<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<style type="text/css" style="display:none;"> P {margin-top:0;margin-bottom:0;} </style>
</head>
<body dir="ltr">
<div style="font-family: Calibri, Arial, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<span>Hi Tobias,<br>
</span>
<div><br>
</div>
<div>This looks to me like it has worked but I may be wrong. Is there a quick test to prove success?<br>
</div>
<div><br>
</div>
<div>For example should 'ip address' offer a 'PPP' interface or something like that?<br>
</div>
<div><br>
</div>
<div>I am including logs and all just incase there's a gotcha that you may spot that I am missing.<br>
</div>
<div><br>
</div>
<div>Otherwise, this looks great. Thank you so much!<br>
</div>
<div><br>
</div>
<div><br>
</div>
<div>conn officeVPN<br>
</div>
<div> aggressive=yes<br>
</div>
<div> keyexchange=ikev1<br>
</div>
<div> type=tunnel<br>
</div>
<div> authby=xauthpsk<br>
</div>
<div> ike=aes128-sha1-modp2048<br>
</div>
<div> esp=aes128-sha1-modp2048<br>
</div>
<div> left=%defaultroute<br>
</div>
<div> leftsourceip=%config<br>
</div>
<div> modeconfig=pull<br>
</div>
<div> right=50.45.0.51<br>
</div>
<div> rightsubnet=0.0.0.0/0<br>
</div>
<div> rightid=196.198.128.64<br>
</div>
<div> rightfirewall=yes<br>
</div>
<div> auto=add<br>
</div>
<div> xauth_identity=user<br>
</div>
<div><br>
</div>
<div>$ sudo ipsec up officeVPN<br>
</div>
<div>initiating Aggressive Mode IKE_SA officeVPN[1] to 50.45.0.51<br>
</div>
<div>generating AGGRESSIVE request 0 [ SA KE No ID V V V V V ]<br>
</div>
<div>sending packet: from 10.0.0.3[500] to 50.45.0.51[500] (548 bytes)<br>
</div>
<div>received packet: from 50.45.0.51[500] to 10.0.0.3[500] (564 bytes)<br>
</div>
<div>parsed AGGRESSIVE response 0 [ SA KE No ID HASH V NAT-D NAT-D V V V V V ]<br>
</div>
<div>received NAT-T (RFC 3947) vendor ID<br>
</div>
<div>received DPD vendor ID<br>
</div>
<div>received XAuth vendor ID<br>
</div>
<div>received unknown vendor ID: <SANITISED VALUE><br>
</div>
<div>received FRAGMENTATION vendor ID<br>
</div>
<div>received FRAGMENTATION vendor ID<br>
</div>
<div>local host is behind NAT, sending keep alives<br>
</div>
<div>remote host is behind NAT<br>
</div>
<div>generating AGGRESSIVE request 0 [ HASH NAT-D NAT-D ]<br>
</div>
<div>sending packet: from 10.0.0.3[4500] to 50.45.0.51[4500] (108 bytes)<br>
</div>
<div>received packet: from 50.45.0.51[4500] to 10.0.0.3[4500] (76 bytes)<br>
</div>
<div>parsed TRANSACTION request 3261202525 [ HASH CPRQ(X_TYPE X_USER X_PWD) ]<br>
</div>
<div>generating TRANSACTION response 3261202525 [ HASH CPRP(X_USER X_PWD) ]<br>
</div>
<div>sending packet: from 10.0.0.3[4500] to 50.45.0.51[4500] (92 bytes)<br>
</div>
<div>received packet: from 50.45.0.51[4500] to 10.0.0.3[4500] (76 bytes)<br>
</div>
<div>parsed TRANSACTION request 2319880084 [ HASH CPS(X_STATUS) ]<br>
</div>
<div>XAuth authentication of 'user' (myself) successful<br>
</div>
<div>IKE_SA officeVPN[1] established between 10.0.0.3[10.0.0.3]...50.45.0.51[196.198.128.64]<br>
</div>
<div>scheduling reauthentication in 9856s<br>
</div>
<div>maximum IKE_SA lifetime 10396s<br>
</div>
<div>generating TRANSACTION response 2319880084 [ HASH CPA(X_STATUS) ]<br>
</div>
<div>sending packet: from 10.0.0.3[4500] to 50.45.0.51[4500] (76 bytes)<br>
</div>
<div>generating TRANSACTION request 983160742 [ HASH CPRQ(ADDR DNS) ]<br>
</div>
<div>sending packet: from 10.0.0.3[4500] to 50.45.0.51[4500] (76 bytes)<br>
</div>
<div>received packet: from 50.45.0.51[4500] to 10.0.0.3[4500] (92 bytes)<br>
</div>
<div>parsed TRANSACTION response 983160742 [ HASH CPRP(ADDR DNS) ]<br>
</div>
<div>installing DNS server 8.8.8.8 to /etc/resolv.conf<br>
</div>
<div>installing new virtual IP 196.198.128.13<br>
</div>
<div>generating QUICK_MODE request 632209231 [ HASH SA No KE ID ID ]<br>
</div>
<div>sending packet: from 10.0.0.3[4500] to 50.45.0.51[4500] (444 bytes)<br>
</div>
<div>received packet: from 50.45.0.51[4500] to 10.0.0.3[4500] (428 bytes)<br>
</div>
<div>parsed QUICK_MODE response 632209231 [ HASH SA No KE ID ID ]<br>
</div>
<div>CHILD_SA officeVPN{1} established with SPIs <SANITISED VALUE>_i <SANITISED VALUE>_o and TS 196.198.128.13/32 === 0.0.0.0/0<br>
</div>
<div>connection 'officeVPN' established successfully<br>
</div>
<div><br>
</div>
<div>$ sudo ipsec statusall<br>
</div>
<div>Status of IKE charon daemon (weakSwan 5.6.2, Linux 5.0.0-23-generic, x86_64):<br>
</div>
<div> uptime: 78 seconds, since Aug 19 11:29:38 2019<br>
</div>
<div> malloc: sbrk 2703360, mmap 0, used 628656, free 2074704<br>
</div>
<div> worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 2<br>
</div>
<div> loaded plugins: charon aes rc2 sha2 sha1 md4 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp agent xcbc hmac gcm attr kernel-netlink resolve socket-default connmark stroke vici
updown eap-mschapv2 xauth-generic counters<br>
</div>
<div>Listening IP addresses:<br>
</div>
<div> 10.0.0.3<br>
</div>
<div>Connections:<br>
</div>
<div>officeVPN: %any...50.45.0.51 IKEv1 Aggressive<br>
</div>
<div>officeVPN: local: [10.0.0.3] uses pre-shared key authentication<br>
</div>
<div>officeVPN: local: uses XAuth authentication: any with XAuth identity 'user'<br>
</div>
<div>officeVPN: remote: [196.198.128.64] uses pre-shared key authentication<br>
</div>
<div>officeVPN: child: dynamic === 0.0.0.0/0 TUNNEL<br>
</div>
<div>Security Associations (1 up, 0 connecting):<br>
</div>
<div>officeVPN[1]: ESTABLISHED 62 seconds ago, 10.0.0.3[10.0.0.3]...50.45.0.51[196.198.128.64]<br>
</div>
<div>officeVPN[1]: IKEv1 SPIs: <SANITISED VALUE>_i* <SANITISED VALUE>_r, pre-shared key+XAuth reauthentication in 2 hours<br>
</div>
<div>officeVPN[1]: IKE proposal: AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048<br>
</div>
<div>officeVPN{1}: INSTALLED, TUNNEL, reqid 1, ESP in UDP SPIs: <SANITISED VALUE>_i <SANITISED VALUE>_o<br>
</div>
<div>officeVPN{1}: AES_CBC_128/HMAC_SHA1_96/MODP_2048, 0 bytes_i, 0 bytes_o, rekeying in 41 minutes<br>
</div>
<div>officeVPN{1}: 196.198.128.13/32 === 0.0.0.0/0<br>
</div>
<div><br>
</div>
<div>log:<br>
</div>
<div>Mon, 2019-08-19 11:47 00[DMN] signal of type SIGINT received. Shutting down<br>
</div>
<div>Mon, 2019-08-19 11:47 00[IKE] <officeVPN|1> queueing ISAKMP_DELETE task<br>
</div>
<div>Mon, 2019-08-19 11:47 00[IKE] <officeVPN|1> activating new tasks<br>
</div>
<div>Mon, 2019-08-19 11:47 00[IKE] <officeVPN|1> activating ISAKMP_DELETE task<br>
</div>
<div>Mon, 2019-08-19 11:47 00[IKE] <officeVPN|1> deleting IKE_SA officeVPN[1] between 10.0.0.3[10.0.0.3]...50.45.0.51[196.198.128.64]<br>
</div>
<div>Mon, 2019-08-19 11:47 00[IKE] <officeVPN|1> sending DELETE for IKE_SA officeVPN[1]<br>
</div>
<div>Mon, 2019-08-19 11:47 00[IKE] <officeVPN|1> IKE_SA officeVPN[1] state change: ESTABLISHED => DELETING<br>
</div>
<div>Mon, 2019-08-19 11:47 00[ENC] <officeVPN|1> generating INFORMATIONAL_V1 request 2909961901 [ HASH D ]<br>
</div>
<div>Mon, 2019-08-19 11:47 00[NET] <officeVPN|1> sending packet: from 10.0.0.3[4500] to 50.45.0.51[4500] (92 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:47 00[IKE] <officeVPN|1> IKE_SA officeVPN[1] state change: DELETING => DESTROYING<br>
</div>
<div>Mon, 2019-08-19 11:47 00[IKE] <officeVPN|1> removing DNS server 8.8.8.8 from /etc/resolv.conf<br>
</div>
<div>Mon, 2019-08-19 11:47 00[KNL] <officeVPN|1> deleting virtual IP 196.198.128.13<br>
</div>
<div>tail: /var/log/charon_debug.log: file truncated<br>
</div>
<div>Mon, 2019-08-19 11:47 00[DMN] Starting IKE charon daemon (strongSwan 5.6.2, Linux 5.0.0-23-generic, x86_64)<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'aesni': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'aes': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'rc2': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'sha2': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'sha1': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'md4': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'md5': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'mgf1': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'random': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'nonce': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'x509': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'revocation': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'constraints': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'pubkey': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'pkcs1': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'pkcs7': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'pkcs8': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'pkcs12': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'pgp': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'dnskey': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'sshkey': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'pem': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'openssl': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'fips-prf': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'gmp': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'agent': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'xcbc': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'hmac': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'gcm': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'attr': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'kernel-netlink': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'resolve': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'socket-default': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'connmark': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'stroke': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'vici': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'updown': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'eap-mschapv2': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'xauth-generic': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] plugin 'counters': loaded successfully<br>
</div>
<div>Mon, 2019-08-19 11:47 00[KNL] known interfaces and IP addresses:<br>
</div>
<div>Mon, 2019-08-19 11:47 00[KNL] lo<br>
</div>
<div>Mon, 2019-08-19 11:47 00[KNL] 127.0.0.1<br>
</div>
<div>Mon, 2019-08-19 11:47 00[KNL] ::1<br>
</div>
<div>Mon, 2019-08-19 11:47 00[KNL] enp4s0<br>
</div>
<div>Mon, 2019-08-19 11:47 00[KNL] wlp2s0<br>
</div>
<div>Mon, 2019-08-19 11:47 00[KNL] 10.0.0.3<br>
</div>
<div>Mon, 2019-08-19 11:47 00[KNL] <SANITISED VALUE><br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] feature PUBKEY:ED25519 in plugin 'pem' has unmet dependency: PUBKEY:ED25519<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] feature PUBKEY:BLISS in plugin 'pem' has unmet dependency: PUBKEY:BLISS<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] feature PUBKEY:DSA in plugin 'pem' has unmet dependency: PUBKEY:DSA<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] feature PRIVKEY:DSA in plugin 'pem' has unmet dependency: PRIVKEY:DSA<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] feature PRIVKEY:BLISS in plugin 'pem' has unmet dependency: PRIVKEY:BLISS<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] feature CERT_DECODE:OCSP_REQUEST in plugin 'pem' has unmet dependency: CERT_DECODE:OCSP_REQUEST<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] feature PRIVKEY_SIGN:RSA_EMSA_PKCS1_SHA3_224 in plugin 'gmp' has unmet dependency: HASHER:HASH_SHA3_224<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] feature PRIVKEY_SIGN:RSA_EMSA_PKCS1_SHA3_256 in plugin 'gmp' has unmet dependency: HASHER:HASH_SHA3_256<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] feature PRIVKEY_SIGN:RSA_EMSA_PKCS1_SHA3_384 in plugin 'gmp' has unmet dependency: HASHER:HASH_SHA3_384<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] feature PRIVKEY_SIGN:RSA_EMSA_PKCS1_SHA3_512 in plugin 'gmp' has unmet dependency: HASHER:HASH_SHA3_512<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] feature PUBKEY_VERIFY:RSA_EMSA_PKCS1_SHA3_224 in plugin 'gmp' has unmet dependency: HASHER:HASH_SHA3_224<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] feature PUBKEY_VERIFY:RSA_EMSA_PKCS1_SHA3_256 in plugin 'gmp' has unmet dependency: HASHER:HASH_SHA3_256<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] feature PUBKEY_VERIFY:RSA_EMSA_PKCS1_SHA3_384 in plugin 'gmp' has unmet dependency: HASHER:HASH_SHA3_384<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] feature PUBKEY_VERIFY:RSA_EMSA_PKCS1_SHA3_512 in plugin 'gmp' has unmet dependency: HASHER:HASH_SHA3_512<br>
</div>
<div>Mon, 2019-08-19 11:47 00[CFG] loading ca certificates from '/etc/ipsec.d/cacerts'<br>
</div>
<div>Mon, 2019-08-19 11:47 00[CFG] loading aa certificates from '/etc/ipsec.d/aacerts'<br>
</div>
<div>Mon, 2019-08-19 11:47 00[CFG] loading ocsp signer certificates from '/etc/ipsec.d/ocspcerts'<br>
</div>
<div>Mon, 2019-08-19 11:47 00[CFG] loading attribute certificates from '/etc/ipsec.d/acerts'<br>
</div>
<div>Mon, 2019-08-19 11:47 00[CFG] loading crls from '/etc/ipsec.d/crls'<br>
</div>
<div>Mon, 2019-08-19 11:47 00[CFG] loading secrets from '/etc/ipsec.secrets'<br>
</div>
<div>Mon, 2019-08-19 11:47 00[CFG] loaded IKE secret for 50.45.0.51 %any<br>
</div>
<div>Mon, 2019-08-19 11:47 00[CFG] loaded EAP secret for user %any<br>
</div>
<div>Mon, 2019-08-19 11:47 00[CFG] loading secrets from '/etc/ipsec.d/nm-l2tp-ipsec-ee18db9c-522d-4da5-8a69-d3dcb8d23097.secrets'<br>
</div>
<div>Mon, 2019-08-19 11:47 00[CFG] loaded IKE secret for 50.45.0.51<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] unloading plugin 'aesni' without loaded features<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] loaded plugins: charon aes rc2 sha2 sha1 md4 md5 mgf1 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp agent xcbc hmac gcm attr kernel-netlink resolve socket-default
connmark stroke vici updown eap-mschapv2 xauth-generic counters<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] unable to load 14 plugin features (14 due to unmet dependencies)<br>
</div>
<div>Mon, 2019-08-19 11:47 00[LIB] dropped capabilities, running as uid 0, gid 0<br>
</div>
<div>Mon, 2019-08-19 11:47 00[JOB] spawning 16 worker threads<br>
</div>
<div>Mon, 2019-08-19 11:47 01[LIB] created thread 01 [9477]<br>
</div>
<div>Mon, 2019-08-19 11:47 02[LIB] created thread 02 [9476]<br>
</div>
<div>Mon, 2019-08-19 11:47 03[LIB] created thread 03 [9478]<br>
</div>
<div>Mon, 2019-08-19 11:47 04[LIB] created thread 04 [9479]<br>
</div>
<div>Mon, 2019-08-19 11:47 05[LIB] created thread 05 [9480]<br>
</div>
<div>Mon, 2019-08-19 11:47 06[LIB] created thread 06 [9481]<br>
</div>
<div>Mon, 2019-08-19 11:47 07[LIB] created thread 07 [9482]<br>
</div>
<div>Mon, 2019-08-19 11:47 08[LIB] created thread 08 [9483]<br>
</div>
<div>Mon, 2019-08-19 11:47 09[LIB] created thread 09 [9485]<br>
</div>
<div>Mon, 2019-08-19 11:47 10[LIB] created thread 10 [9484]<br>
</div>
<div>Mon, 2019-08-19 11:47 11[LIB] created thread 11 [9486]<br>
</div>
<div>Mon, 2019-08-19 11:47 12[LIB] created thread 12 [9487]<br>
</div>
<div>Mon, 2019-08-19 11:47 13[LIB] created thread 13 [9488]<br>
</div>
<div>Mon, 2019-08-19 11:47 14[LIB] created thread 14 [9490]<br>
</div>
<div>Mon, 2019-08-19 11:47 15[LIB] created thread 15 [9491]<br>
</div>
<div>Mon, 2019-08-19 11:47 16[LIB] created thread 16 [9489]<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] received stroke: add connection 'officeVPN'<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] conn officeVPN<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] left=%any<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] leftsourceip=%config<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] leftauth=psk<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] leftauth2=xauth<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] right=50.45.0.51<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] rightsubnet=0.0.0.0/0<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] rightauth=psk<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] rightid=196.198.128.64<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] rightupdown=ipsec _updown iptables<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] xauth_identity=user<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] ike=aes128-sha1-modp2048<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] esp=aes128-sha1-modp2048<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] dpddelay=30<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] dpdtimeout=150<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] sha256_96=no<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] mediation=no<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] keyexchange=ikev1<br>
</div>
<div>Mon, 2019-08-19 11:47 06[KNL] 50.45.0.51 is not a local address or the interface is down<br>
</div>
<div>Mon, 2019-08-19 11:47 06[CFG] added configuration 'officeVPN'<br>
</div>
<div>Mon, 2019-08-19 11:47 07[CFG] received stroke: initiate 'officeVPN'<br>
</div>
<div>Mon, 2019-08-19 11:47 09[KNL] <officeVPN|1> using 10.0.0.3 as address to reach 50.45.0.51/32<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> queueing ISAKMP_VENDOR task<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> queueing ISAKMP_CERT_PRE task<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> queueing AGGRESSIVE_MODE task<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> queueing ISAKMP_CERT_POST task<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> queueing ISAKMP_NATD task<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> queueing QUICK_MODE task<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> activating new tasks<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> activating ISAKMP_VENDOR task<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> activating ISAKMP_CERT_PRE task<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> activating AGGRESSIVE_MODE task<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> activating ISAKMP_CERT_POST task<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> activating ISAKMP_NATD task<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> sending XAuth vendor ID<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> sending DPD vendor ID<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> sending FRAGMENTATION vendor ID<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> sending NAT-T (RFC 3947) vendor ID<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> sending draft-ietf-ipsec-nat-t-ike-02\n vendor ID<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> initiating Aggressive Mode IKE_SA officeVPN[1] to 50.45.0.51<br>
</div>
<div>Mon, 2019-08-19 11:47 09[IKE] <officeVPN|1> IKE_SA officeVPN[1] state change: CREATED => CONNECTING<br>
</div>
<div>Mon, 2019-08-19 11:47 09[CFG] <officeVPN|1> configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_SHA1_96/AES_XCBC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_6144/MODP_8192/MODP_2048,
IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_6144/MODP_8192/MODP_2048<br>
</div>
<div>Mon, 2019-08-19 11:47 09[LIB] <officeVPN|1> size of DH secret exponent: 2047 bits<br>
</div>
<div>Mon, 2019-08-19 11:47 09[ENC] <officeVPN|1> generating AGGRESSIVE request 0 [ SA KE No ID V V V V V ]<br>
</div>
<div>Mon, 2019-08-19 11:47 09[NET] <officeVPN|1> sending packet: from 10.0.0.3[500] to 50.45.0.51[500] (548 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:47 10[NET] <officeVPN|1> received packet: from 50.45.0.51[500] to 10.0.0.3[500] (564 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:47 10[ENC] <officeVPN|1> parsed AGGRESSIVE response 0 [ SA KE No ID HASH V NAT-D NAT-D V V V V V ]<br>
</div>
<div>Mon, 2019-08-19 11:47 10[IKE] <officeVPN|1> received NAT-T (RFC 3947) vendor ID<br>
</div>
<div>Mon, 2019-08-19 11:47 10[IKE] <officeVPN|1> received DPD vendor ID<br>
</div>
<div>Mon, 2019-08-19 11:47 10[IKE] <officeVPN|1> received XAuth vendor ID<br>
</div>
<div>Mon, 2019-08-19 11:47 10[ENC] <officeVPN|1> received unknown vendor ID: 82:99:03:17:57:a3:60:82:c6:a6:21:de:00:00:00:00<br>
</div>
<div>Mon, 2019-08-19 11:47 10[IKE] <officeVPN|1> received FRAGMENTATION vendor ID<br>
</div>
<div>Mon, 2019-08-19 11:47 10[IKE] <officeVPN|1> received FRAGMENTATION vendor ID<br>
</div>
<div>Mon, 2019-08-19 11:47 10[CFG] <officeVPN|1> selecting proposal:<br>
</div>
<div>Mon, 2019-08-19 11:47 10[CFG] <officeVPN|1> proposal matches<br>
</div>
<div>Mon, 2019-08-19 11:47 10[CFG] <officeVPN|1> received proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048<br>
</div>
<div>Mon, 2019-08-19 11:47 10[CFG] <officeVPN|1> configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_SHA1_96/AES_XCBC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_6144/MODP_8192/MODP_2048,
IKE:AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_HMAC_SHA1/ECP_256/ECP_384/ECP_521/ECP_256_BP/ECP_384_BP/ECP_512_BP/MODP_3072/MODP_4096/MODP_6144/MODP_8192/MODP_2048<br>
</div>
<div>Mon, 2019-08-19 11:47 10[CFG] <officeVPN|1> selected proposal: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048<br>
</div>
<div>Mon, 2019-08-19 11:47 10[IKE] <officeVPN|1> local host is behind NAT, sending keep alives<br>
</div>
<div>Mon, 2019-08-19 11:47 10[IKE] <officeVPN|1> remote host is behind NAT<br>
</div>
<div>Mon, 2019-08-19 11:47 10[IKE] <officeVPN|1> reinitiating already active tasks<br>
</div>
<div>Mon, 2019-08-19 11:47 10[IKE] <officeVPN|1> ISAKMP_VENDOR task<br>
</div>
<div>Mon, 2019-08-19 11:47 10[IKE] <officeVPN|1> AGGRESSIVE_MODE task<br>
</div>
<div>Mon, 2019-08-19 11:47 10[IKE] <officeVPN|1> queueing MODE_CONFIG task<br>
</div>
<div>Mon, 2019-08-19 11:47 10[ENC] <officeVPN|1> generating AGGRESSIVE request 0 [ HASH NAT-D NAT-D ]<br>
</div>
<div>Mon, 2019-08-19 11:47 10[NET] <officeVPN|1> sending packet: from 10.0.0.3[4500] to 50.45.0.51[4500] (108 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:47 10[IKE] <officeVPN|1> activating new tasks<br>
</div>
<div>Mon, 2019-08-19 11:47 10[IKE] <officeVPN|1> nothing to initiate<br>
</div>
<div>Mon, 2019-08-19 11:47 11[NET] <officeVPN|1> received packet: from 50.45.0.51[4500] to 10.0.0.3[4500] (76 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:47 11[ENC] <officeVPN|1> parsed TRANSACTION request 996773552 [ HASH CPRQ(X_TYPE X_USER X_PWD) ]<br>
</div>
<div>Mon, 2019-08-19 11:47 11[ENC] <officeVPN|1> generating TRANSACTION response 996773552 [ HASH CPRP(X_USER X_PWD) ]<br>
</div>
<div>Mon, 2019-08-19 11:47 11[NET] <officeVPN|1> sending packet: from 10.0.0.3[4500] to 50.45.0.51[4500] (92 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:47 12[NET] <officeVPN|1> received packet: from 50.45.0.51[4500] to 10.0.0.3[4500] (76 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:47 12[ENC] <officeVPN|1> parsed TRANSACTION request 3040671394 [ HASH CPS(X_STATUS) ]<br>
</div>
<div>Mon, 2019-08-19 11:47 12[IKE] <officeVPN|1> XAuth authentication of 'user' (myself) successful<br>
</div>
<div>Mon, 2019-08-19 11:47 12[IKE] <officeVPN|1> IKE_SA officeVPN[1] established between 10.0.0.3[10.0.0.3]...50.45.0.51[196.198.128.64]<br>
</div>
<div>Mon, 2019-08-19 11:47 12[IKE] <officeVPN|1> IKE_SA officeVPN[1] state change: CONNECTING => ESTABLISHED<br>
</div>
<div>Mon, 2019-08-19 11:47 12[IKE] <officeVPN|1> scheduling reauthentication in 9738s<br>
</div>
<div>Mon, 2019-08-19 11:47 12[IKE] <officeVPN|1> maximum IKE_SA lifetime 10278s<br>
</div>
<div>Mon, 2019-08-19 11:47 12[ENC] <officeVPN|1> generating TRANSACTION response 3040671394 [ HASH CPA(X_STATUS) ]<br>
</div>
<div>Mon, 2019-08-19 11:47 12[NET] <officeVPN|1> sending packet: from 10.0.0.3[4500] to 50.45.0.51[4500] (76 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:47 12[IKE] <officeVPN|1> activating new tasks<br>
</div>
<div>Mon, 2019-08-19 11:47 12[IKE] <officeVPN|1> activating MODE_CONFIG task<br>
</div>
<div>Mon, 2019-08-19 11:47 12[ENC] <officeVPN|1> generating TRANSACTION request 2282080261 [ HASH CPRQ(ADDR DNS) ]<br>
</div>
<div>Mon, 2019-08-19 11:47 12[NET] <officeVPN|1> sending packet: from 10.0.0.3[4500] to 50.45.0.51[4500] (76 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:47 13[NET] <officeVPN|1> received packet: from 50.45.0.51[4500] to 10.0.0.3[4500] (92 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:47 13[ENC] <officeVPN|1> parsed TRANSACTION response 2282080261 [ HASH CPRP(ADDR DNS) ]<br>
</div>
<div>Mon, 2019-08-19 11:47 13[IKE] <officeVPN|1> processing INTERNAL_IP4_ADDRESS attribute<br>
</div>
<div>Mon, 2019-08-19 11:47 13[IKE] <officeVPN|1> processing INTERNAL_IP4_DNS attribute<br>
</div>
<div>Mon, 2019-08-19 11:47 13[IKE] <officeVPN|1> installing DNS server 8.8.8.8 to /etc/resolv.conf<br>
</div>
<div>Mon, 2019-08-19 11:47 13[KNL] <officeVPN|1> 10.0.0.3 is on interface wlp2s0<br>
</div>
<div>Mon, 2019-08-19 11:47 13[IKE] <officeVPN|1> installing new virtual IP 196.198.128.13<br>
</div>
<div>Mon, 2019-08-19 11:47 13[KNL] <officeVPN|1> virtual IP 196.198.128.13 installed on wlp2s0<br>
</div>
<div>Mon, 2019-08-19 11:47 13[IKE] <officeVPN|1> activating new tasks<br>
</div>
<div>Mon, 2019-08-19 11:47 13[IKE] <officeVPN|1> activating QUICK_MODE task<br>
</div>
<div>Mon, 2019-08-19 11:47 13[CFG] <officeVPN|1> configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_SHA1_96/AES_XCBC_96/NO_EXT_SEQ<br>
</div>
<div>Mon, 2019-08-19 11:47 13[KNL] <officeVPN|1> got SPI c6b3f079<br>
</div>
<div>Mon, 2019-08-19 11:47 13[CFG] <officeVPN|1> configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_SHA1_96/AES_XCBC_96/NO_EXT_SEQ<br>
</div>
<div>Mon, 2019-08-19 11:47 13[LIB] <officeVPN|1> size of DH secret exponent: 2047 bits<br>
</div>
<div>Mon, 2019-08-19 11:47 13[CFG] <officeVPN|1> proposing traffic selectors for us:<br>
</div>
<div>Mon, 2019-08-19 11:47 13[CFG] <officeVPN|1> 196.198.128.13/32<br>
</div>
<div>Mon, 2019-08-19 11:47 13[CFG] <officeVPN|1> proposing traffic selectors for other:<br>
</div>
<div>Mon, 2019-08-19 11:47 13[CFG] <officeVPN|1> 0.0.0.0/0<br>
</div>
<div>Mon, 2019-08-19 11:47 13[ENC] <officeVPN|1> generating QUICK_MODE request 2371115108 [ HASH SA No KE ID ID ]<br>
</div>
<div>Mon, 2019-08-19 11:47 13[NET] <officeVPN|1> sending packet: from 10.0.0.3[4500] to 50.45.0.51[4500] (444 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:47 05[NET] <officeVPN|1> received packet: from 50.45.0.51[4500] to 10.0.0.3[4500] (428 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:47 05[ENC] <officeVPN|1> parsed QUICK_MODE response 2371115108 [ HASH SA No KE ID ID ]<br>
</div>
<div>Mon, 2019-08-19 11:47 05[CFG] <officeVPN|1> selecting proposal:<br>
</div>
<div>Mon, 2019-08-19 11:47 05[CFG] <officeVPN|1> proposal matches<br>
</div>
<div>Mon, 2019-08-19 11:47 05[CFG] <officeVPN|1> received proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ<br>
</div>
<div>Mon, 2019-08-19 11:47 05[CFG] <officeVPN|1> configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_SHA1_96/AES_XCBC_96/NO_EXT_SEQ<br>
</div>
<div>Mon, 2019-08-19 11:47 05[CFG] <officeVPN|1> selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ<br>
</div>
<div>Mon, 2019-08-19 11:47 05[CHD] <officeVPN|1> CHILD_SA officeVPN{1} state change: CREATED => INSTALLING<br>
</div>
<div>Mon, 2019-08-19 11:47 05[CHD] <officeVPN|1> using AES_CBC for encryption<br>
</div>
<div>Mon, 2019-08-19 11:47 05[CHD] <officeVPN|1> using HMAC_SHA1_96 for integrity<br>
</div>
<div>Mon, 2019-08-19 11:47 05[CHD] <officeVPN|1> adding inbound ESP SA<br>
</div>
<div>Mon, 2019-08-19 11:47 05[CHD] <officeVPN|1> SPI 0xc6b3f079, src 50.45.0.51 dst 10.0.0.3<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> adding SAD entry with SPI c6b3f079 and reqid {1}<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> using encryption algorithm AES_CBC with key size 128<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> using integrity algorithm HMAC_SHA1_96 with key size 160<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> using replay window of 32 packets<br>
</div>
<div>Mon, 2019-08-19 11:47 05[CHD] <officeVPN|1> adding outbound ESP SA<br>
</div>
<div>Mon, 2019-08-19 11:47 05[CHD] <officeVPN|1> SPI 0x9e604960, src 10.0.0.3 dst 50.45.0.51<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> adding SAD entry with SPI 9e604960 and reqid {1}<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> using encryption algorithm AES_CBC with key size 128<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> using integrity algorithm HMAC_SHA1_96 with key size 160<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> using replay window of 0 packets<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> adding policy 0.0.0.0/0 === 196.198.128.13/32 in [priority 383615, refcount 1]<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> adding policy 0.0.0.0/0 === 196.198.128.13/32 fwd [priority 383615, refcount 1]<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> adding policy 196.198.128.13/32 === 0.0.0.0/0 out [priority 383615, refcount 1]<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> getting a local address in traffic selector 196.198.128.13/32<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> using host 196.198.128.13<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> getting iface name for index 3<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> using 10.0.0.1 as nexthop and wlp2s0 as dev to reach 50.45.0.51/32<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> installing route: 0.0.0.0/0 via 10.0.0.1 src 196.198.128.13 dev wlp2s0<br>
</div>
<div>Mon, 2019-08-19 11:47 05[KNL] <officeVPN|1> getting iface index for wlp2s0<br>
</div>
<div>Mon, 2019-08-19 11:47 05[IKE] <officeVPN|1> CHILD_SA officeVPN{1} established with SPIs c6b3f079_i 9e604960_o and TS 196.198.128.13/32 === 0.0.0.0/0<br>
</div>
<div>Mon, 2019-08-19 11:47 05[CHD] <officeVPN|1> CHILD_SA officeVPN{1} state change: INSTALLING => INSTALLED<br>
</div>
<div>Mon, 2019-08-19 11:47 05[IKE] <officeVPN|1> reinitiating already active tasks<br>
</div>
<div>Mon, 2019-08-19 11:47 05[IKE] <officeVPN|1> QUICK_MODE task<br>
</div>
<div>Mon, 2019-08-19 11:47 05[ENC] <officeVPN|1> generating QUICK_MODE request 2371115108 [ HASH ]<br>
</div>
<div>Mon, 2019-08-19 11:47 05[NET] <officeVPN|1> sending packet: from 10.0.0.3[4500] to 50.45.0.51[4500] (60 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:47 05[IKE] <officeVPN|1> activating new tasks<br>
</div>
<div>Mon, 2019-08-19 11:47 05[IKE] <officeVPN|1> nothing to initiate<br>
</div>
<div>Mon, 2019-08-19 11:49 07[NET] <officeVPN|1> received packet: from 50.45.0.51[4500] to 10.0.0.3[4500] (92 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:49 07[ENC] <officeVPN|1> parsed INFORMATIONAL_V1 request 3449164663 [ HASH N(DPD) ]<br>
</div>
<div>Mon, 2019-08-19 11:49 07[IKE] <officeVPN|1> queueing ISAKMP_DPD task<br>
</div>
<div>Mon, 2019-08-19 11:49 07[IKE] <officeVPN|1> activating new tasks<br>
</div>
<div>Mon, 2019-08-19 11:49 07[IKE] <officeVPN|1> activating ISAKMP_DPD task<br>
</div>
<div>Mon, 2019-08-19 11:49 07[ENC] <officeVPN|1> generating INFORMATIONAL_V1 request 1814674566 [ HASH N(DPD_ACK) ]<br>
</div>
<div>Mon, 2019-08-19 11:49 07[NET] <officeVPN|1> sending packet: from 10.0.0.3[4500] to 50.45.0.51[4500] (92 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:49 07[IKE] <officeVPN|1> activating new tasks<br>
</div>
<div>Mon, 2019-08-19 11:49 07[IKE] <officeVPN|1> nothing to initiate<br>
</div>
<div>Mon, 2019-08-19 11:50 09[NET] <officeVPN|1> received packet: from 50.45.0.51[4500] to 10.0.0.3[4500] (92 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:50 09[ENC] <officeVPN|1> parsed INFORMATIONAL_V1 request 1546570273 [ HASH N(DPD) ]<br>
</div>
<div>Mon, 2019-08-19 11:50 09[IKE] <officeVPN|1> queueing ISAKMP_DPD task<br>
</div>
<div>Mon, 2019-08-19 11:50 09[IKE] <officeVPN|1> activating new tasks<br>
</div>
<div>Mon, 2019-08-19 11:50 09[IKE] <officeVPN|1> activating ISAKMP_DPD task<br>
</div>
<div>Mon, 2019-08-19 11:50 09[ENC] <officeVPN|1> generating INFORMATIONAL_V1 request 4044055820 [ HASH N(DPD_ACK) ]<br>
</div>
<div>Mon, 2019-08-19 11:50 09[NET] <officeVPN|1> sending packet: from 10.0.0.3[4500] to 50.45.0.51[4500] (92 bytes)<br>
</div>
<div>Mon, 2019-08-19 11:50 09[IKE] <officeVPN|1> activating new tasks<br>
</div>
<div><br>
</div>
<div><br>
</div>
<div>--<br>
</div>
<div>Kind regards<br>
</div>
<div><br>
</div>
<div>Stephen Feyrer<br>
</div>
<span></span><br>
</div>
<div id="appendonsend"></div>
<hr style="display:inline-block;width:98%" tabindex="-1">
<div id="divRplyFwdMsg" dir="ltr"><font face="Calibri, sans-serif" style="font-size:11pt" color="#000000"><b>From:</b> Tobias Brunner <tobias@strongswan.org><br>
<b>Sent:</b> 19 August 2019 11:16<br>
<b>To:</b> Stephen Feyrer <stephen.feyrer@greensill.com>; strongSwan Users-Mailinglist <users@lists.strongswan.org><br>
<b>Subject:</b> Re: [strongSwan] Connecting but not connected</font>
<div> </div>
</div>
<div class="BodyFragment"><font size="2"><span style="font-size:11pt;">
<div class="PlainText">This message was sent from outside of Greensill Capital. Please do not open attachments or click on links unless you recognise the source of this email and are certain the content is safe.<br>
<br>
Hi Stephen,<br>
<br>
> I<br>
> will send updates for push and pull separately. Sorry for all the emails...<br>
<br>
Don't bother with `push`, it's definitely not the way to go.<br>
<br>
The problem now are your either the ESP algorithm proposals and/or the<br>
traffic selectors (`left|rightsubnet`). Start with<br>
`rightsubnet=0.0.0.0/0` as that's what's usually used for roadwarriors<br>
(if L2TP should be used you can experiment with restricting the<br>
ports/protocols too). If you still get a NO_PROPOSAL_CHOSEN notify try<br>
adding `esp=aes128-sha1-modp2048` (that matches the IKE proposal,<br>
however, if you actually have more specific information regarding the<br>
ESP/IPsec proposal from your admin, use that).<br>
<br>
Regards,<br>
Tobias<br>
</div>
</span></font></div>
<p style="font-size:6pt; font-family: 'Cambria','times roman',serif;">This message is for the designated recipient only and may contain privileged, proprietary or otherwise confidential information. If you have received this in error, please contact the sender
immediately and delete the original. Any other use of this e-mail by you is prohibited. If we collect and use your personal data we will use it in accordance with our
<a href="http://www.greensill.com/privacy/">privacy policy</a>. Greensill Capital (UK) Limited. Registered in England and Wales. Registered Number: 8126173. Registered Office: One Southampton Street, Covent Garden, London, WC2R 0LR, United Kingdom. Greensill
Capital Pty Limited. Australian Company Number: 154 088 132. Registered Office: 62 –66 Woondooma Street, Bundaberg, Queensland 4670, Australia.</p>
<br>
</body>
</html>