUCC ] Jul 7 00:12:00 irkalla charon: 09[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (80 bytes) Jul 7 00:12:00 irkalla charon: 12[NET] received packet: from 1.1.1.1[4500] to 2.2.2.2[4500] (112 bytes) Jul 7 00:12:00 irkalla charon: 12[ENC] parsed IKE_AUTH request 6 [ AUTH ] Jul 7 00:12:00 irkalla charon: 12[IKE] authentication of 'laurens2' with EAP successful Jul 7 00:12:00 irkalla charon: 12[IKE] authentication of 'some.host.domain' (myself) with EAP Jul 7 00:12:00 irkalla charon: 12[IKE] IKE_SA iOS-radius[57] established between 2.2.2.2[some.host.domain]...1.1.1.1[laurens2] Jul 7 00:12:00 irkalla charon: 12[IKE] scheduling reauthentication in 10013s Jul 7 00:12:00 irkalla charon: 12[IKE] maximum IKE_SA lifetime 10553s Jul 7 00:12:00 irkalla charon: 12[IKE] peer requested virtual IP %any Jul 7 00:12:00 irkalla charon: 12[IKE] assigning virtual IP 10.1.0.17 to peer 'laurens2' Jul 7 00:12:00 irkalla charon: 12[IKE] peer requested virtual IP %any6 Jul 7 00:12:00 irkalla charon: 12[IKE] no virtual IP found for %any6 requested by 'laurens2' Jul 7 00:12:00 irkalla charon: 12[IKE] CHILD_SA iOS-radius{8} established with SPIs c9d32966_i 09b05961_o and TS 0.0.0.0/0 === 10.1.0.17/32 Jul 7 00:12:00 irkalla charon: 12[CFG] scheduling RADIUS Interim-Updates every 300s Jul 7 00:12:00 irkalla charon: 12[CFG] sending RADIUS Accounting-Request to server 'server-a' Jul 7 00:12:00 irkalla charon: 12[CFG] received RADIUS Accounting-Response from server 'server-a' Jul 7 00:12:00 irkalla charon: 12[ENC] generating IKE_AUTH response 6 [ AUTH CPRP(ADDR DNS DNS) SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) ] Jul 7 00:12:00 irkalla charon: 12[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (288 bytes) Jul 7 00:12:11 irkalla charon: 10[NET] received packet: from 1.1.1.1[4500] to 2.2.2.2[4500] (80 bytes) Jul 7 00:12:11 irkalla charon: 10[ENC] parsed INFORMATIONAL request 7 [ D ] Jul 7 00:12:11 irkalla charon: 10[IKE] received DELETE for IKE_SA iOS-radius[57] Jul 7 00:12:11 irkalla charon: 10[IKE] deleting IKE_SA iOS-radius[57] between 2.2.2.2[some.host.domain]...1.1.1.1[laurens2] Jul 7 00:12:11 irkalla charon: 10[IKE] IKE_SA deleted Jul 7 00:12:11 irkalla charon: 10[CFG] sending RADIUS Accounting-Request to server 'server-a' Jul 7 00:12:11 irkalla ipsec[24225]: 13[ENC] generating IKE_AUTH response 1 [ EF ] Jul 7 00:12:11 irkalla ipsec[24225]: 13[ENC] payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response Jul 7 00:12:11 irkalla ipsec[24225]: 13[ENC] generating IKE_AUTH response 1 [ EF ] Jul 7 00:12:11 irkalla ipsec[24225]: 13[ENC] payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response Jul 7 00:12:11 irkalla ipsec[24225]: 13[ENC] generating IKE_AUTH response 1 [ EF ] Jul 7 00:12:11 irkalla ipsec[24225]: 13[ENC] payload ENCRYPTED_FRAGMENT has no ordering rule in IKE_AUTH response Jul 7 00:12:11 irkalla ipsec[24225]: 13[ENC] generating IKE_AUTH response 1 [ EF ] Jul 7 00:12:11 irkalla ipsec[24225]: 13[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (532 bytes) Jul 7 00:12:11 irkalla ipsec[24225]: 13[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (532 bytes) Jul 7 00:12:11 irkalla ipsec[24225]: 13[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (532 bytes) Jul 7 00:12:11 irkalla ipsec[24225]: 13[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (260 bytes) Jul 7 00:12:11 irkalla ipsec[24225]: 11[NET] received packet: from 1.1.1.1[4500] to 2.2.2.2[4500] (96 bytes) Jul 7 00:12:11 irkalla ipsec[24225]: 11[ENC] parsed IKE_AUTH request 2 [ EAP/RES/ID ] Jul 7 00:12:11 irkalla ipsec[24225]: 11[IKE] received EAP identity 'laurens2' Jul 7 00:12:11 irkalla ipsec[24225]: 11[CFG] sending RADIUS Access-Request to server 'server-a' Jul 7 00:12:11 irkalla ipsec[24225]: 11[CFG] received RADIUS Access-Challenge from server 'server-a' Jul 7 00:12:11 irkalla ipsec[24225]: 11[IKE] initiating EAP_MD5 method (id 0x01) Jul 7 00:12:11 irkalla ipsec[24225]: 11[ENC] generating IKE_AUTH response 2 [ EAP/REQ/MD5 ] Jul 7 00:12:11 irkalla ipsec[24225]: 11[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (96 bytes) Jul 7 00:12:11 irkalla ipsec[24225]: 08[NET] received packet: from 1.1.1.1[4500] to 2.2.2.2[4500] (80 bytes) Jul 7 00:12:11 irkalla ipsec[24225]: 08[ENC] parsed IKE_AUTH request 3 [ EAP/RES/NAK ] Jul 7 00:12:11 irkalla ipsec[24225]: 08[CFG] sending RADIUS Access-Request to server 'server-a' Jul 7 00:12:11 irkalla ipsec[24225]: 08[CFG] received RADIUS Access-Challenge from server 'server-a' Jul 7 00:12:11 irkalla ipsec[24225]: 08[ENC] generating IKE_AUTH response 3 [ EAP/REQ/MSCHAPV2 ] Jul 7 00:12:11 irkalla ipsec[24225]: 08[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (112 bytes) Jul 7 00:12:11 irkalla ipsec[24225]: 06[NET] received packet: from 1.1.1.1[4500] to 2.2.2.2[4500] (144 bytes) Jul 7 00:12:11 irkalla ipsec[24225]: 06[ENC] parsed IKE_AUTH request 4 [ EAP/RES/MSCHAPV2 ] Jul 7 00:12:11 irkalla ipsec[24225]: 06[CFG] sending RADIUS Access-Request to server 'server-a' Jul 7 00:12:11 irkalla ipsec[24225]: 06[CFG] received RADIUS Access-Challenge from server 'server-a' Jul 7 00:12:11 irkalla ipsec[24225]: 06[ENC] generating IKE_AUTH response 4 [ EAP/REQ/MSCHAPV2 ] Jul 7 00:12:11 irkalla ipsec[24225]: 06[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (128 bytes) Jul 7 00:12:11 irkalla charon: 10[CFG] received RADIUS Accounting-Response from server 'server-a' Jul 7 00:12:11 irkalla charon: 10[ENC] generating INFORMATIONAL response 7 [ ] Jul 7 00:12:11 irkalla charon: 10[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (80 bytes) Jul 7 00:12:11 irkalla ipsec[24225]: 09[NET] received packet: from 1.1.1.1[4500] to 2.2.2.2[4500] (80 bytes) Jul 7 00:12:11 irkalla ipsec[24225]: 09[ENC] parsed IKE_AUTH request 5 [ EAP/RES/MSCHAPV2 ] Jul 7 00:12:11 irkalla ipsec[24225]: 09[CFG] sending RADIUS Access-Request to server 'server-a' Jul 7 00:12:11 irkalla ipsec[24225]: 09[CFG] received RADIUS Access-Accept from server 'server-a' Jul 7 00:12:11 irkalla ipsec[24225]: 09[LIB] 5 bytes insufficient to parse 6 bytes of data Jul 7 00:12:11 irkalla ipsec[24225]: 09[IKE] RADIUS authentication of 'laurens2' successful Jul 7 00:12:11 irkalla ipsec[24225]: 09[IKE] EAP method EAP_MSCHAPV2 succeeded, MSK established Jul 7 00:12:11 irkalla ipsec[24225]: 09[ENC] generating IKE_AUTH response 5 [ EAP/SUCC ] Jul 7 00:12:11 irkalla ipsec[24225]: 09[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (80 bytes) Jul 7 00:12:11 irkalla ipsec[24225]: 12[NET] received packet: from 1.1.1.1[4500] to 2.2.2.2[4500] (112 bytes) Jul 7 00:12:11 irkalla ipsec[24225]: 12[ENC] parsed IKE_AUTH request 6 [ AUTH ] Jul 7 00:12:11 irkalla ipsec[24225]: 12[IKE] authentication of 'laurens2' with EAP successful Jul 7 00:12:11 irkalla ipsec[24225]: 12[IKE] authentication of 'some.host.domain' (myself) with EAP Jul 7 00:12:11 irkalla ipsec[24225]: 12[IKE] IKE_SA iOS-radius[57] established between 2.2.2.2[some.host.domain]...1.1.1.1[laurens2] Jul 7 00:12:11 irkalla ipsec[24225]: 12[IKE] scheduling reauthentication in 10013s Jul 7 00:12:11 irkalla ipsec[24225]: 12[IKE] maximum IKE_SA lifetime 10553s Jul 7 00:12:11 irkalla ipsec[24225]: 12[IKE] peer requested virtual IP %any Jul 7 00:12:11 irkalla ipsec[24225]: 12[IKE] assigning virtual IP 10.1.0.17 to peer 'laurens2' Jul 7 00:12:11 irkalla ipsec[24225]: 12[IKE] peer requested virtual IP %any6 Jul 7 00:12:11 irkalla ipsec[24225]: 12[IKE] no virtual IP found for %any6 requested by 'laurens2' Jul 7 00:12:11 irkalla ipsec[24225]: 12[IKE] CHILD_SA iOS-radius{8} established with SPIs c9d32966_i 09b05961_o and TS 0.0.0.0/0 === 10.1.0.17/32 Jul 7 00:12:11 irkalla ipsec[24225]: 12[CFG] scheduling RADIUS Interim-Updates every 300s Jul 7 00:12:11 irkalla ipsec[24225]: 12[CFG] sending RADIUS Accounting-Request to server 'server-a' Jul 7 00:12:11 irkalla ipsec[24225]: 12[CFG] received RADIUS Accounting-Response from server 'server-a' Jul 7 00:12:11 irkalla ipsec[24225]: 12[ENC] generating IKE_AUTH response 6 [ AUTH CPRP(ADDR DNS DNS) SA TSi TSr N(AUTH_LFT) N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) ] Jul 7 00:12:11 irkalla ipsec[24225]: 12[NET] sending packet: from 2.2.2.2[4500] to 1.1.1.1[4500] (288 bytes) Jul 7 00:12:11 irkalla ipsec[24225]: 10[NET] received packet: from 1.1.1.1[4500] to 2.2.2.2[4500] (80 bytes) Jul 7 00:12:11 irkalla ipsec[24225]: 10[ENC] parsed INFORMATIONAL request 7 [ D ] Jul 7 00:12:11 irkalla ipsec[24225]: 10[IKE] received DELETE for IKE_SA iOS-radius[57] Jul 7 00:12:11 irkalla ipsec[24225]: 10[IKE] deleting IKE_SA iOS-radius[57] between 2.2.2.2[some.host.domain]...1.1.1.1[laurens2] Jul 7 00:12:11 irkalla ipsec[24225]: 10[IKE] IKE_SA deleted