[strongSwan] Virtual IP
Noel Kuntze
noel.kuntze+strongswan-users-ml at thermi.consulting
Mon Mar 26 01:02:35 CEST 2018
Just use two conn definitions. One for your LAN and one for the initiators on the Internet.
On 26.03.2018 00:53, Info wrote:
>
> I'd rather not use a Virtual IP. I'd rather use the 192.168.1.0/24 addresses already assigned to all devices in the LAN and outside it. I'd like all devices to communicate transparently, whether local or remote.
>
> So it's requiring a VIP. But when I assign a VIP I get the log at bottom.
>
> So to swanctl.cnf I add to strategic places:
>
> pools = primary-pool-ipv4
>
> local_addrs 10.0.0.1
>
> pools {
> primary-pool-ipv4 {
> addrs = 10.0.0.0/24
> }
> }
>
> ... and then the VPN connects from the phone. And strangely, even though 10.0.0.1 is defined in the IPSec gateway as the -local- address, it becomes the address of the tun interface /on the phone/ running the Strongswan app. And there is no evident corresponding 10.0.0.0/24 address assigned in the IPSec gateway.
>
> So from the phone I try to ping the 192.168.1.16 address of the IPSec gateway, but those pings fail because they go out the main public IP of the phone rather than out the tun, even though the app is set to route all traffic through VPN. Isn't the routing table set up by the app?
>
>
> Sun, 2018-03-25 15:08 13[CFG] vici client 1 disconnected
> Sun, 2018-03-25 15:09 15[NET] <1> received packet: from 172.56.42.154[54254] to 192.168.1.16[500] (704 bytes)
> Sun, 2018-03-25 15:09 15[ENC] <1> parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
> Sun, 2018-03-25 15:09 15[CFG] <1> looking for an ike config for 192.168.1.16...172.56.42.154
> Sun, 2018-03-25 15:09 15[CFG] <1> candidate: %any...%any, prio 28
> Sun, 2018-03-25 15:09 15[CFG] <1> found matching ike config: %any...%any with prio 28
> Sun, 2018-03-25 15:09 15[IKE] <1> 172.56.42.154 is initiating an IKE_SA
> Sun, 2018-03-25 15:09 15[IKE] <1> IKE_SA (unnamed)[1] state change: CREATED => CONNECTING
> Sun, 2018-03-25 15:09 15[CFG] <1> selecting proposal:
> Sun, 2018-03-25 15:09 15[CFG] <1> proposal matches
> Sun, 2018-03-25 15:09 15[CFG] <1> received proposals: IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/HMAC_SHA1_96/AES_XCBC_96/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_XCBC/PRF_HM$
> Sun, 2018-03-25 15:09 15[CFG] <1> configured proposals: IKE:AES_CBC_128/AES_CBC_192/AES_CBC_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/AES_CTR_128/AES_CTR_192/AES_CTR_256/CAMELLIA_CTR_128/CAMELLIA_CTR_192/CAMELLIA_CTR_256/3DES_CBC/HMAC_SHA2_256_1$
> Sun, 2018-03-25 15:09 15[CFG] <1> selected proposal: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
> Sun, 2018-03-25 15:09 15[CFG] <1> received supported signature hash algorithms: sha256 sha384 sha512 identity
> Sun, 2018-03-25 15:09 15[IKE] <1> local host is behind NAT, sending keep alives
> Sun, 2018-03-25 15:09 15[IKE] <1> remote host is behind NAT
> Sun, 2018-03-25 15:09 15[CFG] <1> sending supported signature hash algorithms: sha1 sha256 sha384 sha512 identity
> Sun, 2018-03-25 15:09 15[IKE] <1> sending cert request for "C=US, O=Quantum, CN=quantum-equities.com CA"
> Sun, 2018-03-25 15:09 15[ENC] <1> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
> Sun, 2018-03-25 15:09 15[NET] <1> sending packet: from 192.168.1.16[500] to 172.56.42.154[54254] (299 bytes)
> Sun, 2018-03-25 15:09 06[NET] <1> received packet: from 172.56.42.154[49244] to 192.168.1.16[4500] (1364 bytes)
> Sun, 2018-03-25 15:09 06[ENC] <1> parsed IKE_AUTH request 1 [ EF(1/8) ]
> Sun, 2018-03-25 15:09 06[ENC] <1> received fragment #1 of 8, waiting for complete IKE message
> Sun, 2018-03-25 15:09 05[NET] <1> received packet: from 172.56.42.154[49244] to 192.168.1.16[4500] (1364 bytes)
> Sun, 2018-03-25 15:09 05[ENC] <1> parsed IKE_AUTH request 1 [ EF(2/8) ]
> Sun, 2018-03-25 15:09 05[ENC] <1> received fragment #2 of 8, waiting for complete IKE message
> Sun, 2018-03-25 15:09 16[NET] <1> received packet: from 172.56.42.154[49244] to 192.168.1.16[4500] (1364 bytes)
> Sun, 2018-03-25 15:09 16[ENC] <1> parsed IKE_AUTH request 1 [ EF(3/8) ]
> Sun, 2018-03-25 15:09 16[ENC] <1> received fragment #3 of 8, waiting for complete IKE message
> Sun, 2018-03-25 15:09 07[NET] <1> received packet: from 172.56.42.154[49244] to 192.168.1.16[4500] (1364 bytes)
> Sun, 2018-03-25 15:09 07[ENC] <1> parsed IKE_AUTH request 1 [ EF(4/8) ]
> Sun, 2018-03-25 15:09 07[ENC] <1> received fragment #4 of 8, waiting for complete IKE message
> Sun, 2018-03-25 15:09 08[NET] <1> received packet: from 172.56.42.154[49244] to 192.168.1.16[4500] (1364 bytes)
> Sun, 2018-03-25 15:09 08[ENC] <1> parsed IKE_AUTH request 1 [ EF(5/8) ]
>
> Sun, 2018-03-25 15:09 08[NET] <1> received packet: from 172.56.42.154[49244] to 192.168.1.16[4500] (1364 bytes)
> Sun, 2018-03-25 15:09 08[ENC] <1> parsed IKE_AUTH request 1 [ EF(5/8) ]
> Sun, 2018-03-25 15:09 08[ENC] <1> received fragment #5 of 8, waiting for complete IKE message
> Sun, 2018-03-25 15:09 09[NET] <1> received packet: from 172.56.42.154[49244] to 192.168.1.16[4500] (1364 bytes)
> Sun, 2018-03-25 15:09 09[ENC] <1> parsed IKE_AUTH request 1 [ EF(6/8) ]
> Sun, 2018-03-25 15:09 09[ENC] <1> received fragment #6 of 8, waiting for complete IKE message
> Sun, 2018-03-25 15:09 10[NET] <1> received packet: from 172.56.42.154[49244] to 192.168.1.16[4500] (1364 bytes)
> Sun, 2018-03-25 15:09 10[ENC] <1> parsed IKE_AUTH request 1 [ EF(7/8) ]
> Sun, 2018-03-25 15:09 10[ENC] <1> received fragment #7 of 8, waiting for complete IKE message
> Sun, 2018-03-25 15:09 13[NET] <1> received packet: from 172.56.42.154[49244] to 192.168.1.16[4500] (1156 bytes)
> Sun, 2018-03-25 15:09 13[ENC] <1> parsed IKE_AUTH request 1 [ EF(8/8) ]
> Sun, 2018-03-25 15:09 13[ENC] <1> received fragment #8 of 8, reassembling fragmented IKE message
> Sun, 2018-03-25 15:09 13[ENC] <1> parsed IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 95:54:de:c2:b7:62:ff:80:33:b8:ab:e9:5e:58:0d:9c:11:1b:ad:88
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid f8:16:51:3c:fd:1b:44:9f:2e:6b:28:a1:97:22:1f:b8:1f:51:4e:3c
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 72:dc:1d:46:2d:0d:40:6a:3d:c1:be:c9:a7:b4:67:31:14:37:62:00
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 33:de:35:ca:82:a6:36:15:29:44:cd:f1:c7:8a:05:5a:cc:9c:1c:cd
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid c4:5c:9c:e6:c6:90:1d:48:b6:d3:50:ac:11:7d:74:1f:b6:02:08:14
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 83:31:7e:62:85:42:53:d6:d7:78:31:90:ec:91:90:56:e9:91:b9:e3
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid f7:93:19:ef:df:c1:f5:20:fb:ac:85:55:2c:f2:d2:8f:5a:b9:ca:0b
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 22:fe:59:a2:cf:8a:28:42:68:cf:ee:bd:68:44:d9:26:ba:2c:a8:36
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid e1:a0:5a:95:34:75:78:a7:ff:4d:cf:32:52:5d:f2:f8:2c:1a:e1:15
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid e6:ff:c3:94:e8:38:59:7f:51:d4:80:42:19:76:27:cf:db:94:8e:c6
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 87:e3:bf:32:24:27:c1:40:5d:27:36:c3:81:e0:1d:1a:71:d4:a0:39
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 9f:1d:85:2f:55:e5:60:c8:30:ad:bc:38:7f:e0:f5:94:bf:55:8d:87
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 84:62:1b:d1:3f:ae:0b:bc:27:35:ef:6c:b7:49:77:91:98:b8:b4:56
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 68:33:0e:61:35:85:21:59:29:83:a3:c8:d2:d2:e1:40:6e:7a:b3:c1
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 4a:81:0c:de:f0:c0:90:0f:19:06:42:31:35:a2:a2:8d:d3:44:fd:08
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 99:9b:76:54:0b:4a:9c:7a:35:ca:8f:0f:2e:aa:74:7a:0f:ae:c5:6e
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid e0:8c:9b:db:25:49:b3:f1:7c:86:d6:b2:42:87:0b:d0:6b:a0:d9:e4
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 80:fc:a2:0c:56:d9:5b:d9:71:c1:35:ed:24:60:13:6f:78:46:a9:2a
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid c5:30:21:e4:c8:4b:d1:a9:e9:de:e8:40:ba:6a:16:9f:77:92:8f:91
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 5e:4f:53:86:85:dd:4f:9e:ca:5f:dc:0d:45:6f:7d:51:b1:dc:9b:7b
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid e4:c5:74:59:46:f0:d1:04:7a:4c:38:d6:40:65:b2:a3:5d:47:89:0b
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid b0:a1:22:d9:47:c9:fe:15:01:5b:db:a6:f2:30:96:26:ad:eb:b2:57
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 36:12:c2:39:c5:22:b9:1e:20:d4:8e:08:3c:be:69:e1:1d:a8:27:e5
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 8c:cf:8c:87:8a:0e:9f:4a:c1:2e:eb:ad:58:d3:cb:1a:6a:66:78:6f
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid ea:67:0c:27:c1:60:9d:4b:0c:93:a2:ab:6f:e2:c4:67:15:6b:dc:70
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid ed:0d:c8:d6:2c:d3:13:29:d8:82:fe:2d:c3:fc:c5:10:d3:4d:bb:14
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 92:4b:70:ca:fe:4a:f4:45:ff:43:e5:54:df:56:00:f5:da:7a:6e:34
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 04:c3:a9:d0:11:cb:20:f7:c9:48:59:8c:ed:21:a9:f2:e8:9b:cf:11
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid b0:19:89:e7:ef:fb:4a:af:cb:14:8f:58:46:39:76:22:41:50:e1:ba
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid c8:95:13:68:01:97:28:0a:2c:55:c3:fc:d3:90:f5:3a:05:3b:c9:fb
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 5e:8c:53:18:22:60:1d:56:71:d6:6a:a0:cc:64:a0:60:07:43:d5:a8
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 79:23:d5:8d:0f:e0:3c:e6:ab:ad:ae:27:1a:6d:94:f4:14:d1:a8:73
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid b5:99:33:43:ac:a2:17:c5:08:ba:88:8c:a6:92:7e:26:b3:0f:87:a9
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 42:32:b6:16:fa:04:fd:fe:5d:4b:7a:c3:fd:f7:4c:40:1d:5a:43:af
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid fe:72:c8:eb:bf:0c:2f:bb:0e:26:13:93:93:3c:2c:a9:8d:dc:24:94
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid bc:e4:b7:23:12:55:98:e5:63:41:19:1c:50:e4:b6:47:c2:76:05:d7
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 87:db:d4:5f:b0:92:8d:4e:1d:f8:15:67:e7:f2:ab:af:d6:2b:67:75
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 14:8d:b3:54:ed:9b:2f:13:08:7c:c3:8b:4b:c1:5b:96:8a:c5:53:78
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid ff:9d:7f:8f:b2:95:ec:ab:f5:23:db:9b:e9:01:b5:98:f1:56:33:12
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid d5:2e:13:c1:ab:e3:49:da:e8:b4:95:94:ef:7c:38:43:60:64:66:bd
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 52:2c:46:fc:ee:2e:a4:be:b5:f1:01:a3:9d:d2:16:ba:d8:85:8e:b5
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 67:ec:9f:90:2d:cd:64:ae:fe:7e:bc:cd:f8:8c:51:28:f1:93:2c:12
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 99:80:bf:7c:f4:50:8b:a2:d0:4c:e3:a1:86:e4:f3:82:71:1e:0c:c7
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 73:97:82:ea:b4:04:16:6e:25:d4:82:3c:37:db:f8:a8:12:fb:cf:26
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 28:a4:ba:ee:61:3e:0a:b8:15:83:95:65:4e:4f:cc:13:c1:70:e3:e3
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 6a:eb:05:3a:66:ad:15:e0:99:8c:3d:65:a9:fd:1e:45:1e:b2:1e:d2
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid f7:f3:01:94:50:ba:3e:69:ec:9a:50:f5:02:d1:38:45:cc:93:13:72
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 8d:e1:3e:c8:1f:dc:ee:49:0d:b4:b4:26:04:71:e6:a6:a4:5b:50:21
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid c8:18:8f:7a:06:a9:9b:f5:79:dd:9f:88:96:af:d1:d9:1f:19:bc:2a
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 7c:d3:95:1f:f4:48:1b:32:cf:6b:e3:55:43:03:6d:0b:45:7d:72:26
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 71:38:36:f2:02:31:53:47:2b:6e:ba:65:46:a9:10:15:58:20:05:09
>
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 7c:d3:95:1f:f4:48:1b:32:cf:6b:e3:55:43:03:6d:0b:45:7d:72:26
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 71:38:36:f2:02:31:53:47:2b:6e:ba:65:46:a9:10:15:58:20:05:09
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 06:21:18:f5:72:6a:90:42:63:48:b1:5c:0d:d8:89:97:23:31:b8:f2
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid cf:58:aa:90:8d:58:39:76:1b:cf:4e:da:03:bf:81:8e:d1:d7:f8:9b
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid b3:86:36:7d:bc:e5:f8:4e:e2:8c:15:37:81:b2:1d:f5:3d:2c:15:cd
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 62:af:b7:5c:2a:a7:0d:ad:0d:3d:8d:cf:fb:10:9e:65:c6:16:c3:0b
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 6e:11:58:71:ad:6d:27:6f:f9:ab:93:30:c2:47:dd:f7:40:4e:e4:7f
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 3a:28:44:64:9f:20:e8:b1:05:bf:e9:d7:f5:66:33:61:51:ae:eb:51
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 8d:f0:0a:ad:7c:3f:4c:f3:42:75:e2:ec:19:bd:f3:28:e2:24:69:22
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid d3:94:8a:4c:62:13:2a:19:2e:cc:af:72:8a:7d:36:d7:9a:1c:dc:67
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 65:76:a0:be:70:42:6d:f1:17:f5:ed:9c:e4:6a:50:93:29:74:76:c3
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 20:b7:57:88:92:e7:a8:d6:71:d4:3b:ad:b3:cb:3c:54:34:5d:05:e2
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 6c:ca:bd:7d:b4:7e:94:a5:75:99:01:b6:a7:df:d4:5d:1c:09:1c:cc
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 19:16:f3:cc:e4:79:02:cb:4f:c9:80:7f:ed:03:be:c4:ac:27:4d:bc
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 62:94:19:ea:47:3f:f2:97:75:8d:d5:b3:20:61:04:34:ff:76:3e:1d
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid ba:42:b0:81:88:53:88:1d:86:63:bd:4c:c0:5e:08:fe:ea:6e:bb:77
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid a1:72:5f:26:1b:28:98:43:95:5d:07:37:d5:85:96:9d:4b:d2:c3:45
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 61:fe:bf:7c:ed:f9:e8:6f:34:5a:d8:a8:a1:d3:9e:68:6c:25:94:72
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 6a:25:23:9d:62:75:cd:52:21:69:5c:31:e9:89:c4:d5:38:b8:c4:ea
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 21:0f:2c:89:f7:c4:cd:5d:1b:82:5e:38:d6:c6:59:3b:a6:93:75:ae
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid f7:18:ea:38:39:89:f9:a6:4e:c9:3a:f0:e3:ed:0d:e8:f7:ef:33:61
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid b3:67:67:5a:fa:62:1d:c1:7a:6c:f4:e1:b7:bb:94:60:cf:03:bf:2f
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid c4:52:72:20:a9:58:c0:6e:9d:4b:f2:0b:21:12:3c:eb:3a:0b:6b:6f
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 4f:c7:18:9d:a5:be:c3:a2:a5:ba:f0:20:81:ff:4f:05:ed:87:43:8a
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 0f:ce:b2:63:28:ef:46:6c:00:d0:4e:6f:09:9a:b3:3e:2c:50:e5:d7
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid bc:f0:90:87:79:da:24:86:1d:2b:7c:49:a1:36:bd:06:ef:cd:ff:bf
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 5b:bf:1f:74:4a:e0:51:bd:61:7b:20:0d:bb:74:dc:26:8b:d1:3a:02
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 2a:7f:77:5e:36:3d:4a:f5:d1:cc:c6:ce:28:96:61:13:ea:2c:80:dc
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 48:2b:59:17:75:e2:61:7b:ef:c7:20:d3:7a:9c:ec:be:36:9e:84:e3
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 9c:a9:8d:00:af:74:0d:dd:81:80:d2:13:45:a5:8b:8f:2e:94:38:d6
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid bd:be:a7:1b:ab:71:57:f9:e4:75:d9:54:d2:b7:27:80:1a:82:26:82
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid bb:c2:3e:29:0b:b3:28:77:1d:ad:3e:a2:4d:bd:f4:23:bd:06:b0:3d
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 86:26:cb:1b:c5:54:b3:9f:bd:6b:ed:63:7f:b9:89:a9:80:f1:f4:8a
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 3e:51:59:8b:a7:6f:54:5c:77:24:c5:66:eb:aa:fb:3e:2b:f3:ac:4f
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid d7:c1:47:91:66:51:be:b9:52:ca:11:c9:90:3d:81:50:55:0f:b0:97
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid dd:00:92:e0:16:8e:ba:57:c2:67:d6:7d:0a:0a:4e:57:b6:cb:c6:c8
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 69:c4:27:db:59:69:68:18:47:e2:52:17:0a:e0:e5:7f:ab:9d:ef:0f
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid c4:30:28:c5:d3:e3:08:0c:10:44:8b:2c:77:ba:24:53:97:60:bb:f9
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 3c:b4:1a:84:2e:f5:5c:f2:1a:3d:a5:4a:c8:d1:be:39:08:76:37:bc
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 90:e2:41:c2:11:41:8b:95:b1:a9:e0:9c:37:24:7e:84:9f:e4:be:a1
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid c4:9c:12:7e:4b:e9:e5:5e:f4:64:77:26:2c:b6:d9:c9:34:2b:7c:38
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 3d:9f:4e:e4:17:1d:e9:cc:8c:cb:6b:ee:84:03:c2:cd:d7:bc:0b:9f
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 84:26:e7:2d:4e:c5:2d:07:8b:d9:95:6e:28:f6:b2:fd:9f:c2:7f:1d
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 7d:de:cf:64:e0:48:b7:5a:65:b2:8e:2f:1e:4c:f1:a8:88:d4:0c:f4
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 95:a3:72:ff:cd:41:d7:e9:fd:dd:3f:39:ac:27:0b:24:78:1e:d6:54
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 36:cc:c7:d8:28:e2:0a:ea:4e:80:70:dc:7f:77:11:93:3f:5e:bf:a7
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 92:ae:ef:0e:89:02:ee:6d:79:68:d1:a1:0e:75:60:01:fa:e4:eb:fc
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid ed:66:31:35:d3:1b:d4:ec:a6:14:c4:29:e3:19:06:9f:94:c1:26:50
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 28:56:84:3a:b6:d5:4a:8b:a3:bb:ae:9f:8a:77:73:74:5e:a5:5c:a8
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid c2:4e:45:22:d1:c3:2f:86:80:f7:4d:38:48:4b:74:e5:71:cd:17:cf
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid a5:9d:bf:90:15:d9:f1:f5:a8:d8:c0:1d:14:e6:f1:d8:c4:fe:57:17
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 7d:43:0e:0f:82:c9:6f:77:42:6b:67:8e:82:c4:cd:8b:52:e5:a1:ef
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid ee:e5:9f:1e:2a:a5:44:c3:cb:25:43:a6:9a:5b:d4:6a:25:bc:bb:8e
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 69:9f:1b:7a:e9:b8:da:18:49:6c:60:8b:ce:4f:4e:aa:f9:f0:b7:aa
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid ef:e7:12:24:86:fb:a2:84:08:e2:84:b1:7a:99:1d:0e:55:05:72:f9
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 23:4b:71:25:56:13:e1:30:dd:e3:42:69:c9:cc:30:d4:6f:08:41:e0
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 23:4b:71:25:56:13:e1:30:dd:e3:42:69:c9:cc:30:d4:6f:08:41:e0
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid a8:e3:02:96:70:a6:8b:57:eb:ec:ef:cc:29:4e:91:74:9a:d4:92:38
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid ab:76:88:f4:e5:e1:38:c9:e9:50:17:cd:cd:b3:18:17:b3:3e:8c:f5
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid b7:1a:8b:40:df:93:d0:5c:e0:98:03:08:91:59:6d:61:e8:15:f6:fe
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid a8:57:65:d6:e8:32:c8:c5:19:63:73:5a:9a:17:74:3a:81:df:ee:2e
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 7b:6d:b8:b0:b5:e5:85:0d:10:61:51:f0:3d:b0:f4:ff:40:8d:9e:a4
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid af:44:04:c2:41:7e:48:83:db:4e:39:02:ec:ec:84:7a:e6:ce:c9:a4
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 69:2f:44:0a:4e:9e:fc:f1:cb:fd:d9:73:5b:9d:3d:31:5b:ca:b6:c2
>
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid af:44:04:c2:41:7e:48:83:db:4e:39:02:ec:ec:84:7a:e6:ce:c9:a4
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 69:2f:44:0a:4e:9e:fc:f1:cb:fd:d9:73:5b:9d:3d:31:5b:ca:b6:c2
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 55:e4:81:d1:11:80:be:d8:89:b9:08:a3:31:f9:a1:24:09:16:b9:70
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid c0:7a:98:68:8d:89:fb:ab:05:64:0c:11:7d:aa:7d:65:b8:ca:cc:4e
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 4f:9c:7d:21:79:9c:ad:0e:d8:b9:0c:57:9f:1a:02:99:e7:90:f3:87
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 6e:58:4e:33:75:bd:57:f6:d5:42:1b:16:01:c2:d8:c0:f5:3a:9f:6e
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid ab:30:d3:af:4b:d8:f1:6b:58:69:ee:45:69:29:da:84:b8:73:94:88
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid b1:81:08:1a:19:a4:c0:94:1f:fa:e8:95:28:c1:24:c9:9b:34:ac:c7
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 3e:18:e5:44:f6:bd:4d:77:50:28:c9:40:3e:5c:74:f5:4c:d9:60:29
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid b3:03:7e:ae:36:bc:b0:79:d1:dc:94:26:b6:11:be:21:b2:69:86:94
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid f8:f6:fa:6b:26:1b:cc:64:62:12:46:30:d1:c5:99:15:cd:01:1f:cb
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 3b:37:c0:c5:47:3d:fc:5b:9a:0d:01:5b:12:3b:53:cc:ad:b7:54:66
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid a5:06:8a:78:cf:84:bd:74:32:dd:58:f9:65:eb:3a:55:e7:c7:80:dc
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid c5:f3:2d:52:54:06:7e:c2:b5:c3:5c:e3:63:f4:4a:b0:ec:69:21:99
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 27:04:fa:e0:a6:32:eb:18:4b:51:e4:c6:39:e1:35:10:6b:b5:ff:61
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid ef:66:52:d4:62:80:e8:ca:8e:37:df:49:1e:b1:c9:bc:fd:0a:1c:25
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 11:e4:91:d1:c9:e4:c0:eb:9a:ce:cf:73:54:5d:e1:f1:a8:30:3e:c3
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 8b:db:d7:cc:a0:68:53:42:16:f4:c1:2b:25:44:fc:02:9c:a5:8b:47
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 22:60:a7:83:31:ee:a4:c8:11:65:c3:b9:da:51:85:74:42:39:06:c5
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 63:45:e6:5f:05:b9:53:9e:b2:4e:03:b1:40:bb:b9:a7:50:6c:24:13
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid c6:4f:a2:3d:06:63:84:09:9c:ce:62:e4:04:ac:8d:5c:b5:e9:b6:1b
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid bb:2d:75:ce:17:2a:cc:df:05:d9:a8:6d:27:82:98:88:99:86:c8:91
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid e9:f1:a5:63:62:fb:f3:d3:51:12:11:b1:ae:9c:65:03:94:9e:c5:22
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 30:a4:e6:4f:de:76:8a:fc:ed:5a:90:84:28:30:46:79:2c:29:15:70
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 87:e8:5b:63:53:c6:23:a3:12:8c:b0:ff:bb:f5:51:fe:59:80:0e:22
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 97:c6:06:4d:83:c8:35:ac:68:43:ad:77:f5:f8:0e:a8:10:1a:1f:32
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 7d:9a:a9:f1:bf:20:29:ab:39:21:62:80:6d:2e:d5:be:12:83:02:e8
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 4c:75:d4:85:80:62:aa:a9:44:9c:66:15:1e:6c:58:13:05:3a:9c:72
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid f0:63:ba:7c:9a:16:74:4a:9c:db:54:ec:23:cd:67:29:8e:7c:49:4d
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid c5:c1:0d:9a:9c:7b:0d:09:99:3d:dd:ac:38:78:72:45:f7:e7:ca:91
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 07:23:2d:45:65:87:b9:d7:b1:d9:7d:d1:c5:fb:65:c5:89:bf:92:96
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid a2:af:24:0a:da:e8:67:79:c8:a8:50:b3:c7:46:ee:d9:f7:1b:16:78
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 13:8f:7b:5d:6e:da:54:ee:84:4c:7c:78:d4:7e:3f:d0:2a:60:d5:ff
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 6d:aa:9b:09:87:c4:d0:d4:22:ed:40:07:37:4d:19:f1:91:ff:de:d3
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid fd:da:14:c4:9f:30:de:21:bd:1e:42:39:fc:ab:63:23:49:e0:f1:84
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 05:1c:6d:0c:7c:a9:b0:d9:b9:e5:0a:5b:c8:f9:f5:e3:83:48:eb:78
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid bd:ff:8d:1d:59:4d:83:2b:a7:da:e3:87:6e:63:68:1c:13:de:a6:c0
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 75:b1:bc:dd:db:be:95:b8:7a:80:9c:b6:99:a1:44:d2:1b:74:eb:3d
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 35:92:76:19:47:e2:90:7b:7a:c8:80:f4:29:bf:2b:e6:6c:81:51:1a
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 17:4a:b8:2b:5f:fb:05:67:75:27:ad:49:5a:4a:5d:c4:22:cc:ea:4e
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid 36:ff:93:41:e9:13:08:24:2d:f0:17:1c:98:7a:e6:29:d5:5d:d3:41
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid b0:81:9d:a5:df:24:16:ef:0d:7d:fe:7f:e9:2b:40:d7:ef:f5:44:8f
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid c2:06:fb:d5:3b:ba:0c:ee:f2:d2:d2:45:3d:07:52:26:3a:9f:e7:5f
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for unknown ca with keyid ee:dd:ed:4d:f3:b4:38:16:cf:d7:05:73:66:9c:24:2e:91:e8:33:1d
> Sun, 2018-03-25 15:09 13[IKE] <1> received cert request for "C=US, O=Quantum, CN=quantum-equities.com CA"
> Sun, 2018-03-25 15:09 13[IKE] <1> received 155 cert requests for an unknown ca
> Sun, 2018-03-25 15:09 13[IKE] <1> received end entity cert "C=US, O=Quantum CN=aries.darkmatter.org"
> Sun, 2018-03-25 15:09 13[CFG] <1> looking for peer configs matching 192.168.1.16[cygnus.darkmatter.org]...172.56.42.154[C=US, O=Quantum CN=aries.darkmatter.org]
> Sun, 2018-03-25 15:09 13[CFG] <1> candidate "ikev2-pubkey", match: 20/1/28 (me/other/ike)
> Sun, 2018-03-25 15:09 13[CFG] <ikev2-pubkey|1> selected peer config 'ikev2-pubkey'
> Sun, 2018-03-25 15:09 13[CFG] <ikev2-pubkey|1> certificate "C=US, O=Quantum CN=aries.darkmatter.org" key: 16384 bit RSA
> Sun, 2018-03-25 15:09 13[CFG] <ikev2-pubkey|1> no issuer certificate found for "C=US, O=Quantum CN=aries.darkmatter.org"
> Sun, 2018-03-25 15:09 13[CFG] <ikev2-pubkey|1> using trusted certificate "C=US, O=Quantum CN=aries.darkmatter.org"
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> authentication of 'C=US, O=Quantum CN=aries.darkmatter.org' with RSA_EMSA_PKCS1_SHA2_512 successful
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> processing INTERNAL_IP4_ADDRESS attribute
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> processing INTERNAL_IP6_ADDRESS attribute
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> processing INTERNAL_IP4_DNS attribute
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> processing INTERNAL_IP6_DNS attribute
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> peer supports MOBIKE
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> authentication of 'cygnus.darkmatter.org' (myself) with RSA_EMSA_PKCS1_SHA2_512 successful
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> IKE_SA ikev2-pubkey[1] established between 192.168.1.16[cygnus.darkmatter.org]...172.56.42.154[C=US, O=Quantum CN=aries.darkmatter.org]
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> IKE_SA ikev2-pubkey[1] state change: CONNECTING => ESTABLISHED
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> sending end entity cert "C=US O=Quantum CN=cygnus.darkmatter.org"
>
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> peer requested virtual IP %any
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> no virtual IP found for %any requested by 'C=US, O=Quantum CN=aries.darkmatter.org'
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> peer requested virtual IP %any6
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> no virtual IP found for %any6 requested by 'C=US, O=Quantum CN=aries.darkmatter.org'
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> no virtual IP found, sending INTERNAL_ADDRESS_FAILURE
> Sun, 2018-03-25 15:09 13[CFG] <ikev2-pubkey|1> looking for a child config for 0.0.0.0/0 ::/0 === 0.0.0.0/0 ::/0
> Sun, 2018-03-25 15:09 13[CFG] <ikev2-pubkey|1> proposing traffic selectors for us:
> Sun, 2018-03-25 15:09 13[CFG] <ikev2-pubkey|1> 192.168.1.16/32
> Sun, 2018-03-25 15:09 13[CFG] <ikev2-pubkey|1> proposing traffic selectors for other:
> Sun, 2018-03-25 15:09 13[CFG] <ikev2-pubkey|1> 172.56.42.154/32
> Sun, 2018-03-25 15:09 13[CFG] <ikev2-pubkey|1> candidate "ikev2-pubkey" with prio 2+2
> Sun, 2018-03-25 15:09 13[CFG] <ikev2-pubkey|1> found matching child config "ikev2-pubkey" with prio 4
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> configuration payload negotiation failed, no CHILD_SA built
> Sun, 2018-03-25 15:09 13[IKE] <ikev2-pubkey|1> failed to establish CHILD_SA, keeping IKE_SA
> Sun, 2018-03-25 15:09 13[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ IDr CERT AUTH N(MOBIKE_SUP) N(NO_ADD_ADDR) N(INT_ADDR_FAIL) ]
> Sun, 2018-03-25 15:09 13[ENC] <ikev2-pubkey|1> splitting IKE message with length of 6624 bytes into 6 fragments
> Sun, 2018-03-25 15:09 13[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ EF(1/6) ]
> Sun, 2018-03-25 15:09 13[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ EF(2/6) ]
> Sun, 2018-03-25 15:09 13[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ EF(3/6) ]
> Sun, 2018-03-25 15:09 13[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ EF(4/6) ]
> Sun, 2018-03-25 15:09 13[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ EF(5/6) ]
> Sun, 2018-03-25 15:09 13[ENC] <ikev2-pubkey|1> generating IKE_AUTH response 1 [ EF(6/6) ]
> Sun, 2018-03-25 15:09 13[NET] <ikev2-pubkey|1> sending packet: from 192.168.1.16[4500] to 172.56.42.154[49244] (1236 bytes)
> Sun, 2018-03-25 15:09 13[NET] <ikev2-pubkey|1> sending packet: from 192.168.1.16[4500] to 172.56.42.154[49244] (1236 bytes)
> Sun, 2018-03-25 15:09 13[NET] <ikev2-pubkey|1> sending packet: from 192.168.1.16[4500] to 172.56.42.154[49244] (1236 bytes)
> Sun, 2018-03-25 15:09 13[NET] <ikev2-pubkey|1> sending packet: from 192.168.1.16[4500] to 172.56.42.154[49244] (1236 bytes)
> Sun, 2018-03-25 15:09 13[NET] <ikev2-pubkey|1> sending packet: from 192.168.1.16[4500] to 172.56.42.154[49244] (1236 bytes)
> Sun, 2018-03-25 15:09 13[NET] <ikev2-pubkey|1> sending packet: from 192.168.1.16[4500] to 172.56.42.154[49244] (788 bytes)
> Sun, 2018-03-25 15:09 14[NET] <ikev2-pubkey|1> received packet: from 172.56.42.154[49244] to 192.168.1.16[4500] (80 bytes)
> Sun, 2018-03-25 15:09 14[ENC] <ikev2-pubkey|1> parsed INFORMATIONAL request 2 [ D ]
> Sun, 2018-03-25 15:09 14[IKE] <ikev2-pubkey|1> received DELETE for IKE_SA ikev2-pubkey[1]
> Sun, 2018-03-25 15:09 14[IKE] <ikev2-pubkey|1> deleting IKE_SA ikev2-pubkey[1] between 192.168.1.16[cygnus.darkmatter.org]...172.56.42.154[C=US, O=Quantum CN=aries.darkmatter.org]
> Sun, 2018-03-25 15:09 14[IKE] <ikev2-pubkey|1> IKE_SA ikev2-pubkey[1] state change: ESTABLISHED => DELETING
> Sun, 2018-03-25 15:09 14[IKE] <ikev2-pubkey|1> IKE_SA deleted
> Sun, 2018-03-25 15:09 14[ENC] <ikev2-pubkey|1> generating INFORMATIONAL response 2 [ ]
> Sun, 2018-03-25 15:09 14[NET] <ikev2-pubkey|1> sending packet: from 192.168.1.16[4500] to 172.56.42.154[49244] (80 bytes)
> Sun, 2018-03-25 15:09 14[IKE] <ikev2-pubkey|1> IKE_SA ikev2-pubkey[1] state change: DELETING => DESTROYING
>
>
>
>
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.strongswan.org/pipermail/users/attachments/20180326/afa3e7c9/attachment-0001.sig>
More information about the Users
mailing list