[strongSwan] /etc/strongswan.d/VPN.conf:1: syntax error, unexpected NAME, expecting NEWLINE or '{' or '=' [vpn]
Stephen Feyrer
stephen.feyrer at btinternet.com
Wed Apr 22 11:04:17 CEST 2015
Hi,
I would just like to say thank you to everyone. On point irony, I learned
yesterday that today the office network is being upgraded and the current
VPN will no longer work.
Thank you for your help, I'm sorry I can report back a solution. I wish
you all the best.
--
Kind regards
Stephen Feyrer.
On Mon, 20 Apr 2015 12:02:36 +0100, Noel Kuntze <noel at familie-kuntze.de>
wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> Hello Stephen,
>
> Your original configuration looks like l2tp/IPsec.
> Your configuration was correct for that purpose.
> Where this is going right now, is a general roadwarrior configuration
> for IKEv1.
> Please check what is actually configured on the IOS device, so
> we can solve this quickly.
>
> Mit freundlichen Grüßen/Regards,
> Noel Kuntze
>
> Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658
>
> Am 20.04.2015 um 11:01 schrieb Stephen Feyrer:
>> Hi Miroslav,
>>
>> Thank you.
>>
>> We've made progress. I haven't included the any of the log file as it
>> is very verbose (24488 lines - for ipsec up, statusall, down). Please
>> let me know which sections to look at and I'll grab those.
>>
>> As you can see below the transaction request below seems to be very
>> laboured but does result in a success statement. Following that I have
>> tried to test with openl2tp to create the l2tp ppp tunnel. Openl2tp
>> seems create this tunnel but ifconfig does not show any ppp interfaces.
>>
>> The lines in the conn left/rightprotoport do not seem to affect the
>> outcome whether included or not. The charondebug line when uncommented
>> prevents any output and I suspect that the syntax is wrong there.
>>
>>
>>
>> code:
>>
>> # ipsec.conf - strongSwan IPsec configuration file
>>
>> # basic configuration
>>
>> config setup
>> # strictcrlpolicy=yes
>> # uniqueids = no
>> # charondebug="ike 3, cfg 3, app 3, chd 3, dmn 3, net 3"
>>
>> conn VPN-OFFICE-COM
>> keyexchange=ikev1
>> type=tunnel
>> authby=secret
>> ike=3des-sha1-modp1024
>> rekey=no
>> left=%any
>> leftsourceip=%config
>> # leftprotoport=udp/l2tp
>> right=vpn.office.com
>> # rightprotoport=udp/l2tp
>> rightid=17.11.7.5
>> rightsubnet=0.0.0.0/0
>> auto=add
>>
>>
>> # ipsec up VPN-OFFICE-COM
>> initiating Main Mode IKE_SA VPN-OFFICE-COM[1] to 17.11.7.5
>> generating ID_PROT request 0 [ SA V V V V ]
>> sending packet: from 1.2.3.4[500] to 17.11.7.5[500] (212 bytes)
>> received packet: from 17.11.7.5[500] to 1.2.3.4[500] (116 bytes)
>> parsed ID_PROT response 0 [ SA V V ]
>> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
>> received FRAGMENTATION vendor ID
>> generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
>> sending packet: from 1.2.3.4[500] to 17.11.7.5[500] (244 bytes)
>> received packet: from 17.11.7.5[500] to 1.2.3.4[500] (304 bytes)
>> parsed ID_PROT response 0 [ KE No V V V V NAT-D NAT-D ]
>> received Cisco Unity vendor ID
>> received XAuth vendor ID
>> received unknown vendor ID: [HIDDEN]
>> received unknown vendor ID: [HIDDEN]
>> local host is behind NAT, sending keep alives
>> generating ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
>> sending packet: from 1.2.3.4[4500] to 17.11.7.5[4500] (84 bytes)
>> received packet: from 17.11.7.5[4500] to 1.2.3.4[4500] (84 bytes)
>> parsed ID_PROT response 0 [ ID HASH V ]
>> received DPD vendor ID
>> IKE_SA VPN-OFFICE-COM[1] established between
>> 1.2.3.4[1.2.3.4]...17.11.7.5[17.11.7.5]
>> generating TRANSACTION request [HIDDEN] [ HASH CPRQ(ADDR DNS U_SPLITINC
>> U_LOCALLAN) ]
>> sending packet: from 1.2.3.4[4500] to 17.11.7.5[4500] (84 bytes)
>> sending retransmit 1 of request message ID [HIDDEN], seq 4
>> sending packet: from 1.2.3.4[4500] to 17.11.7.5[4500] (84 bytes)
>> sending retransmit 2 of request message ID [HIDDEN], seq 4
>> sending packet: from 1.2.3.4[4500] to 17.11.7.5[4500] (84 bytes)
>> sending retransmit 3 of request message ID [HIDDEN], seq 4
>> sending packet: from 1.2.3.4[4500] to 17.11.7.5[4500] (84 bytes)
>> received packet: from 17.11.7.5[4500] to 1.2.3.4[4500] (84 bytes)
>> parsed INFORMATIONAL_V1 request [HIDDEN] [ HASH N(DPD) ]
>> received packet: from 17.11.7.5[4500] to 1.2.3.4[4500] (84 bytes)
>> parsed INFORMATIONAL_V1 request [HIDDEN] [ HASH N(DPD) ]
>> received packet: from 17.11.7.5[4500] to 1.2.3.4[4500] (84 bytes)
>> parsed INFORMATIONAL_V1 request [HIDDEN] [ HASH N(DPD) ]
>> sending keep alive to 17.11.7.5[4500]
>> sending retransmit 4 of request message ID [HIDDEN], seq 4
>> sending packet: from 1.2.3.4[4500] to 17.11.7.5[4500] (84 bytes)
>> received packet: from 17.11.7.5[4500] to 1.2.3.4[4500] (84 bytes)
>> parsed INFORMATIONAL_V1 request [HIDDEN] [ HASH D ]
>> received DELETE for IKE_SA VPN-OFFICE-COM[1]
>> deleting IKE_SA VPN-OFFICE-COM[1] between
>> 1.2.3.4[1.2.3.4]...17.11.7.5[17.11.7.5]
>> initiating Main Mode IKE_SA VPN-OFFICE-COM[2] to 17.11.7.5
>> generating ID_PROT request 0 [ SA V V V V ]
>> sending packet: from 1.2.3.4[500] to 17.11.7.5[500] (212 bytes)
>> connection 'VPN-OFFICE-COM' established successfully
>>
>>
>> # ipsec statusall
>> Status of IKE charon daemon (strongSwan 5.2.2, Linux 3.16.5-gentoo,
>> x86_64):
>> uptime: 112 seconds, since Apr 20 09:23:17 2015
>> malloc: sbrk [HIDDEN], mmap 0, used [HIDDEN], free [HIDDEN]
>> worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0,
>> scheduled: 2
>> loaded plugins: charon ldap mysql sqlite aes des rc2 sha1 sha2 md4 md5
>> random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8
>> pkcs12 pgp dnskey sshkey pem openssl gcrypt fips-prf gmp xcbc cmac hmac
>> curl attr kernel-netlink resolve socket-default socket-dynamic farp
>> stroke vici updown eap-identity eap-sim eap-aka eap-aka-3gpp2
>> eap-simaka-pseudonym eap-simaka-reauth eap-md5 eap-gtc eap-mschapv2
>> eap-radius eap-tls xauth-generic xauth-eap xauth-pam dhcp lookip led
>> unity
>> Listening IP addresses:
>> 1.2.3.4
>> Connections:
>> VPN-OFFICE-COM: %any...vpn.office.com IKEv1
>> VPN-OFFICE-COM: local: [1.2.3.4] uses pre-shared key authentication
>> VPN-OFFICE-COM: remote: [17.11.7.5] uses pre-shared key authentication
>> VPN-OFFICE-COM: child: dynamic[udp/l2tp] === 172.18.7.0/24[udp/l2tp]
>> TUNNEL
>> Security Associations (1 up, 0 connecting):
>> VPN-OFFICE-COM[2]: ESTABLISHED 40 seconds ago,
>> 1.2.3.4[1.2.3.4]...17.11.7.5[17.11.7.5]
>> VPN-OFFICE-COM[2]: IKEv1 SPIs: [HIDDEN]_i* [HIDDEN]_r, rekeying disabled
>> VPN-OFFICE-COM[2]: IKE proposal:
>> 3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
>> VPN-OFFICE-COM[2]: Tasks queued: QUICK_MODE ISAKMP_DPD ISAKMP_DPD
>> ISAKMP_DPD
>> VPN-OFFICE-COM[2]: Tasks active: MODE_CONFIG
>>
>>
>> # ipsec down VPN-OFFICE-COM
>> received packet: from 17.11.7.5[4500] to 1.2.3.4[4500] (84 bytes)
>> parsed INFORMATIONAL_V1 request [HIDDEN] [ HASH D ]
>> received DELETE for IKE_SA VPN-OFFICE-COM[2]
>> deleting IKE_SA VPN-OFFICE-COM[2] between
>> 1.2.3.4[1.2.3.4]...17.11.7.5[17.11.7.5]
>> initiating Main Mode IKE_SA VPN-OFFICE-COM[3] to 17.11.7.5
>> generating ID_PROT request 0 [ SA V V V V ]
>> sending packet: from 1.2.3.4[500] to 17.11.7.5[500] (212 bytes)
>> IKE_SA [2] closed successfully
>>
>>
>>
>>
>> --
>> Kind regards
>>
>> Stephen Feyrer
>>
>>
>>
>> On Mon, 20 Apr 2015 00:57:42 +0100, Miroslav Svoboda
>> <goodmirek at goodmirek.cz> wrote:
>>
>> Hi Stephen,
>>
>> Please delete type=transport or change it to type=tunnel.
>> Also delete rightprotoport and leftprotoport.
>>
>> If this did not help, please provide again ipsec statusall + enable
>> logging at higher level as described here
>> <https://wiki.strongswan.org/projects/strongswan/wiki/LoggerConfiguration>
>> and provide logfile.
>>
>> Regards,
>> Miroslav
>>
>> On Monday, April 20, 2015 at 1:47:48 AM UTC+2, Stephen Feyrer wrote:
>>
>> Hi Miroslav,
>>
>> You are correct, the syntax error is gone. Sadly, there is not
>> much which I can tell you about my office Network topology. All that I
>> do know is that we pass through a Windows Firewall before being able to
>> connect our work stations.
>>
>>
>> code:
>>
>> # ipsec.conf - strongSwan IPsec configuration file
>>
>> # basic configuration
>>
>> config setup
>> # strictcrlpolicy=yes
>> # uniqueids = no
>>
>> conn VPN-OFFICE-COM
>> keyexchange=ikev1
>> type=transport
>> authby=secret
>> ike=3des-sha1-modp1024
>> rekey=no
>> left=%any
>> leftsourceip=%config
>> leftprotoport=udp/l2tp
>> right=vpn.office.com <http://vpn.office.com>
>> rightprotoport=udp/l2tp
>> rightid=17.11.7.5
>> rightsubnet=0.0.0.0/0 <http://0.0.0.0/0>
>> auto=add
>>
>>
>>
>> # ipsec up VPN-OFFICE-COM
>> initiating Main Mode IKE_SA VPN-OFFICE-COM[14] to 17.11.7.5
>> generating ID_PROT request 0 [ SA V V V V ]
>> sending packet: from 1.2.3.4[500] to 17.11.7.5[500] (212 bytes)
>> received packet: from 17.11.7.5[500] to 1.2.3.4[500] (116 bytes)
>> parsed ID_PROT response 0 [ SA V V ]
>> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
>> received FRAGMENTATION vendor ID
>> generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
>> sending packet: from 1.2.3.4[500] to 17.11.7.5[500] (244 bytes)
>> received packet: from 17.11.7.5[500] to 1.2.3.4[500] (304 bytes)
>> parsed ID_PROT response 0 [ KE No V V V V NAT-D NAT-D ]
>> received Cisco Unity vendor ID
>> received XAuth vendor ID
>> received unknown vendor ID: [HIDDEN]
>> received unknown vendor ID: [HIDDEN]
>> local host is behind NAT, sending keep alives
>> generating ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
>> sending packet: from 1.2.3.4[4500] to 17.11.7.5[4500] (84 bytes)
>> received packet: from 17.11.7.5[4500] to 1.2.3.4[4500] (84
>> bytes)
>> parsed ID_PROT response 0 [ ID HASH V ]
>> received DPD vendor ID
>> IKE_SA VPN-OFFICE-COM[14] established between
>> 1.2.3.4[1.2.3.4]...17.11.7.5[17.11.7.5]
>> generating QUICK_MODE request [HIDDEN] [ HASH SA No ID ID
>> NAT-OA NAT-OA ]
>> sending packet: from 1.2.3.4[4500] to 17.11.7.5[4500] (220
>> bytes)
>> received packet: from 17.11.7.5[4500] to 1.2.3.4[4500] (180
>> bytes)
>> parsed QUICK_MODE response [HIDDEN] [ HASH SA No ID ID
>> N(([HIDDEN])) NAT-OA ]
>> received 28800s lifetime, configured 0s
>> no acceptable traffic selectors found
>> establishing connection 'VPN-OFFICE-COM' failed
>>
>>
>> # ipsec statusall
>> Status of IKE charon daemon (strongSwan 5.2.2, Linux
>> 3.16.5-gentoo, x86_64):
>> uptime: 3 hours, since Apr 19 20:50:15 2015
>> malloc: sbrk [HIDDEN], mmap 0, used [HIDDEN], free [HIDDEN]
>> worker threads: 11 of 16 idle, 5/0/0/0 working, job queue:
>> 0/0/0/0, scheduled: 1
>> loaded plugins: charon ldap mysql sqlite aes des rc2 sha1 sha2
>> md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7
>> pkcs8 pkcs12 pgp dnskey sshkey pem openssl gcrypt fips-prf gmp xcbc
>> cmac hmac curl attr kernel-netlink resolve socket-default
>> socket-dynamic farp stroke vici updown eap-identity eap-sim eap-aka
>> eap-aka-3gpp2 eap-simaka-pseudonym eap-simaka-reauth eap-md5 eap-gtc
>> eap-mschapv2 eap-radius eap-tls xauth-generic xauth-eap xauth-pam dhcp
>> lookip led unity
>> Listening IP addresses:
>> 1.2.3.4
>> Connections:
>> VPN-OFFICE-COM: %any...vpn.office.com <http://vpn.office.com>
>> IKEv1
>> VPN-OFFICE-COM: local: [1.2.3.4] uses pre-shared key
>> authentication
>> VPN-OFFICE-COM: remote: [17.11.7.5] uses pre-shared key
>> authentication
>> VPN-OFFICE-COM: child: dynamic[udp/l2tp] === dynamic[udp/l2tp]
>> TRANSPORT
>> Security Associations (1 up, 0 connecting):
>> VPN-OFFICE-COM[14]: ESTABLISHED 6 seconds ago,
>> 1.2.3.4[1.2.3.4]...17.11.7.5[17.11.7.5]
>> VPN-OFFICE-COM[14]: IKEv1 SPIs: [HIDDEN]_i* [HIDDEN]_r,
>> rekeying disabled
>> VPN-OFFICE-COM[14]: IKE proposal:
>> 3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
>>
>>
>> Thank you for your help. I hope this tells you more than it
>> does me.
>>
>>
>> --
>> Kind regards
>>
>> Stephen Feyrer.
>>
>>
>>
>> On Sun, 19 Apr 2015 09:11:04 +0100, Miroslav Svoboda
>> <good... at goodmirek.cz <javascript:>> wrote:
>>
>> Hi Stephen,
>>
>> So I assume there is no longer any syntax error reported.
>>
>> From logfile I see there is no acceptable traffic selector.
>> I assume that you have a home PC (Ubuntu) with Strongswan which you
>> want to connect to the office VPN concentrator with IP 17.11.7.5
>> running Windows. I suppose VPN concentrator in the office is not
>> configured to route any traffic towards you home PC's IP address, thus
>> you will need a virtual IP address assigned to your home PC by the VPN
>> concentrator. Also I suppose you want to route all traffic via that VPN
>> once connected.
>> Then, please try to modify "left=%defaultroute" to
>> "left=%any" and add "rightsubnet=0.0.0.0/0 <http://0.0.0.0/0>" and
>> "leftsourceip=%config". You should not specify "leftsubnet", it has
>> same effect as "leftsubnet=%dynamic".
>> According to documentation at wiki
>> <https://wiki.strongswan.org/projects/strongswan/wiki/ConnSection>
>> configuration directive "left=defaultroute%" was used prior to version
>> 5.0.0, superseded by "left=%any".
>> leftsubnet=%dynamic (or omitting leftsubnet at all) and
>> rightsubnet=0.0.0.0/0 <http://0.0.0.0/0> will create your traffic
>> selector. It says that anything (0.0.0.0/0 <http://0.0.0.0/0>) from
>> your side will be routed to remote host and that the remote host will
>> route towards your PC (left==local) a traffic which would fit your
>> dynamically assigned IP. Should you want to route towards office
>> network only office-related traffic then change
>> "rightsubnet=<subnet_used_in_Stephen's_office>".
>>
>> If that didn't help please can you provide output of 'ipsec
>> statusall' and also more details about network topology?
>>
>> Regards,
>> Miroslav
>>
>> On Saturday, April 18, 2015 at 5:28:12 PM UTC+2, Stephen
>> Feyrer wrote:
>>
>> Hi Miroslav,
>>
>> Thank you. The conn section as presented below was
>> copied and pasted from web page for convenience (this stripped the
>> leading white spaced from the conn section). For the moment the white
>> spaces are in form of TAB characters. I will test with space
>> characters and complete this email.
>>
>> I Apologise for the lack of white spaces in the conn
>> section of below email. I have now tested with both spaces and tabs,
>> each producing the same error as below.
>>
>>
>> --
>> Kind regards
>>
>> Stephen Feyrer.
>>
>>
>> On Sat, 18 Apr 2015 13:25:20 +0100, Miroslav Svoboda
>> <good... at goodmirek.cz> wrote:
>>
>> Hi Stephen,
>>
>> I believe the issue might be caused as the "conn"
>> section is not compliant with prescribed format. There should be at
>> least one whitespace at the beginning of each line within the section.
>> Only sections can and shall start at the first character of the line.
>>
>> Supposed correction:
>> *conn VPN-OFFICE-COM*
>> * keyexchange=ikev1*
>> * **type=transport*
>> * **authby=secret*
>> * **ike=3des-sha1-modp1024*
>> * **rekey=no*
>> * **left=%defaultroute*
>> * **leftprotoport=udp/l2tp*
>> * **right=vpn.office.com <http://vpn.office.com>*
>> * **rightprotoport=udp/l2tp*
>> * **rightid=17.11.7.5*
>> * **auto=add*
>>
>> Regards,
>> Miroslav
>>
>> Message: 3
>> Date: Fri, 17 Apr 2015 14:08:57 +0100
>> From: "Stephen Feyrer" <stephen... at btinternet.com>
>> To: us... at lists.strongswan.org
>> Subject: Re: [strongSwan]
>> /etc/strongswan.d/VPN.conf:1: syntax error,
>> unexpected NAME, expecting NEWLINE or '{'
>> or '=' [vpn]
>> Message-ID: <op.xw8ms... at sveta.home.org>
>> Content-Type: text/plain; charset=utf-8;
>> format=flowed; delsp=yes
>>
>> Hi Neol,
>>
>> Thank you. I have removed the file
>> /etc/strongswan.d/VPN.conf
>>
>> In /etc/ipsec.conf I have the same configuration.
>> At least there is
>> progress, unfortunately I am still baffled. This
>> is the previously
>> working configuration.
>>
>> code:
>>
>> # ipsec.conf - strongSwan IPsec configuration file
>>
>> # basic configuration
>>
>> config setup
>> # strictcrlpolicy=yes
>> # uniqueids = no
>>
>> conn VPN-OFFICE-COM
>> keyexchange=ikev1
>> type=transport
>> authby=secret
>> ike=3des-sha1-modp1024
>> rekey=no
>> left=%defaultroute
>> leftprotoport=udp/l2tp
>> right=vpn.office.com <http://vpn.office.com>
>> rightprotoport=udp/l2tp
>> rightid=17.11.7.5
>> auto=add
>>
>>
>> Having restarted ipsec, I get the following result
>>
>> code:
>>
>> # ipsec up VPN-OFFICE-COM
>> initiating Main Mode IKE_SA VPN-OFFICE-COM[1] to
>> 17.11.7.5
>> generating ID_PROT request 0 [ SA V V V V ]
>> sending packet: from 1.2.3.4[500] to 17.11.7.5[500]
>> (212 bytes)
>> received packet: from 17.11.7.5[500] to
>> 1.2.3.4[500] (116 bytes)
>> parsed ID_PROT response 0 [ SA V V ]
>> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
>> received FRAGMENTATION vendor ID
>> generating ID_PROT request 0 [ KE No NAT-D NAT-D ]
>> sending packet: from 1.2.3.4[500] to 17.11.7.5[500]
>> (244 bytes)
>> received packet: from 17.11.7.5[500] to
>> 1.2.3.4[500] (304 bytes)
>> parsed ID_PROT response 0 [ KE No V V V V NAT-D
>> NAT-D ]
>> received Cisco Unity vendor ID
>> received XAuth vendor ID
>> received unknown vendor ID: [Available On Request]
>> received unknown vendor ID: [Available On Request]
>> local host is behind NAT, sending keep alives
>> generating ID_PROT request 0 [ ID HASH
>> N(INITIAL_CONTACT) ]
>> sending packet: from 1.2.3.4[4500] to
>> 17.11.7.5[4500] (84 bytes)
>> received packet: from 17.11.7.5[4500] to
>> 1.2.3.4[4500] (84 bytes)
>> parsed ID_PROT response 0 [ ID HASH V ]
>> received DPD vendor ID
>> IKE_SA VPN-OFFICE-COM[1] established between
>> 1.2.3.4[1.2.3.4]...17.11.7.5[17.11.7.5]
>> generating QUICK_MODE request [Available On
>> Request] [ HASH SA No ID ID
>> NAT-OA NAT-OA ]
>> sending packet: from 1.2.3.4[4500] to
>> 17.11.7.5[4500] (220 bytes)
>> received packet: from 17.11.7.5[4500] to
>> 1.2.3.4[4500] (180 bytes)
>> parsed QUICK_MODE response [Available On Request] [
>> HASH SA No ID ID
>> N((24576)) NAT-OA ]
>> received 28800s lifetime, configured 0s
>> no acceptable traffic selectors found
>> establishing connection 'VPN-OFFICE-COM' failed
>>
>>
>>
>> --
>> Kind regards
>>
>>
>> Stephen Feyrer
>>
>>
>>
>>
>> --
>> Kind regards
>>
>>
>> Stephen Feyrer
>>
>>
>>
>>
>> --
>> Kind regards
>>
>>
>> Stephen Feyrer
>>
>>
>> _______________________________________________
>> Users mailing list
>> Users at lists.strongswan.org
>> https://lists.strongswan.org/mailman/listinfo/users
>>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2
>
> iQIcBAEBCAAGBQJVNNzJAAoJEDg5KY9j7GZY8z0QAJ7703tO6Unb5O/6wc8ImHck
> hDLKZj0wrlMDD/uDCWVA7bbi//HmIeFqnf032GzeTQLTUAeEwUyght8ocoBImmr2
> yiT3D9KkXlRzixKs8Ci/CSvfzW49wjz7ZEO3MgMGzZDi1yYJJ3sNbzBUKAbxbGDC
> djFeQkNWuIVRoCylj3E0ND5qM2i5Qkt9tuqpLw3YKniCQiWjJMvNp7Kie/0fYL94
> jbjlydABLuIlJX09QISUCrrdi6sho+d0OOOwh6kJEhpXc0ED/I2KCSfjAzC2MKbc
> Dhfesz5HMmpWKYMvws7KW/kfvbm+Mhu8CyUCrgpJ7fKc4tsLrmTlFovZfgd04vk4
> aMhXGkWBVZUmBksF4gOk7nkeNlAXgd3fcsDdm7crD1o1tfPnR0QLQMfDJzX2AXky
> mvYPiZQ1LYNmL+V8AqK7h4lUwrpFK5Eh7rWaejxHKmC7HQ2exjdvjRkmS3Am1AAf
> HvCxkiHyFMqhtti3I1tKq+N5aiU4ybz0UyjJ1rQVYJLNZPYmZk6oJry8gmC//JWK
> 0h8zkbwFitwunclN+B+Ls1FUNFZIkhhHySO87GgcNR1Yoj2D8znk5vv4KxKGgHZx
> SDa+RR8w8AgQ1GYU0J+GqBDshWzTPM1hPM4yn+72y/6nLx0nukIzAoecoKM7QtoW
> B3txnEFN/Q7sF0xYi08t
> =kk8O
> -----END PGP SIGNATURE-----
> _______________________________________________
> Users mailing list
> Users at lists.strongswan.org
> https://lists.strongswan.org/mailman/listinfo/users
--
Kind regards
Stephen Feyrer
More information about the Users
mailing list