<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content="text/html; charset=utf-8" http-equiv=Content-Type>
<STYLE>
BLOCKQUOTE {
MARGIN-BOTTOM: 0px; MARGIN-TOP: 0px; MARGIN-LEFT: 2em
}
OL {
MARGIN-BOTTOM: 0px; MARGIN-TOP: 0px
}
UL {
MARGIN-BOTTOM: 0px; MARGIN-TOP: 0px
}
P {
MARGIN-BOTTOM: 0px; MARGIN-TOP: 0px
}
DIV.FoxDiv20180113134837720356 {
FONT-SIZE: 10.5pt; FONT-FAMILY: 宋体; COLOR: #000080; MARGIN: 10px; LINE-HEIGHT: 1.5
}
BODY {
FONT-SIZE: 10.5pt; FONT-FAMILY: 宋体; COLOR: #000080; LINE-HEIGHT: 1.5
}
</STYLE>
<META name=GENERATOR content="MSHTML 11.00.10570.1001">
<STYLE>BLOCKQUOTE {
MARGIN-TOP: 0px
}
OL {
MARGIN-TOP: 0px
}
UL {
MARGIN-TOP: 0px
}
</STYLE>
</HEAD>
<BODY style="MARGIN: 10px">
<DIV>iPAD reconnect failed too. I have to restart ipsec to reconnect
strongswan.</DIV>
<DIV>Look like it's XAuth-PSK problem. But I can not find what's wrong with
it.</DIV>
<DIV> </DIV>
<DIV>
<DIV>conn XAuth-PSK</DIV>
<DIV> keyexchange=ikev1</DIV>
<DIV> ike=aes128-sha1-modp1024</DIV>
<DIV> esp=aes128-sha1</DIV>
<DIV> left=%any</DIV>
<DIV> leftauth=psk</DIV>
<DIV> leftsubnet=0.0.0.0/0</DIV>
<DIV> #leftfirewall=yes</DIV>
<DIV> right=%any</DIV>
<DIV> rightauth=psk</DIV>
<DIV> rightauth2=xauth</DIV>
<DIV> #rightauth2=xauth-radius | xauth-generic | xauth-pam | xauth-eap</DIV>
<DIV> rightsourceip=172.31.254.0/24</DIV>
<DIV> auto=add</DIV></DIV>
<DIV> </DIV>
<DIV>
<DIV>Jan 13 13:46:57 14[NET] <4> received packet: from 117.100.110.176[500] to 172.31.2.1[500] (848 bytes)</DIV>
<DIV>Jan 13 13:46:57 14[ENC] <4> parsed ID_PROT request 0 [ SA V V V V V V V V V V V V V V ]</DIV>
<DIV>Jan 13 13:46:57 14[IKE] <4> received NAT-T (RFC 3947) vendor ID</DIV>
<DIV>Jan 13 13:46:57 14[IKE] <4> received draft-ietf-ipsec-nat-t-ike vendor ID</DIV>
<DIV>Jan 13 13:46:57 14[IKE] <4> received draft-ietf-ipsec-nat-t-ike-08 vendor ID</DIV>
<DIV>Jan 13 13:46:57 14[IKE] <4> received draft-ietf-ipsec-nat-t-ike-07 vendor ID</DIV>
<DIV>Jan 13 13:46:57 14[IKE] <4> received draft-ietf-ipsec-nat-t-ike-06 vendor ID</DIV>
<DIV>Jan 13 13:46:57 14[IKE] <4> received draft-ietf-ipsec-nat-t-ike-05 vendor ID</DIV>
<DIV>Jan 13 13:46:57 14[IKE] <4> received draft-ietf-ipsec-nat-t-ike-04 vendor ID</DIV>
<DIV>Jan 13 13:46:57 14[IKE] <4> received draft-ietf-ipsec-nat-t-ike-03 vendor ID</DIV>
<DIV>Jan 13 13:46:57 14[IKE] <4> received draft-ietf-ipsec-nat-t-ike-02 vendor ID</DIV>
<DIV>Jan 13 13:46:57 14[IKE] <4> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID</DIV>
<DIV>Jan 13 13:46:57 14[IKE] <4> received XAuth vendor ID</DIV>
<DIV>Jan 13 13:46:57 14[IKE] <4> received Cisco Unity vendor ID</DIV>
<DIV>Jan 13 13:46:57 14[IKE] <4> received FRAGMENTATION vendor ID</DIV>
<DIV>Jan 13 13:46:57 14[IKE] <4> received DPD vendor ID</DIV>
<DIV>Jan 13 13:46:57 14[IKE] <4> 117.100.110.176 is initiating a Main Mode IKE_SA</DIV>
<DIV>Jan 13 13:46:57 14[ENC] <4> generating ID_PROT response 0 [ SA V V V V ]</DIV>
<DIV>Jan 13 13:46:57 14[NET] <4> sending packet: from 172.31.2.1[500] to 117.100.110.176[500] (160 bytes)</DIV>
<DIV>Jan 13 13:46:57 11[NET] <4> received packet: from 117.100.110.176[500] to 172.31.2.1[500] (228 bytes)</DIV>
<DIV>Jan 13 13:46:57 11[ENC] <4> parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]</DIV>
<DIV>Jan 13 13:46:57 11[IKE] <4> local host is behind NAT, sending keep alives</DIV>
<DIV>Jan 13 13:46:57 11[IKE] <4> remote host is behind NAT</DIV>
<DIV>Jan 13 13:46:57 11[ENC] <4> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]</DIV>
<DIV>Jan 13 13:46:57 11[NET] <4> sending packet: from 172.31.2.1[500] to 117.100.110.176[500] (244 bytes)</DIV>
<DIV>Jan 13 13:46:57 13[NET] <4> received packet: from 117.100.110.176[4500] to 172.31.2.1[4500] (108 bytes)</DIV>
<DIV>Jan 13 13:46:57 13[ENC] <4> parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]</DIV>
<DIV>Jan 13 13:46:57 13[CFG] <4> looking for XAuthInitPSK peer configs matching 172.31.2.1...117.100.110.176[192.168.99.107]</DIV>
<DIV>Jan 13 13:46:57 13[CFG] <4> selected peer config "XAuth-PSK"</DIV>
<DIV>Jan 13 13:46:57 13[ENC] <XAuth-PSK|4> generating ID_PROT response 0 [ ID HASH ]</DIV>
<DIV>Jan 13 13:46:57 13[NET] <XAuth-PSK|4> sending packet: from 172.31.2.1[4500] to 117.100.110.176[4500] (76 bytes)</DIV>
<DIV>Jan 13 13:46:57 13[ENC] <XAuth-PSK|4> generating TRANSACTION request 3115154972 [ HASH CPRQ(X_USER X_PWD) ]</DIV>
<DIV>Jan 13 13:46:57 13[NET] <XAuth-PSK|4> sending packet: from 172.31.2.1[4500] to 117.100.110.176[4500] (76 bytes)</DIV>
<DIV>Jan 13 13:46:57 04[NET] <XAuth-PSK|4> received packet: from 117.100.110.176[4500] to 172.31.2.1[4500] (92 bytes)</DIV>
<DIV>Jan 13 13:46:57 04[ENC] <XAuth-PSK|4> parsed TRANSACTION response 3115154972 [ HASH CPRP(X_USER X_PWD) ]</DIV>
<DIV>Jan 13 13:46:57 04[CFG] <XAuth-PSK|4> sending RADIUS Access-Request to server '127.0.0.1'</DIV>
<DIV>Jan 13 13:46:57 04[CFG] <XAuth-PSK|4> received RADIUS Access-Accept from server '127.0.0.1'</DIV>
<DIV>Jan 13 13:46:57 04[IKE] <XAuth-PSK|4> XAuth authentication of 'vpnuser1' successful</DIV>
<DIV>Jan 13 13:46:57 04[ENC] <XAuth-PSK|4> generating TRANSACTION request 378112585 [ HASH CPS(X_STATUS) ]</DIV>
<DIV>Jan 13 13:46:57 04[NET] <XAuth-PSK|4> sending packet: from 172.31.2.1[4500] to 117.100.110.176[4500] (76 bytes)</DIV>
<DIV>Jan 13 13:46:57 15[NET] <XAuth-PSK|4> received packet: from 117.100.110.176[4500] to 172.31.2.1[4500] (76 bytes)</DIV>
<DIV>Jan 13 13:46:57 15[ENC] <XAuth-PSK|4> parsed TRANSACTION response 378112585 [ HASH CPA(X_STATUS) ]</DIV>
<DIV>Jan 13 13:46:57 15[IKE] <XAuth-PSK|4> IKE_SA XAuth-PSK[4] established between 172.31.2.1[172.31.2.1]...117.100.110.176[192.168.99.107]</DIV>
<DIV>Jan 13 13:46:57 15[IKE] <XAuth-PSK|4> scheduling reauthentication in 9735s</DIV>
<DIV>Jan 13 13:46:57 15[IKE] <XAuth-PSK|4> maximum IKE_SA lifetime 10275s</DIV>
<DIV>Jan 13 13:46:57 07[NET] <XAuth-PSK|4> received packet: from 117.100.110.176[4500] to 172.31.2.1[4500] (172 bytes)</DIV>
<DIV>Jan 13 13:46:57 07[ENC] <XAuth-PSK|4> unknown attribute type (28683)</DIV>
<DIV>Jan 13 13:46:57 07[ENC] <XAuth-PSK|4> parsed TRANSACTION request 886397053 [ HASH CPRQ(ADDR MASK DNS NBNS EXP VER U_BANNER U_DEFDOM U_SPLITDNS U_SPLITINC U_LOCALLAN U_PFS U_SAVEPWD U_FWTYPE U_BKPSRV (28683)) ]</DIV>
<DIV>Jan 13 13:46:57 07[IKE] <XAuth-PSK|4> peer requested virtual IP %any</DIV>
<DIV>Jan 13 13:46:57 07[CFG] <XAuth-PSK|4> assigning new lease to 'vpnuser1'</DIV>
<DIV>Jan 13 13:46:57 07[IKE] <XAuth-PSK|4> assigning virtual IP 172.31.254.1 to peer 'vpnuser1'</DIV>
<DIV>Jan 13 13:46:57 07[ENC] <XAuth-PSK|4> generating TRANSACTION response 886397053 [ HASH CPRP(ADDR DNS NBNS DNS NBNS) ]</DIV>
<DIV>Jan 13 13:46:57 07[NET] <XAuth-PSK|4> sending packet: from 172.31.2.1[4500] to 117.100.110.176[4500] (108 bytes)</DIV>
<DIV>Jan 13 13:46:57 08[NET] <XAuth-PSK|4> received packet: from 117.100.110.176[4500] to 172.31.2.1[4500] (300 bytes)</DIV>
<DIV>Jan 13 13:46:57 08[ENC] <XAuth-PSK|4> parsed QUICK_MODE request 2287426173 [ HASH SA No ID ID ]</DIV>
<DIV>Jan 13 13:46:57 08[ENC] <XAuth-PSK|4> generating QUICK_MODE response 2287426173 [ HASH SA No ID ID ]</DIV>
<DIV>Jan 13 13:46:57 08[NET] <XAuth-PSK|4> sending packet: from 172.31.2.1[4500] to 117.100.110.176[4500] (172 bytes)</DIV>
<DIV>Jan 13 13:46:58 05[NET] <XAuth-PSK|4> received packet: from 117.100.110.176[4500] to 172.31.2.1[4500] (60 bytes)</DIV>
<DIV>Jan 13 13:46:58 05[ENC] <XAuth-PSK|4> parsed QUICK_MODE request 2287426173 [ HASH ]</DIV>
<DIV>Jan 13 13:46:58 05[IKE] <XAuth-PSK|4> CHILD_SA XAuth-PSK{6} established with SPIs c35fb921_i 05425748_o and TS 0.0.0.0/0 === 172.31.254.1/32</DIV></DIV>
<DIV> </DIV>
<DIV>
<DIV>Jan 13 13:47:30 04[NET] <XAuth-PSK|4> received packet: from 117.100.110.176[4500] to 172.31.2.1[4500] (76 bytes)</DIV>
<DIV>Jan 13 13:47:30 04[ENC] <XAuth-PSK|4> parsed INFORMATIONAL_V1 request 1864473843 [ HASH D ]</DIV>
<DIV>Jan 13 13:47:30 04[IKE] <XAuth-PSK|4> received DELETE for ESP CHILD_SA with SPI 05425748</DIV>
<DIV>Jan 13 13:47:30 04[IKE] <XAuth-PSK|4> closing CHILD_SA XAuth-PSK{6} with SPIs c35fb921_i (23737 bytes) 05425748_o (104122 bytes) and TS 0.0.0.0/0 === 172.31.254.1/32</DIV>
<DIV>Jan 13 13:47:30 06[NET] <XAuth-PSK|4> received packet: from 117.100.110.176[4500] to 172.31.2.1[4500] (92 bytes)</DIV>
<DIV>Jan 13 13:47:30 06[ENC] <XAuth-PSK|4> parsed INFORMATIONAL_V1 request 2931757554 [ HASH D ]</DIV>
<DIV>Jan 13 13:47:30 06[IKE] <XAuth-PSK|4> received DELETE for IKE_SA XAuth-PSK[4]</DIV>
<DIV>Jan 13 13:47:30 06[IKE] <XAuth-PSK|4> deleting IKE_SA XAuth-PSK[4] between 172.31.2.1[172.31.2.1]...117.100.110.176[192.168.99.107]</DIV>
<DIV>Jan 13 13:47:30 06[CFG] <XAuth-PSK|4> lease 172.31.254.1 by 'vpnuser1' went offline</DIV></DIV>
<DIV> </DIV>
<DIV>
<DIV>Jan 13 13:47:53 08[NET] <5> received packet: from 117.100.110.176[500] to 172.31.2.1[500] (848 bytes)</DIV>
<DIV>Jan 13 13:47:53 08[ENC] <5> parsed ID_PROT request 0 [ SA V V V V V V V V V V V V V V ]</DIV>
<DIV>Jan 13 13:47:53 08[IKE] <5> received NAT-T (RFC 3947) vendor ID</DIV>
<DIV>Jan 13 13:47:53 08[IKE] <5> received draft-ietf-ipsec-nat-t-ike vendor ID</DIV>
<DIV>Jan 13 13:47:53 08[IKE] <5> received draft-ietf-ipsec-nat-t-ike-08 vendor ID</DIV>
<DIV>Jan 13 13:47:53 08[IKE] <5> received draft-ietf-ipsec-nat-t-ike-07 vendor ID</DIV>
<DIV>Jan 13 13:47:53 08[IKE] <5> received draft-ietf-ipsec-nat-t-ike-06 vendor ID</DIV>
<DIV>Jan 13 13:47:53 08[IKE] <5> received draft-ietf-ipsec-nat-t-ike-05 vendor ID</DIV>
<DIV>Jan 13 13:47:53 08[IKE] <5> received draft-ietf-ipsec-nat-t-ike-04 vendor ID</DIV>
<DIV>Jan 13 13:47:53 08[IKE] <5> received draft-ietf-ipsec-nat-t-ike-03 vendor ID</DIV>
<DIV>Jan 13 13:47:53 08[IKE] <5> received draft-ietf-ipsec-nat-t-ike-02 vendor ID</DIV>
<DIV>Jan 13 13:47:53 08[IKE] <5> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID</DIV>
<DIV>Jan 13 13:47:53 08[IKE] <5> received XAuth vendor ID</DIV>
<DIV>Jan 13 13:47:53 08[IKE] <5> received Cisco Unity vendor ID</DIV>
<DIV>Jan 13 13:47:53 08[IKE] <5> received FRAGMENTATION vendor ID</DIV>
<DIV>Jan 13 13:47:53 08[IKE] <5> received DPD vendor ID</DIV>
<DIV>Jan 13 13:47:53 08[IKE] <5> 117.100.110.176 is initiating a Main Mode IKE_SA</DIV>
<DIV>Jan 13 13:47:53 08[ENC] <5> generating ID_PROT response 0 [ SA V V V V ]</DIV>
<DIV>Jan 13 13:47:53 08[NET] <5> sending packet: from 172.31.2.1[500] to 117.100.110.176[500] (160 bytes)</DIV>
<DIV>Jan 13 13:47:53 05[NET] <5> received packet: from 117.100.110.176[500] to 172.31.2.1[500] (228 bytes)</DIV>
<DIV>Jan 13 13:47:53 05[ENC] <5> parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]</DIV>
<DIV>Jan 13 13:47:53 05[IKE] <5> local host is behind NAT, sending keep alives</DIV>
<DIV>Jan 13 13:47:53 05[IKE] <5> remote host is behind NAT</DIV>
<DIV>Jan 13 13:47:53 05[ENC] <5> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]</DIV>
<DIV>Jan 13 13:47:53 05[NET] <5> sending packet: from 172.31.2.1[500] to 117.100.110.176[500] (244 bytes)</DIV>
<DIV>Jan 13 13:47:53 10[NET] <5> received packet: from 117.100.110.176[4500] to 172.31.2.1[4500] (108 bytes)</DIV>
<DIV>Jan 13 13:47:53 10[ENC] <5> invalid ID_V1 payload length, decryption failed?</DIV>
<DIV>Jan 13 13:47:53 10[ENC] <5> could not decrypt payloads</DIV>
<DIV>Jan 13 13:47:53 10[IKE] <5> message parsing failed</DIV>
<DIV>Jan 13 13:47:53 10[ENC] <5> generating INFORMATIONAL_V1 request 3269063338 [ HASH N(PLD_MAL) ]</DIV>
<DIV>Jan 13 13:47:53 10[NET] <5> sending packet: from 172.31.2.1[500] to 117.100.110.176[500] (76 bytes)</DIV>
<DIV>Jan 13 13:47:53 10[IKE] <5> ID_PROT request with message ID 0 processing failed</DIV>
<DIV>Jan 13 13:47:57 12[NET] <5> received packet: from 117.100.110.176[4500] to 172.31.2.1[4500] (108 bytes)</DIV>
<DIV>Jan 13 13:47:57 12[ENC] <5> invalid ID_V1 payload length, decryption failed?</DIV>
<DIV>Jan 13 13:47:57 12[ENC] <5> could not decrypt payloads</DIV>
<DIV>Jan 13 13:47:57 12[IKE] <5> message parsing failed</DIV></DIV>
<DIV> </DIV>
<DIV> </DIV>
<HR style="HEIGHT: 1px; WIDTH: 210px" align=left color=#b5c4df SIZE=1>
<DIV><SPAN>JWD</SPAN></DIV>
<DIV> </DIV>
<DIV
style="BORDER-TOP: #b5c4df 1pt solid; BORDER-RIGHT: medium none; BORDER-BOTTOM: medium none; PADDING-BOTTOM: 0cm; PADDING-TOP: 3pt; PADDING-LEFT: 0cm; BORDER-LEFT: medium none; PADDING-RIGHT: 0cm">
<DIV
style="FONT-SIZE: 12px; BACKGROUND: #efefef; COLOR: #000000; PADDING-BOTTOM: 8px; PADDING-TOP: 8px; PADDING-LEFT: 8px; PADDING-RIGHT: 8px">
<DIV><B>From:</B> <A href="mailto:j-wd@163.com">JWD</A></DIV>
<DIV><B>Date:</B> 2018-01-12 09:20</DIV>
<DIV><B>To:</B> <A
href="mailto:noel.kuntze+strongswan-users-ml@thermi.consulting">Noel Kuntze</A>;
<A href="mailto:users@lists.strongswan.org">users</A></DIV>
<DIV><B>Subject:</B> Re: [strongSwan] Reconnect failed with android
phone</DIV></DIV></DIV>
<DIV>
<DIV class=FoxDiv20180113134837720356>
<STYLE>BLOCKQUOTE {
MARGIN-BOTTOM: 0px; MARGIN-TOP: 0px; MARGIN-LEFT: 2em
}
OL {
MARGIN-BOTTOM: 0px; MARGIN-TOP: 0px
}
UL {
MARGIN-BOTTOM: 0px; MARGIN-TOP: 0px
}
P {
MARGIN-BOTTOM: 0px; MARGIN-TOP: 0px
}
</STYLE>
<META name=GENERATOR content="MSHTML 11.00.10570.1001">
<DIV>Nothing logged when android disconnect. Android does not
send any message to strongswan.</DIV>
<DIV>EAP-MSCHAPv2 works find on my PC.</DIV>
<DIV> </DIV>
<DIV>
<DIV>Jan 12 09:07:20 03[NET] <4> received packet: from 223.104.3.235[26141] to 172.31.2.1[500] (476 bytes)</DIV>
<DIV>Jan 12 09:07:20 03[ENC] <4> parsed ID_PROT request 0 [ SA V V V V V V V V ]</DIV>
<DIV>Jan 12 09:07:20 03[IKE] <4> received NAT-T (RFC 3947) vendor ID</DIV>
<DIV>Jan 12 09:07:20 03[IKE] <4> received draft-ietf-ipsec-nat-t-ike-02 vendor ID</DIV>
<DIV>Jan 12 09:07:20 03[IKE] <4> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID</DIV>
<DIV>Jan 12 09:07:20 03[IKE] <4> received draft-ietf-ipsec-nat-t-ike-00 vendor ID</DIV>
<DIV>Jan 12 09:07:20 03[IKE] <4> received XAuth vendor ID</DIV>
<DIV>Jan 12 09:07:20 03[IKE] <4> received Cisco Unity vendor ID</DIV>
<DIV>Jan 12 09:07:20 03[IKE] <4> received FRAGMENTATION vendor ID</DIV>
<DIV>Jan 12 09:07:20 03[IKE] <4> received DPD vendor ID</DIV>
<DIV>Jan 12 09:07:20 03[IKE] <4> 223.104.3.235 is initiating a Main Mode IKE_SA</DIV>
<DIV>Jan 12 09:07:20 03[ENC] <4> generating ID_PROT response 0 [ SA V V V V ]</DIV>
<DIV>Jan 12 09:07:20 03[NET] <4> sending packet: from 172.31.2.1[500] to 223.104.3.235[26141] (160 bytes)</DIV>
<DIV>Jan 12 09:07:20 12[NET] <4> received packet: from 223.104.3.235[26141] to 172.31.2.1[500] (228 bytes)</DIV>
<DIV>Jan 12 09:07:20 12[ENC] <4> parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]</DIV>
<DIV>Jan 12 09:07:20 12[IKE] <4> local host is behind NAT, sending keep alives</DIV>
<DIV>Jan 12 09:07:20 12[IKE] <4> remote host is behind NAT</DIV>
<DIV>Jan 12 09:07:20 12[ENC] <4> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]</DIV>
<DIV>Jan 12 09:07:20 12[NET] <4> sending packet: from 172.31.2.1[500] to 223.104.3.235[26141] (244 bytes)</DIV>
<DIV>Jan 12 09:07:20 16[NET] <4> received packet: from 223.104.3.235[21528] to 172.31.2.1[4500] (92 bytes)</DIV>
<DIV>Jan 12 09:07:20 16[ENC] <4> parsed ID_PROT request 0 [ ID HASH ]</DIV>
<DIV>Jan 12 09:07:20 16[CFG] <4> looking for XAuthInitPSK peer configs matching 172.31.2.1...223.104.3.235[10.58.28.34]</DIV>
<DIV>Jan 12 09:07:20 16[CFG] <4> selected peer config "XAuth-PSK"</DIV>
<DIV>Jan 12 09:07:20 16[ENC] <XAuth-PSK|4> generating ID_PROT response 0 [ ID HASH ]</DIV>
<DIV>Jan 12 09:07:20 16[NET] <XAuth-PSK|4> sending packet: from 172.31.2.1[4500] to 223.104.3.235[21528] (76 bytes)</DIV>
<DIV>Jan 12 09:07:20 16[ENC] <XAuth-PSK|4> generating TRANSACTION request 2279139339 [ HASH CPRQ(X_USER X_PWD) ]</DIV>
<DIV>Jan 12 09:07:20 16[NET] <XAuth-PSK|4> sending packet: from 172.31.2.1[4500] to 223.104.3.235[21528] (76 bytes)</DIV>
<DIV>Jan 12 09:07:20 05[NET] <XAuth-PSK|4> received packet: from 223.104.3.235[21528] to 172.31.2.1[4500] (108 bytes)</DIV>
<DIV>Jan 12 09:07:20 05[ENC] <XAuth-PSK|4> parsed INFORMATIONAL_V1 request 3724774013 [ HASH N(INITIAL_CONTACT) ]</DIV>
<DIV>Jan 12 09:07:20 04[NET] <XAuth-PSK|4> received packet: from 223.104.3.235[21528] to 172.31.2.1[4500] (108 bytes)</DIV>
<DIV>Jan 12 09:07:20 04[ENC] <XAuth-PSK|4> parsed TRANSACTION response 2279139339 [ HASH CPRP(X_USER X_PWD) ]</DIV>
<DIV>Jan 12 09:07:20 04[CFG] <XAuth-PSK|4> sending RADIUS Access-Request to server '127.0.0.1'</DIV>
<DIV>Jan 12 09:07:20 04[CFG] <XAuth-PSK|4> received RADIUS Access-Accept from server '127.0.0.1'</DIV>
<DIV>Jan 12 09:07:20 04[IKE] <XAuth-PSK|4> XAuth authentication of 'vpnuser1' successful</DIV>
<DIV>Jan 12 09:07:20 04[ENC] <XAuth-PSK|4> generating TRANSACTION request 3413157947 [ HASH CPS(X_STATUS) ]</DIV>
<DIV>Jan 12 09:07:20 04[NET] <XAuth-PSK|4> sending packet: from 172.31.2.1[4500] to 223.104.3.235[21528] (76 bytes)</DIV>
<DIV>Jan 12 09:07:20 09[NET] <XAuth-PSK|4> received packet: from 223.104.3.235[21528] to 172.31.2.1[4500] (92 bytes)</DIV>
<DIV>Jan 12 09:07:20 09[ENC] <XAuth-PSK|4> parsed TRANSACTION response 3413157947 [ HASH CPA(X_STATUS) ]</DIV>
<DIV>Jan 12 09:07:20 09[IKE] <XAuth-PSK|4> IKE_SA XAuth-PSK[4] established between 172.31.2.1[172.31.2.1]...223.104.3.235[10.58.28.34]</DIV>
<DIV>Jan 12 09:07:20 09[IKE] <XAuth-PSK|4> scheduling reauthentication in 10139s</DIV>
<DIV>Jan 12 09:07:20 09[IKE] <XAuth-PSK|4> maximum IKE_SA lifetime 10679s</DIV>
<DIV>Jan 12 09:07:20 07[NET] <XAuth-PSK|4> received packet: from 223.104.3.235[21528] to 172.31.2.1[4500] (124 bytes)</DIV>
<DIV>Jan 12 09:07:20 07[ENC] <XAuth-PSK|4> parsed TRANSACTION request 3929122124 [ HASH CPRQ(ADDR MASK DNS NBNS U_BANNER U_DEFDOM U_SPLITDNS U_SPLITINC U_LOCALLAN VER) ]</DIV>
<DIV>Jan 12 09:07:20 07[IKE] <XAuth-PSK|4> peer requested virtual IP %any</DIV>
<DIV>Jan 12 09:07:20 07[CFG] <XAuth-PSK|4> assigning new lease to 'vpnuser1'</DIV>
<DIV>Jan 12 09:07:20 07[IKE] <XAuth-PSK|4> assigning virtual IP 172.31.254.1 to peer 'vpnuser1'</DIV>
<DIV>Jan 12 09:07:20 07[ENC] <XAuth-PSK|4> generating TRANSACTION response 3929122124 [ HASH CPRP(ADDR DNS NBNS DNS NBNS) ]</DIV>
<DIV>Jan 12 09:07:20 07[NET] <XAuth-PSK|4> sending packet: from 172.31.2.1[4500] to 223.104.3.235[21528] (108 bytes)</DIV>
<DIV>Jan 12 09:07:39 11[NET] <XAuth-PSK|4> received packet: from 223.104.3.235[21528] to 172.31.2.1[4500] (364 bytes)</DIV>
<DIV>Jan 12 09:07:39 11[ENC] <XAuth-PSK|4> parsed QUICK_MODE request 3003341863 [ HASH SA No ID ID ]</DIV>
<DIV>Jan 12 09:07:39 11[IKE] <XAuth-PSK|4> received 28800s lifetime, configured 3600s</DIV>
<DIV>Jan 12 09:07:39 11[ENC] <XAuth-PSK|4> generating QUICK_MODE response 3003341863 [ HASH SA No ID ID ]</DIV>
<DIV>Jan 12 09:07:39 11[NET] <XAuth-PSK|4> sending packet: from 172.31.2.1[4500] to 223.104.3.235[21528] (172 bytes)</DIV>
<DIV>Jan 12 09:07:39 10[NET] <XAuth-PSK|4> received packet: from 223.104.3.235[21528] to 172.31.2.1[4500] (76 bytes)</DIV>
<DIV>Jan 12 09:07:39 10[ENC] <XAuth-PSK|4> parsed QUICK_MODE request 3003341863 [ HASH ]</DIV>
<DIV>Jan 12 09:07:39 10[IKE] <XAuth-PSK|4> CHILD_SA XAuth-PSK{6} established with SPIs cdf6f39c_i 0c4a03f5_o and TS 0.0.0.0/0 === 172.31.254.1/32</DIV>
<DIV> </DIV>
<DIV>Jan 12 09:09:15 07[NET] <5> received packet: from 223.104.3.235[26141] to 172.31.2.1[500] (476 bytes)</DIV>
<DIV>Jan 12 09:09:15 07[ENC] <5> parsed ID_PROT request 0 [ SA V V V V V V V V ]</DIV>
<DIV>Jan 12 09:09:15 07[IKE] <5> received NAT-T (RFC 3947) vendor ID</DIV>
<DIV>Jan 12 09:09:15 07[IKE] <5> received draft-ietf-ipsec-nat-t-ike-02 vendor ID</DIV>
<DIV>Jan 12 09:09:15 07[IKE] <5> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID</DIV>
<DIV>Jan 12 09:09:15 07[IKE] <5> received draft-ietf-ipsec-nat-t-ike-00 vendor ID</DIV>
<DIV>Jan 12 09:09:15 07[IKE] <5> received XAuth vendor ID</DIV>
<DIV>Jan 12 09:09:15 07[IKE] <5> received Cisco Unity vendor ID</DIV>
<DIV>Jan 12 09:09:15 07[IKE] <5> received FRAGMENTATION vendor ID</DIV>
<DIV>Jan 12 09:09:15 07[IKE] <5> received DPD vendor ID</DIV>
<DIV>Jan 12 09:09:15 07[IKE] <5> 223.104.3.235 is initiating a Main Mode IKE_SA</DIV>
<DIV>Jan 12 09:09:15 07[ENC] <5> generating ID_PROT response 0 [ SA V V V V ]</DIV>
<DIV>Jan 12 09:09:15 07[NET] <5> sending packet: from 172.31.2.1[500] to 223.104.3.235[26141] (160 bytes)</DIV>
<DIV>Jan 12 09:09:15 08[NET] <5> received packet: from 223.104.3.235[26141] to 172.31.2.1[500] (228 bytes)</DIV>
<DIV>Jan 12 09:09:15 08[ENC] <5> parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]</DIV>
<DIV>Jan 12 09:09:15 08[IKE] <5> local host is behind NAT, sending keep alives</DIV>
<DIV>Jan 12 09:09:15 08[IKE] <5> remote host is behind NAT</DIV>
<DIV>Jan 12 09:09:15 08[ENC] <5> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]</DIV>
<DIV>Jan 12 09:09:15 08[NET] <5> sending packet: from 172.31.2.1[500] to 223.104.3.235[26141] (244 bytes)</DIV>
<DIV>Jan 12 09:09:15 13[NET] <5> received packet: from 223.104.3.235[21528] to 172.31.2.1[4500] (92 bytes)</DIV>
<DIV>Jan 12 09:09:15 13[ENC] <5> invalid ID_V1 payload length, decryption failed?</DIV>
<DIV>Jan 12 09:09:15 13[ENC] <5> could not decrypt payloads</DIV>
<DIV>Jan 12 09:09:15 13[IKE] <5> message parsing failed</DIV>
<DIV>Jan 12 09:09:15 13[ENC] <5> generating INFORMATIONAL_V1 request 3181951198 [ HASH N(PLD_MAL) ]</DIV>
<DIV>Jan 12 09:09:15 13[NET] <5> sending packet: from 172.31.2.1[500] to 223.104.3.235[26141] (76 bytes)</DIV>
<DIV>Jan 12 09:09:15 13[IKE] <5> ID_PROT request with message ID 0 processing failed</DIV>
<DIV>Jan 12 09:09:18 11[NET] <5> received packet: from 223.104.3.235[21528] to 172.31.2.1[4500] (92 bytes)</DIV>
<DIV>Jan 12 09:09:18 11[ENC] <5> invalid ID_V1 payload length, decryption failed?</DIV>
<DIV>Jan 12 09:09:18 11[ENC] <5> could not decrypt payloads</DIV>
<DIV>Jan 12 09:09:18 11[IKE] <5> message parsing failed</DIV></DIV>
<DIV> </DIV>
<HR style="HEIGHT: 1px; WIDTH: 210px" align=left color=#b5c4df SIZE=1>
<DIV><SPAN>JWD</SPAN></DIV>
<DIV> </DIV>
<DIV
style="BORDER-TOP: #b5c4df 1pt solid; BORDER-RIGHT: medium none; BORDER-BOTTOM: medium none; PADDING-BOTTOM: 0cm; PADDING-TOP: 3pt; PADDING-LEFT: 0cm; BORDER-LEFT: medium none; PADDING-RIGHT: 0cm">
<DIV
style="FONT-SIZE: 12px; BACKGROUND: #efefef; COLOR: #000000; PADDING-BOTTOM: 8px; PADDING-TOP: 8px; PADDING-LEFT: 8px; PADDING-RIGHT: 8px">
<DIV><B>From:</B> <A
href="mailto:noel.kuntze+strongswan-users-ml@thermi.consulting">Noel
Kuntze</A></DIV>
<DIV><B>Date:</B> 2018-01-11 20:02</DIV>
<DIV><B>To:</B> <A href="mailto:j-wd@163.com">JWD</A>; <A
href="mailto:users@lists.strongswan.org">users</A></DIV>
<DIV><B>Subject:</B> Re: [strongSwan] Reconnect failed with android
phone</DIV></DIV></DIV>
<DIV>
<DIV>What's happening in between those two lines?</DIV>
<DIV> </DIV>
<DIV>On 10.01.2018 15:34, JWD wrote:</DIV>
<DIV>> Jan 10 22:22:37 04[NET] <XAuth-PSK|3> sending packet: from 172.31.2.1[4500] to 117.100.110.176[4500] (108 bytes)</DIV>
<DIV>> </DIV>
<DIV>> Jan 10 22:22:55 15[NET] <4> received packet: from 117.100.110.176[500] to 172.31.2.1[500] (476 bytes)</DIV>
<DIV> </DIV>
<DIV>Btw, switch to a better cipher suite.</DIV>
<DIV>> ike=aes256-sha1-modp1024,aes256-sha256-modp1024,3des-sha1-modp1024!</DIV>
<DIV>> esp=aes256-sha1,aes256-sha256,3des-sha1!</DIV>
<DIV> </DIV>
<DIV>Kind regards</DIV>
<DIV> </DIV>
<DIV>Noel</DIV></DIV></DIV></DIV></BODY></HTML>