[strongSwan] /etc/strongswan.d/VPN.conf:1: syntax error, unexpected NAME, expecting NEWLINE or '{' or '=' [vpn]

Stephen Feyrer stephen.feyrer at btinternet.com
Wed Apr 22 11:04:17 CEST 2015


Hi,

I would just like to say thank you to everyone.  On point irony, I learned  
yesterday that today the office network is being upgraded and the current  
VPN will no longer work.

Thank you for your help, I'm sorry I can report back a solution.  I wish  
you all the best.


--
Kind regards

Stephen Feyrer.





On Mon, 20 Apr 2015 12:02:36 +0100, Noel Kuntze <noel at familie-kuntze.de>  
wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> Hello Stephen,
>
> Your original configuration looks like l2tp/IPsec.
> Your configuration was correct for that purpose.
> Where this is going right now, is a general roadwarrior configuration  
> for IKEv1.
> Please check what is actually configured on the IOS device, so
> we can solve this quickly.
>
> Mit freundlichen Grüßen/Regards,
> Noel Kuntze
>
> Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658
>
> Am 20.04.2015 um 11:01 schrieb Stephen Feyrer:
>> Hi Miroslav,
>>
>> Thank you.
>>
>> We've made progress.  I haven't included the any of the log file as it  
>> is very verbose (24488 lines - for ipsec up, statusall, down).  Please  
>> let me know which sections to look at and I'll grab those.
>>
>> As you can see below the transaction request below seems to be very  
>> laboured but does result in a success statement.  Following that I have  
>> tried to test with openl2tp to create the l2tp ppp tunnel.  Openl2tp  
>> seems create this tunnel but ifconfig does not show any ppp interfaces.
>>
>> The lines in the conn left/rightprotoport do not seem to affect the  
>> outcome whether included or not.  The charondebug line when uncommented  
>> prevents any output and I suspect that the syntax is wrong there.
>>
>>
>>
>> code:
>>
>> # ipsec.conf - strongSwan IPsec configuration file
>>
>> # basic configuration
>>
>> config setup
>>         # strictcrlpolicy=yes
>>         # uniqueids = no
>> #        charondebug="ike 3, cfg 3, app 3, chd 3, dmn 3, net 3"
>>
>> conn VPN-OFFICE-COM
>>         keyexchange=ikev1
>>         type=tunnel
>>         authby=secret
>>         ike=3des-sha1-modp1024
>>         rekey=no
>>         left=%any
>>         leftsourceip=%config
>> #       leftprotoport=udp/l2tp
>>         right=vpn.office.com
>> #       rightprotoport=udp/l2tp
>>         rightid=17.11.7.5
>>         rightsubnet=0.0.0.0/0
>>         auto=add
>>
>>
>> # ipsec up VPN-OFFICE-COM
>> initiating Main Mode IKE_SA VPN-OFFICE-COM[1] to 17.11.7.5
>> generating ID_PROT request 0 [ SA V V V V ]
>> sending packet: from 1.2.3.4[500] to 17.11.7.5[500] (212 bytes)
>> received packet: from 17.11.7.5[500] to 1.2.3.4[500] (116 bytes)
>> parsed ID_PROT response 0 [ SA V V ]
>> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
>> received FRAGMENTATION vendor ID
>> generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
>> sending packet: from 1.2.3.4[500] to 17.11.7.5[500] (244 bytes)
>> received packet: from 17.11.7.5[500] to 1.2.3.4[500] (304 bytes)
>> parsed ID_PROT response 0 [ KE No V V V V NAT-D NAT-D ]
>> received Cisco Unity vendor ID
>> received XAuth vendor ID
>> received unknown vendor ID: [HIDDEN]
>> received unknown vendor ID: [HIDDEN]
>> local host is behind NAT, sending keep alives
>> generating ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
>> sending packet: from 1.2.3.4[4500] to 17.11.7.5[4500] (84 bytes)
>> received packet: from 17.11.7.5[4500] to 1.2.3.4[4500] (84 bytes)
>> parsed ID_PROT response 0 [ ID HASH V ]
>> received DPD vendor ID
>> IKE_SA VPN-OFFICE-COM[1] established between  
>> 1.2.3.4[1.2.3.4]...17.11.7.5[17.11.7.5]
>> generating TRANSACTION request [HIDDEN] [ HASH CPRQ(ADDR DNS U_SPLITINC  
>> U_LOCALLAN) ]
>> sending packet: from 1.2.3.4[4500] to 17.11.7.5[4500] (84 bytes)
>> sending retransmit 1 of request message ID [HIDDEN], seq 4
>> sending packet: from 1.2.3.4[4500] to 17.11.7.5[4500] (84 bytes)
>> sending retransmit 2 of request message ID [HIDDEN], seq 4
>> sending packet: from 1.2.3.4[4500] to 17.11.7.5[4500] (84 bytes)
>> sending retransmit 3 of request message ID [HIDDEN], seq 4
>> sending packet: from 1.2.3.4[4500] to 17.11.7.5[4500] (84 bytes)
>> received packet: from 17.11.7.5[4500] to 1.2.3.4[4500] (84 bytes)
>> parsed INFORMATIONAL_V1 request [HIDDEN] [ HASH N(DPD) ]
>> received packet: from 17.11.7.5[4500] to 1.2.3.4[4500] (84 bytes)
>> parsed INFORMATIONAL_V1 request [HIDDEN] [ HASH N(DPD) ]
>> received packet: from 17.11.7.5[4500] to 1.2.3.4[4500] (84 bytes)
>> parsed INFORMATIONAL_V1 request [HIDDEN] [ HASH N(DPD) ]
>> sending keep alive to 17.11.7.5[4500]
>> sending retransmit 4 of request message ID [HIDDEN], seq 4
>> sending packet: from 1.2.3.4[4500] to 17.11.7.5[4500] (84 bytes)
>> received packet: from 17.11.7.5[4500] to 1.2.3.4[4500] (84 bytes)
>> parsed INFORMATIONAL_V1 request [HIDDEN] [ HASH D ]
>> received DELETE for IKE_SA VPN-OFFICE-COM[1]
>> deleting IKE_SA VPN-OFFICE-COM[1] between  
>> 1.2.3.4[1.2.3.4]...17.11.7.5[17.11.7.5]
>> initiating Main Mode IKE_SA VPN-OFFICE-COM[2] to 17.11.7.5
>> generating ID_PROT request 0 [ SA V V V V ]
>> sending packet: from 1.2.3.4[500] to 17.11.7.5[500] (212 bytes)
>> connection 'VPN-OFFICE-COM' established successfully
>>
>>
>> # ipsec statusall
>> Status of IKE charon daemon (strongSwan 5.2.2, Linux 3.16.5-gentoo,  
>> x86_64):
>> uptime: 112 seconds, since Apr 20 09:23:17 2015
>> malloc: sbrk [HIDDEN], mmap 0, used [HIDDEN], free [HIDDEN]
>> worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0,  
>> scheduled: 2
>> loaded plugins: charon ldap mysql sqlite aes des rc2 sha1 sha2 md4 md5  
>> random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8  
>> pkcs12 pgp dnskey sshkey pem openssl gcrypt fips-prf gmp xcbc cmac hmac  
>> curl attr kernel-netlink resolve socket-default socket-dynamic farp  
>> stroke vici updown eap-identity eap-sim eap-aka eap-aka-3gpp2  
>> eap-simaka-pseudonym eap-simaka-reauth eap-md5 eap-gtc eap-mschapv2  
>> eap-radius eap-tls xauth-generic xauth-eap xauth-pam dhcp lookip led  
>> unity
>> Listening IP addresses:
>> 1.2.3.4
>> Connections:
>> VPN-OFFICE-COM: %any...vpn.office.com IKEv1
>> VPN-OFFICE-COM: local: [1.2.3.4] uses pre-shared key authentication
>> VPN-OFFICE-COM: remote: [17.11.7.5] uses pre-shared key authentication
>> VPN-OFFICE-COM: child: dynamic[udp/l2tp] === 172.18.7.0/24[udp/l2tp]  
>> TUNNEL
>> Security Associations (1 up, 0 connecting):
>> VPN-OFFICE-COM[2]: ESTABLISHED 40 seconds ago,  
>> 1.2.3.4[1.2.3.4]...17.11.7.5[17.11.7.5]
>> VPN-OFFICE-COM[2]: IKEv1 SPIs: [HIDDEN]_i* [HIDDEN]_r, rekeying disabled
>> VPN-OFFICE-COM[2]: IKE proposal:  
>> 3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
>> VPN-OFFICE-COM[2]: Tasks queued: QUICK_MODE ISAKMP_DPD ISAKMP_DPD  
>> ISAKMP_DPD
>> VPN-OFFICE-COM[2]: Tasks active: MODE_CONFIG
>>
>>
>> # ipsec down VPN-OFFICE-COM
>> received packet: from 17.11.7.5[4500] to 1.2.3.4[4500] (84 bytes)
>> parsed INFORMATIONAL_V1 request [HIDDEN] [ HASH D ]
>> received DELETE for IKE_SA VPN-OFFICE-COM[2]
>> deleting IKE_SA VPN-OFFICE-COM[2] between  
>> 1.2.3.4[1.2.3.4]...17.11.7.5[17.11.7.5]
>> initiating Main Mode IKE_SA VPN-OFFICE-COM[3] to 17.11.7.5
>> generating ID_PROT request 0 [ SA V V V V ]
>> sending packet: from 1.2.3.4[500] to 17.11.7.5[500] (212 bytes)
>> IKE_SA [2] closed successfully
>>
>>
>>
>>
>> --
>> Kind regards
>>
>> Stephen Feyrer
>>
>>
>>
>> On Mon, 20 Apr 2015 00:57:42 +0100, Miroslav Svoboda  
>> <goodmirek at goodmirek.cz> wrote:
>>
>>     Hi Stephen,
>>
>>     Please delete type=transport or change it to type=tunnel.
>>     Also delete rightprotoport and leftprotoport.
>>
>>     If this did not help, please provide again ipsec statusall + enable  
>> logging at higher level as described here  
>> <https://wiki.strongswan.org/projects/strongswan/wiki/LoggerConfiguration>  
>> and provide logfile.
>>
>>     Regards,
>>     Miroslav
>>
>>     On Monday, April 20, 2015 at 1:47:48 AM UTC+2, Stephen Feyrer wrote:
>>
>>         Hi Miroslav,
>>
>>         You are correct, the syntax error is gone.  Sadly, there is not  
>> much which I can tell you about my office Network topology.  All that I  
>> do know is that we pass through a Windows Firewall before being able to  
>> connect our work stations.
>>
>>
>>         code:
>>
>>         # ipsec.conf - strongSwan IPsec configuration file
>>
>>         # basic configuration
>>
>>         config setup
>>                 # strictcrlpolicy=yes
>>                 # uniqueids = no
>>
>>         conn VPN-OFFICE-COM
>>                 keyexchange=ikev1
>>                 type=transport
>>                 authby=secret
>>                 ike=3des-sha1-modp1024
>>                 rekey=no
>>                 left=%any
>>                 leftsourceip=%config
>>                 leftprotoport=udp/l2tp
>>                 right=vpn.office.com <http://vpn.office.com>
>>                 rightprotoport=udp/l2tp
>>                 rightid=17.11.7.5
>>                 rightsubnet=0.0.0.0/0 <http://0.0.0.0/0>
>>                 auto=add
>>
>>
>>
>>         # ipsec up VPN-OFFICE-COM
>>         initiating Main Mode IKE_SA VPN-OFFICE-COM[14] to 17.11.7.5
>>         generating ID_PROT request 0 [ SA V V V V ]
>>         sending packet: from 1.2.3.4[500] to 17.11.7.5[500] (212 bytes)
>>         received packet: from 17.11.7.5[500] to 1.2.3.4[500] (116 bytes)
>>         parsed ID_PROT response 0 [ SA V V ]
>>         received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
>>         received FRAGMENTATION vendor ID
>>         generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
>>         sending packet: from 1.2.3.4[500] to 17.11.7.5[500] (244 bytes)
>>         received packet: from 17.11.7.5[500] to 1.2.3.4[500] (304 bytes)
>>         parsed ID_PROT response 0 [ KE No V V V V NAT-D NAT-D ]
>>         received Cisco Unity vendor ID
>>         received XAuth vendor ID
>>         received unknown vendor ID: [HIDDEN]
>>         received unknown vendor ID: [HIDDEN]
>>         local host is behind NAT, sending keep alives
>>         generating ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
>>         sending packet: from 1.2.3.4[4500] to 17.11.7.5[4500] (84 bytes)
>>         received packet: from 17.11.7.5[4500] to 1.2.3.4[4500] (84  
>> bytes)
>>         parsed ID_PROT response 0 [ ID HASH V ]
>>         received DPD vendor ID
>>         IKE_SA VPN-OFFICE-COM[14] established between  
>> 1.2.3.4[1.2.3.4]...17.11.7.5[17.11.7.5]
>>         generating QUICK_MODE request [HIDDEN] [ HASH SA No ID ID  
>> NAT-OA NAT-OA ]
>>         sending packet: from 1.2.3.4[4500] to 17.11.7.5[4500] (220  
>> bytes)
>>         received packet: from 17.11.7.5[4500] to 1.2.3.4[4500] (180  
>> bytes)
>>         parsed QUICK_MODE response [HIDDEN] [ HASH SA No ID ID  
>> N(([HIDDEN])) NAT-OA ]
>>         received 28800s lifetime, configured 0s
>>         no acceptable traffic selectors found
>>         establishing connection 'VPN-OFFICE-COM' failed
>>
>>
>>         # ipsec statusall
>>         Status of IKE charon daemon (strongSwan 5.2.2, Linux  
>> 3.16.5-gentoo, x86_64):
>>         uptime: 3 hours, since Apr 19 20:50:15 2015
>>         malloc: sbrk [HIDDEN], mmap 0, used [HIDDEN], free [HIDDEN]
>>         worker threads: 11 of 16 idle, 5/0/0/0 working, job queue:  
>> 0/0/0/0, scheduled: 1
>>         loaded plugins: charon ldap mysql sqlite aes des rc2 sha1 sha2  
>> md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7  
>> pkcs8 pkcs12 pgp dnskey sshkey pem openssl gcrypt fips-prf gmp xcbc  
>> cmac hmac curl attr kernel-netlink resolve socket-default  
>> socket-dynamic farp stroke vici updown eap-identity eap-sim eap-aka  
>> eap-aka-3gpp2 eap-simaka-pseudonym eap-simaka-reauth eap-md5 eap-gtc  
>> eap-mschapv2 eap-radius eap-tls xauth-generic xauth-eap xauth-pam dhcp  
>> lookip led unity
>>         Listening IP addresses:
>>         1.2.3.4
>>         Connections:
>>         VPN-OFFICE-COM: %any...vpn.office.com <http://vpn.office.com>  
>> IKEv1
>>         VPN-OFFICE-COM: local: [1.2.3.4] uses pre-shared key  
>> authentication
>>         VPN-OFFICE-COM: remote: [17.11.7.5] uses pre-shared key  
>> authentication
>>         VPN-OFFICE-COM: child: dynamic[udp/l2tp] === dynamic[udp/l2tp]  
>> TRANSPORT
>>         Security Associations (1 up, 0 connecting):
>>         VPN-OFFICE-COM[14]: ESTABLISHED 6 seconds ago,  
>> 1.2.3.4[1.2.3.4]...17.11.7.5[17.11.7.5]
>>         VPN-OFFICE-COM[14]: IKEv1 SPIs: [HIDDEN]_i* [HIDDEN]_r,  
>> rekeying disabled
>>         VPN-OFFICE-COM[14]: IKE proposal:  
>> 3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
>>
>>
>>         Thank you for your help.  I hope this tells you more than it  
>> does me.
>>
>>
>>         --
>>         Kind regards
>>
>>         Stephen Feyrer.
>>
>>
>>
>>         On Sun, 19 Apr 2015 09:11:04 +0100, Miroslav Svoboda  
>> <good... at goodmirek.cz <javascript:>> wrote:
>>
>>             Hi Stephen,
>>
>>             So I assume there is no longer any syntax error reported.
>>
>>             From logfile I see there is no acceptable traffic selector.  
>> I assume that you have a home PC (Ubuntu) with Strongswan which you  
>> want to connect to the office VPN concentrator with IP 17.11.7.5  
>> running Windows. I suppose VPN concentrator in the office is not  
>> configured to route any traffic towards you home PC's IP address, thus  
>> you will need a virtual IP address assigned to your home PC by the VPN  
>> concentrator. Also I suppose you want to route all traffic via that VPN  
>> once connected.
>>             Then, please try to modify "left=%defaultroute" to  
>> "left=%any" and add "rightsubnet=0.0.0.0/0 <http://0.0.0.0/0>" and  
>> "leftsourceip=%config". You should not specify "leftsubnet", it has  
>> same effect as "leftsubnet=%dynamic".
>>             According to documentation at wiki  
>> <https://wiki.strongswan.org/projects/strongswan/wiki/ConnSection>  
>> configuration directive "left=defaultroute%" was used prior to version  
>> 5.0.0, superseded by "left=%any".
>>             leftsubnet=%dynamic (or omitting leftsubnet at all) and  
>> rightsubnet=0.0.0.0/0 <http://0.0.0.0/0> will create your traffic  
>> selector. It says that anything (0.0.0.0/0 <http://0.0.0.0/0>) from  
>> your side will be routed to remote host and that the remote host will  
>> route towards your PC (left==local) a traffic which would fit your  
>> dynamically assigned IP. Should you want to route towards office  
>> network only office-related traffic then change  
>> "rightsubnet=<subnet_used_in_Stephen's_office>".
>>
>>             If that didn't help please can you provide output of 'ipsec  
>> statusall' and also more details about network topology?
>>
>>             Regards,
>>             Miroslav
>>
>>             On Saturday, April 18, 2015 at 5:28:12 PM UTC+2, Stephen  
>> Feyrer wrote:
>>
>>                 Hi Miroslav,
>>
>>                 Thank you.  The conn section as presented below was  
>> copied and pasted from web page for convenience (this stripped the  
>> leading white spaced from the conn section).  For the moment the white  
>> spaces are in form of TAB characters.  I will test with space  
>> characters and complete this email.
>>
>>                 I Apologise for the lack of white spaces in the conn  
>> section of below email.  I have now tested with both spaces and tabs,  
>> each producing the same error as below.
>>
>>
>>                 --
>>                 Kind regards
>>
>>                 Stephen Feyrer.
>>
>>
>>                 On Sat, 18 Apr 2015 13:25:20 +0100, Miroslav Svoboda  
>> <good... at goodmirek.cz> wrote:
>>
>>                     Hi Stephen,
>>
>>                     I believe the issue might be caused as the "conn"  
>> section is not compliant with prescribed format. There should be at  
>> least one whitespace at the beginning of each line within the section.  
>> Only sections can and shall start at the first character of the line.
>>
>>                     Supposed correction:
>>                     *conn VPN-OFFICE-COM*
>>                     *   keyexchange=ikev1*
>>                     *   **type=transport*
>>                     *   **authby=secret*
>>                     *   **ike=3des-sha1-modp1024*
>>                     *   **rekey=no*
>>                     *   **left=%defaultroute*
>>                     *   **leftprotoport=udp/l2tp*
>>                     *   **right=vpn.office.com <http://vpn.office.com>*
>>                     *   **rightprotoport=udp/l2tp*
>>                     *   **rightid=17.11.7.5*
>>                     *   **auto=add*
>>
>>                     Regards,
>>                     Miroslav
>>
>>                     Message: 3
>>                     Date: Fri, 17 Apr 2015 14:08:57 +0100
>>                     From: "Stephen Feyrer" <stephen... at btinternet.com>
>>                     To: us... at lists.strongswan.org
>>                     Subject: Re: [strongSwan]  
>> /etc/strongswan.d/VPN.conf:1: syntax error,
>>                             unexpected NAME, expecting NEWLINE or '{'  
>> or '=' [vpn]
>>                     Message-ID: <op.xw8ms... at sveta.home.org>
>>                     Content-Type: text/plain; charset=utf-8;  
>> format=flowed; delsp=yes
>>
>>                     Hi Neol,
>>
>>                     Thank you.  I have removed the file  
>> /etc/strongswan.d/VPN.conf
>>
>>                     In /etc/ipsec.conf I have the same configuration.   
>> At least there is
>>                     progress, unfortunately I am still baffled.  This  
>> is the previously
>>                     working configuration.
>>
>>                     code:
>>
>>                     # ipsec.conf - strongSwan IPsec configuration file
>>
>>                     # basic configuration
>>
>>                     config setup
>>                              # strictcrlpolicy=yes
>>                              # uniqueids = no
>>
>>                     conn VPN-OFFICE-COM
>>                     keyexchange=ikev1
>>                     type=transport
>>                     authby=secret
>>                     ike=3des-sha1-modp1024
>>                     rekey=no
>>                     left=%defaultroute
>>                     leftprotoport=udp/l2tp
>>                     right=vpn.office.com <http://vpn.office.com>
>>                     rightprotoport=udp/l2tp
>>                     rightid=17.11.7.5
>>                     auto=add
>>
>>
>>                     Having restarted ipsec, I get the following result
>>
>>                     code:
>>
>>                     # ipsec up VPN-OFFICE-COM
>>                     initiating Main Mode IKE_SA VPN-OFFICE-COM[1] to  
>> 17.11.7.5
>>                     generating ID_PROT request 0 [ SA V V V V ]
>>                     sending packet: from 1.2.3.4[500] to 17.11.7.5[500]  
>> (212 bytes)
>>                     received packet: from 17.11.7.5[500] to  
>> 1.2.3.4[500] (116 bytes)
>>                     parsed ID_PROT response 0 [ SA V V ]
>>                     received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
>>                     received FRAGMENTATION vendor ID
>>                     generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
>>                     sending packet: from 1.2.3.4[500] to 17.11.7.5[500]  
>> (244 bytes)
>>                     received packet: from 17.11.7.5[500] to  
>> 1.2.3.4[500] (304 bytes)
>>                     parsed ID_PROT response 0 [ KE No V V V V NAT-D  
>> NAT-D ]
>>                     received Cisco Unity vendor ID
>>                     received XAuth vendor ID
>>                     received unknown vendor ID: [Available On Request]
>>                     received unknown vendor ID: [Available On Request]
>>                     local host is behind NAT, sending keep alives
>>                     generating ID_PROT request 0 [ ID HASH  
>> N(INITIAL_CONTACT) ]
>>                     sending packet: from 1.2.3.4[4500] to  
>> 17.11.7.5[4500] (84 bytes)
>>                     received packet: from 17.11.7.5[4500] to  
>> 1.2.3.4[4500] (84 bytes)
>>                     parsed ID_PROT response 0 [ ID HASH V ]
>>                     received DPD vendor ID
>>                     IKE_SA VPN-OFFICE-COM[1] established between
>>                     1.2.3.4[1.2.3.4]...17.11.7.5[17.11.7.5]
>>                     generating QUICK_MODE request [Available On  
>> Request] [ HASH SA No ID ID
>>                     NAT-OA NAT-OA ]
>>                     sending packet: from 1.2.3.4[4500] to  
>> 17.11.7.5[4500] (220 bytes)
>>                     received packet: from 17.11.7.5[4500] to  
>> 1.2.3.4[4500] (180 bytes)
>>                     parsed QUICK_MODE response [Available On Request] [  
>> HASH SA No ID ID
>>                     N((24576)) NAT-OA ]
>>                     received 28800s lifetime, configured 0s
>>                     no acceptable traffic selectors found
>>                     establishing connection 'VPN-OFFICE-COM' failed
>>
>>
>>
>>                     --
>>                     Kind regards
>>
>>
>>                     Stephen Feyrer
>>
>>
>>
>>
>>         --
>>         Kind regards
>>
>>
>>         Stephen Feyrer
>>
>>
>>
>>
>> --
>> Kind regards
>>
>>
>> Stephen Feyrer
>>
>>
>> _______________________________________________
>> Users mailing list
>> Users at lists.strongswan.org
>> https://lists.strongswan.org/mailman/listinfo/users
>>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2
>
> iQIcBAEBCAAGBQJVNNzJAAoJEDg5KY9j7GZY8z0QAJ7703tO6Unb5O/6wc8ImHck
> hDLKZj0wrlMDD/uDCWVA7bbi//HmIeFqnf032GzeTQLTUAeEwUyght8ocoBImmr2
> yiT3D9KkXlRzixKs8Ci/CSvfzW49wjz7ZEO3MgMGzZDi1yYJJ3sNbzBUKAbxbGDC
> djFeQkNWuIVRoCylj3E0ND5qM2i5Qkt9tuqpLw3YKniCQiWjJMvNp7Kie/0fYL94
> jbjlydABLuIlJX09QISUCrrdi6sho+d0OOOwh6kJEhpXc0ED/I2KCSfjAzC2MKbc
> Dhfesz5HMmpWKYMvws7KW/kfvbm+Mhu8CyUCrgpJ7fKc4tsLrmTlFovZfgd04vk4
> aMhXGkWBVZUmBksF4gOk7nkeNlAXgd3fcsDdm7crD1o1tfPnR0QLQMfDJzX2AXky
> mvYPiZQ1LYNmL+V8AqK7h4lUwrpFK5Eh7rWaejxHKmC7HQ2exjdvjRkmS3Am1AAf
> HvCxkiHyFMqhtti3I1tKq+N5aiU4ybz0UyjJ1rQVYJLNZPYmZk6oJry8gmC//JWK
> 0h8zkbwFitwunclN+B+Ls1FUNFZIkhhHySO87GgcNR1Yoj2D8znk5vv4KxKGgHZx
> SDa+RR8w8AgQ1GYU0J+GqBDshWzTPM1hPM4yn+72y/6nLx0nukIzAoecoKM7QtoW
> B3txnEFN/Q7sF0xYi08t
> =kk8O
> -----END PGP SIGNATURE-----
> _______________________________________________
> Users mailing list
> Users at lists.strongswan.org
> https://lists.strongswan.org/mailman/listinfo/users


-- 
Kind regards


Stephen Feyrer


More information about the Users mailing list