Nov 25 10:30:18 srv systemd[1]: Starting strongSwan IPsec IKEv1/IKEv2 daemon using ipsec.conf... Nov 25 10:30:18 srv systemd[1]: Started strongSwan IPsec IKEv1/IKEv2 daemon using ipsec.conf. Nov 25 10:30:18 srv ipsec[44236]: Starting weakSwan 5.5.1 IPsec [starter]... Nov 25 10:30:18 srv charon: 00[DMN] Starting IKE charon daemon (strongSwan 5.5.1, Linux 3.16.0-4-amd64, x86_64) Nov 25 10:30:18 srv charon: 00[CFG] loaded legacy entry attribute INTERNAL_IP4_DNS: 08:08:08:08 Nov 25 10:30:18 srv charon: 00[CFG] loaded legacy entry attribute INTERNAL_IP4_DNS: 08:08:04:04 Nov 25 10:30:18 srv charon: 00[KNL] known interfaces and IP addresses: Nov 25 10:30:18 srv charon: 00[KNL] lo Nov 25 10:30:18 srv charon: 00[KNL] 127.0.0.1 Nov 25 10:30:18 srv charon: 00[KNL] ::1 Nov 25 10:30:18 srv charon: 00[KNL] eth0 Nov 25 10:30:18 srv charon: 00[KNL] 138.201.84.186 Nov 25 10:30:18 srv charon: 00[KNL] 192.168.50.1 Nov 25 10:30:18 srv charon: 00[KNL] fe80::250:56ff:fe00:13bc Nov 25 10:30:18 srv charon: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts' Nov 25 10:30:18 srv charon: 00[CFG] loaded ca certificate "C=CH, O=strongSwan, CN=strongSwan Root CA" from '/etc/ipsec.d/cacerts/strongswanCert.pem' Nov 25 10:30:18 srv charon: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts' Nov 25 10:30:18 srv charon: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts' Nov 25 10:30:18 srv charon: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts' Nov 25 10:30:18 srv charon: 00[CFG] loading crls from '/etc/ipsec.d/crls' Nov 25 10:30:18 srv charon: 00[CFG] loading secrets from '/etc/ipsec.secrets' Nov 25 10:30:18 srv charon: 00[CFG] loaded IKE secret for %any Nov 25 10:30:18 srv charon: 00[LIB] loaded plugins: charon test-vectors ldap pkcs11 aesni aes rc2 sha2 sha1 md5 rdrand random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl gcrypt af-alg fips-prf gmp agent xcbc cmac hmac ctr ccm gcm curl attr kernel-netlink resolve socket-default connmark stroke updown Nov 25 10:30:18 srv charon: 00[LIB] dropped capabilities, running as uid 0, gid 0 Nov 25 10:30:18 srv charon: 00[JOB] spawning 16 worker threads Nov 25 10:30:18 srv charon: 03[NET] waiting for data on sockets Nov 25 10:30:18 srv ipsec[44236]: charon (44263) started after 60 ms Nov 25 10:30:18 srv charon: 05[CFG] received stroke: add connection 'fritz2swan' Nov 25 10:30:18 srv charon: 05[CFG] conn fritz2swan Nov 25 10:30:18 srv charon: 05[CFG] left=srv.strongswan Nov 25 10:30:18 srv charon: 05[CFG] leftsubnet=192.168.50.0/24 Nov 25 10:30:18 srv charon: 05[CFG] leftauth=psk Nov 25 10:30:18 srv charon: 05[CFG] right=dyn.fritzbox Nov 25 10:30:18 srv charon: 05[CFG] rightsubnet=192.168.1.0/24 Nov 25 10:30:18 srv charon: 05[CFG] rightauth=psk Nov 25 10:30:18 srv charon: 05[CFG] rightid=@dyn.fritzbox Nov 25 10:30:18 srv charon: 05[CFG] ike=aes128-sha-modp1024 Nov 25 10:30:18 srv charon: 05[CFG] esp=aes128-sha1 Nov 25 10:30:18 srv charon: 05[CFG] dpddelay=30 Nov 25 10:30:18 srv charon: 05[CFG] dpdtimeout=150 Nov 25 10:30:18 srv charon: 05[CFG] mediation=no Nov 25 10:30:18 srv charon: 05[KNL] 77.13.29.160 is not a local address or the interface is down Nov 25 10:30:18 srv charon: 05[KNL] 127.0.1.1 is not a local address or the interface is down Nov 25 10:30:18 srv charon: 05[CFG] left nor right host is our side, assuming left=local Nov 25 10:30:18 srv charon: 05[CFG] added configuration 'fritz2swan' Nov 25 10:30:59 srv charon: 07[CFG] received stroke: initiate 'fritz2swan' Nov 25 10:30:59 srv charon: 09[IKE] queueing IKE_VENDOR task Nov 25 10:30:59 srv charon: 09[IKE] queueing IKE_INIT task Nov 25 10:30:59 srv charon: 09[IKE] queueing IKE_NATD task Nov 25 10:30:59 srv charon: 09[IKE] queueing IKE_CERT_PRE task Nov 25 10:30:59 srv charon: 09[IKE] queueing IKE_AUTH task Nov 25 10:30:59 srv charon: 09[IKE] queueing IKE_CERT_POST task Nov 25 10:30:59 srv charon: 09[IKE] queueing IKE_CONFIG task Nov 25 10:30:59 srv charon: 09[IKE] queueing IKE_AUTH_LIFETIME task Nov 25 10:30:59 srv charon: 09[IKE] queueing IKE_MOBIKE task Nov 25 10:30:59 srv charon: 09[IKE] queueing CHILD_CREATE task Nov 25 10:30:59 srv charon: 09[IKE] activating new tasks Nov 25 10:30:59 srv charon: 09[IKE] activating IKE_VENDOR task Nov 25 10:30:59 srv charon: 09[IKE] activating IKE_INIT task Nov 25 10:30:59 srv charon: 09[IKE] activating IKE_NATD task Nov 25 10:30:59 srv charon: 09[IKE] activating IKE_CERT_PRE task Nov 25 10:30:59 srv charon: 09[IKE] activating IKE_AUTH task Nov 25 10:30:59 srv charon: 09[IKE] activating IKE_CERT_POST task Nov 25 10:30:59 srv charon: 09[IKE] activating IKE_CONFIG task Nov 25 10:30:59 srv charon: 09[IKE] activating CHILD_CREATE task Nov 25 10:30:59 srv charon: 09[IKE] activating IKE_AUTH_LIFETIME task Nov 25 10:30:59 srv charon: 09[IKE] activating IKE_MOBIKE task Nov 25 10:30:59 srv charon: 09[IKE] initiating IKE_SA fritz2swan[1] to 77.13.29.160 Nov 25 10:30:59 srv charon: 09[IKE] IKE_SA fritz2swan[1] state change: CREATED => CONNECTING Nov 25 10:30:59 srv charon: 09[CFG] configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/AES_CTR_128/AES_CTR_192/AES_CTR_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/CAMELLIA_CTR_128/CAMELLIA_CTR_192/CAMELLIA_CTR_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/AES_XCBC_96/AES_CMAC_96/HMAC_MD5_96/HMAC_SHA1_96/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_2048_256/MODP_1024, IKE:AES_CCM_16_128/AES_CCM_16_192/AES_CCM_16_256/AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/CAMELLIA_CCM_16_128/CAMELLIA_CCM_16_192/CAMELLIA_CCM_16_256/AES_CCM_8_128/AES_CCM_8_192/AES_CCM_8_256/AES_CCM_12_128/AES_CCM_12_192/AES_CCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/CAMELLIA_CCM_8_128/CAMELLIA_CCM_8_192/CAMELLIA_CCM_8_256/CAMELLIA_CCM_12_128/CAMELLIA_CCM_12_192/CAMELLIA_CCM_12_256/PRF_AES128_XCBC/PRF_AES128_CMAC/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_HMAC_MD5/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_8192/MODP_2048/MODP_2048_256/MODP_1024 Nov 25 10:30:59 srv charon: 09[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ] Nov 25 10:30:59 srv ipsec[44236]: 00[DMN] Starting IKE charon daemon (strongSwan 5.5.1, Linux 3.16.0-4-amd64, x86_64) Nov 25 10:30:59 srv ipsec[44236]: 00[CFG] loaded legacy entry attribute INTERNAL_IP4_DNS: 08:08:08:08 Nov 25 10:30:59 srv ipsec[44236]: 00[CFG] loaded legacy entry attribute INTERNAL_IP4_DNS: 08:08:04:04 Nov 25 10:30:59 srv ipsec[44236]: 00[KNL] known interfaces and IP addresses: Nov 25 10:30:59 srv ipsec[44236]: 00[KNL] lo Nov 25 10:30:59 srv ipsec[44236]: 00[KNL] 127.0.0.1 Nov 25 10:30:59 srv ipsec[44236]: 00[KNL] ::1 Nov 25 10:30:59 srv ipsec[44236]: 00[KNL] eth0 Nov 25 10:30:59 srv ipsec[44236]: 00[KNL] 138.201.84.186 Nov 25 10:30:59 srv ipsec[44236]: 00[KNL] 192.168.50.1 Nov 25 10:30:59 srv ipsec[44236]: 00[KNL] fe80::250:56ff:fe00:13bc Nov 25 10:30:59 srv ipsec[44236]: 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts' Nov 25 10:30:59 srv ipsec[44236]: 00[CFG] loaded ca certificate "C=CH, O=strongSwan, CN=strongSwan Root CA" from '/etc/ipsec.d/cacerts/strongswanCert.pem' Nov 25 10:30:59 srv ipsec[44236]: 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts' Nov 25 10:30:59 srv ipsec[44236]: 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts' Nov 25 10:30:59 srv ipsec[44236]: 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts' Nov 25 10:30:59 srv ipsec[44236]: 00[CFG] loading crls from '/etc/ipsec.d/crls' Nov 25 10:30:59 srv ipsec[44236]: 00[CFG] loading secrets from '/etc/ipsec.secrets' Nov 25 10:30:59 srv ipsec[44236]: 00[CFG] loaded IKE secret for %any Nov 25 10:30:59 srv ipsec[44236]: 00[LIB] loaded plugins: charon test-vectors ldap pkcs11 aesni aes rc2 sha2 sha1 md5 rdrand random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl gcrypt af-alg fips-prf gmp agent xcbc cmac hmac ctr ccm gcm curl attr kernel-netlink resolve socket-default connmark stroke updown Nov 25 10:30:59 srv ipsec[44236]: 00[LIB] dropped capabilities, running as uid 0, gid 0 Nov 25 10:30:59 srv ipsec[44236]: 00[JOB] spawning 16 worker threads Nov 25 10:30:59 srv ipsec[44236]: 03[NET] waiting for data on sockets Nov 25 10:30:59 srv ipsec[44236]: 05[CFG] received stroke: add connection 'fritz2swan' Nov 25 10:30:59 srv ipsec[44236]: 05[CFG] conn fritz2swan Nov 25 10:30:59 srv ipsec[44236]: 05[CFG] left=srv.strongswan Nov 25 10:30:59 srv ipsec[44236]: 05[CFG] leftsubnet=192.168.50.0/24 Nov 25 10:30:59 srv ipsec[44236]: 05[CFG] leftauth=psk Nov 25 10:30:59 srv ipsec[44236]: 05[CFG] right=dyn.fritzbox Nov 25 10:30:59 srv ipsec[44236]: 05[CFG] rightsubnet=192.168.1.0/24 Nov 25 10:30:59 srv ipsec[44236]: 05[CFG] rightauth=psk Nov 25 10:30:59 srv ipsec[44236]: 05[CFG] rightid=@dyn.fritzbox Nov 25 10:30:59 srv ipsec[44236]: 05[CFG] ike=aes128-sha-modp1024 Nov 25 10:30:59 srv ipsec[44236]: 05[CFG] esp=aes128-sha1 Nov 25 10:30:59 srv ipsec[44236]: 05[CFG] dpddelay=30 Nov 25 10:30:59 srv ipsec[44236]: 05[CFG] dpdtimeout=150 Nov 25 10:30:59 srv ipsec[44236]: 05[CFG] mediation=no Nov 25 10:30:59 srv ipsec[44236]: 05[KNL] 77.13.29.160 is not a local address or the interface is down Nov 25 10:30:59 srv charon: 09[NET] sending packet: from 127.0.1.1[500] to 77.13.29.160[500] (1188 bytes) Nov 25 10:30:59 srv charon: 04[NET] sending packet: from 127.0.1.1[500] to 77.13.29.160[500] Nov 25 10:30:59 srv charon: 04[NET] error writing to socket: Invalid argument Nov 25 10:30:59 srv ipsec[44236]: 05[KNL] 127.0.1.1 is not a local address or the interface is down Nov 25 10:30:59 srv ipsec[44236]: 05[CFG] left nor right host is our side, assuming left=local Nov 25 10:30:59 srv ipsec[44236]: 05[CFG] added configuration 'fritz2swan' Nov 25 10:30:59 srv ipsec[44236]: 07[CFG] received stroke: initiate 'fritz2swan' Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] queueing IKE_VENDOR task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] queueing IKE_INIT task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] queueing IKE_NATD task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] queueing IKE_CERT_PRE task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] queueing IKE_AUTH task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] queueing IKE_CERT_POST task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] queueing IKE_CONFIG task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] queueing IKE_AUTH_LIFETIME task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] queueing IKE_MOBIKE task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] queueing CHILD_CREATE task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] activating new tasks Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] activating IKE_VENDOR task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] activating IKE_INIT task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] activating IKE_NATD task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] activating IKE_CERT_PRE task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] activating IKE_AUTH task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] activating IKE_CERT_POST task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] activating IKE_CONFIG task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] activating CHILD_CREATE task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] activating IKE_AUTH_LIFETIME task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] activating IKE_MOBIKE task Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] initiating IKE_SA fritz2swan[1] to 77.13.29.160 Nov 25 10:30:59 srv ipsec[44236]: 09[IKE] IKE_SA fritz2swan[1] state change: CREATED => CONNECTING Nov 25 10:31:03 srv charon: 10[IKE] retransmit 1 of request with message ID 0 Nov 25 10:31:03 srv charon: 10[NET] sending packet: from 127.0.1.1[500] to 77.13.29.160[500] (1188 bytes) Nov 25 10:31:03 srv charon: 04[NET] sending packet: from 127.0.1.1[500] to 77.13.29.160[500] Nov 25 10:31:03 srv charon: 04[NET] error writing to socket: Invalid argument