[strongSwan] Strongswan on Ubuntu - Failure to connect from Windows 10 client -error: deleting half open IKE_SA with 154.**.***.** after timeout
MOSES KARIUKI
kariukims at gmail.com
Tue Feb 19 00:43:09 CET 2019
Dear Team,
I have been having long days trying to configure Strongswan on Ubuntu
18.04. I am not able to connect to the VPN from Windows 10 client, after
following the instructions on this link :
https://www.digitalocean.com/community/tutorials/how-to-set-up-an-ikev2-vpn-server-with-strongswan-on-ubuntu-18-04-2
and setting up windows for modp_2048 following these instructions here :
https://wiki.strongswan.org/projects/strongswan/wiki/WindowsClients#AES-256-CBC-and-MODP2048
See below my settings
*ipsec statusall*
Status of IKE charon daemon (strongSwan 5.6.2, Linux 4.15.0-45-generic,
x86_64):
uptime: 45 minutes, since Feb 19 01:27:59 2019
malloc: sbrk 2568192, mmap 0, used 664784, free 1903408
worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0,
scheduled: 0
loaded plugins: charon aesni aes rc2 sha2 sha1 md4 md5 mgf1 random nonce
x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey
sshkey pem openssl fips-prf gmp agent xcbc hmac gcm attr kernel-netlink
resolve socket-default connmark stroke updown eap-mschapv2 xauth-generic
counters
Virtual IP pools (size/online/offline):
10.10.10.0/24: 254/0/0
Listening IP addresses:
102.1*9.2**.***
Connections:
ikev2-vpn: %any...%any IKEv2, dpddelay=300s
ikev2-vpn: local: [102.1*9.2**.***] uses public key authentication
ikev2-vpn: cert: "CN=102.1*9.2**.***"
ikev2-vpn: remote: uses EAP_MSCHAPV2 authentication with EAP identity
'%any'
ikev2-vpn: child: 0.0.0.0/0 === dynamic TUNNEL, dpdaction=clear
Security Associations (0 up, 0 connecting):
none
*vi /etc/ipsec.conf*
config setup
charondebug="ike 1, knl 1, cfg 2"
uniqueids=no
conn ikev2-vpn
auto=add
compress=no
type=tunnel
keyexchange=ikev2
fragmentation=yes
forceencaps=yes
dpdaction=clear
dpddelay=300s
rekey=no
left=%any
leftid=102.1*9.2**.***
leftcert=server-cert.pem
leftsendcert=always
leftsubnet=0.0.0.0/0
right=%any
rightid=%any
rightauth=eap-mschapv2
rightsourceip=10.10.10.0/24
rightdns=8.8.8.8,8.8.4.4
rightsendcert=never
eap_identity=%identity
ike=aes256-sha1-modp1024,aes128-sha1-modp1024,3des-sha1-modp1024,aes256-sha256-modp2048,aes128-sha256-modp2048,aes256-sha1-modp2048,aes128-sha1-modp2048
esp=aes256-sha256,aes256-sha1,3des-sha1,aes256-sha256-modp2048,aes128-sha256-modp2048,aes256-sha1-modp2048,aes128-sha1-modp2048
Below is the log :
Feb 19 02:10:00 VM-e2b7 charon: 07[NET] received packet: from
154.77.***.**[500] to 102.1*9.2**.***[500] (632 bytes)
Feb 19 02:10:00 VM-e2b7 charon: 07[ENC] parsed IKE_SA_INIT request 0 [ SA
KE No N(FRAG_SUP) N(NATD_S_IP) N(NATD_D_IP) V V V V ]
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 11[CFG] configured proposals:
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048,
....
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 11[CFG] selected proposal:
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 11[IKE] remote host is behind NAT
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 11[ENC] generating IKE_SA_INIT
response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(MULT_AUTH) ]
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 11[NET] sending packet: from
102.1*9.2**.***[500] to 154.77.***.**[500] (448 bytes)
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[NET] received packet: from
154.77.***.**[4500] to 102.1*9.2**.***[4500] (580 bytes)
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[ENC] parsed IKE_AUTH request 1 [
EF(1/3) ]
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[ENC] received fragment #1 of 3,
waiting for complete IKE message
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[NET] received packet: from
154.77.***.**[4500] to 102.1*9.2**.***[4500] (532 bytes)
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[ENC] parsed IKE_AUTH request 1 [
EF(3/3) ]
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[ENC] received fragment #3 of 3,
waiting for complete IKE message
Feb 19 02:10:00 VM-e2b7 charon: 07[CFG] looking for an ike config for
102.1*9.2**.***...154.77.***.**
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[NET] received packet: from
154.77.***.**[4500] to 102.1*9.2**.***[4500] (580 bytes)
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[ENC] parsed IKE_AUTH request 1 [
EF(2/3) ]
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[ENC] received fragment #2 of 3,
reassembling fragmented IKE message
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[ENC] parsed IKE_AUTH request 1 [
IDi CERTREQ N(MOBIKE_SUP) CPRQ(ADDR DNS NBNS SRV ADDR6 DNS6 SRV6) SA TSi
TSr ]
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[IKE] received 53 cert requests for
an unknown ca
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[CFG] looking for peer configs
matching 102.1*9.2**.***[%any]...154.77.***.**[192.168.43.156]
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[CFG] candidate "ikev2-vpn",
match: 1/1/28 (me/other/ike)
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[CFG] selected peer config
'ikev2-vpn'
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[IKE] EAP-Identity request
configured, but not supported
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[IKE] initiating EAP_MSCHAPV2 method
(id 0x81)
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[IKE] peer supports MOBIKE
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[IKE] authentication of
'102.1*9.2**.***' (myself) with RSA signature successful
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[IKE] sending end entity cert
"CN=102.1*9.2**.***"
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[ENC] generating IKE_AUTH response 1
[ IDr CERT AUTH EAP/REQ/MSCHAPV2 ]
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[ENC] splitting IKE message with
length of 1936 bytes into 2 fragments
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[ENC] generating IKE_AUTH response 1
[ EF(1/2) ]
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[ENC] generating IKE_AUTH response 1
[ EF(2/2) ]
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[NET] sending packet: from
102.1*9.2**.***[4500] to 154.77.***.**[4500] (1236 bytes)
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 12[NET] sending packet: from
102.1*9.2**.***[4500] to 154.77.***.**[4500] (772 bytes)
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 15[JOB] deleting half open IKE_SA with
154.77.***.** after timeout
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 06[CFG] proposing traffic selectors
for us:
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 06[CFG] 0.0.0.0/0
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 06[CFG] proposing traffic selectors
for other:
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 06[CFG] dynamic
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 05[CFG] proposing traffic selectors
for us:
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 05[CFG] 0.0.0.0/0
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 05[CFG] proposing traffic selectors
for other:
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 05[CFG] dynamic
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 07[NET] received packet: from
154.77.***.**[500] to 102.1*9.2**.***[500] (632 bytes)
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 07[ENC] parsed IKE_SA_INIT request 0 [
SA KE No N(FRAG_SUP) N(NATD_S_IP) N(NATD_D_IP) V V V V ]
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 07[CFG] looking for an ike config for
102.1*9.2**.***...154.77.***.**
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 07[CFG] candidate: %any...%any, prio
28
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 07[CFG] found matching ike config:
%any...%any with prio 28
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 07[IKE] received MS NT5 ISAKMPOAKLEY
v9 vendor ID
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 07[IKE] received MS-Negotiation
Discovery Capable vendor ID
Feb 19 02:10:00 VM-e2b7 charon: 07[CFG] candidate: %any...%any, prio 28
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 07[IKE] received Vid-Initial-Contact
vendor ID
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 07[ENC] received unknown vendor ID:
01:52:8b:bb:c0:06:96:12:18:49:ab:9a:1c:5b:2a:51:00:00:00:02
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 07[IKE] 154.77.***.** is initiating an
IKE_SA
Feb 19 02:10:00 VM-e2b7 ipsec[1011]: 07[CFG] selecting proposal:
Feb 19 02:10:00 VM-e2b7 charon: 07[CFG] found matching ike config:
%any...%any with prio 28
Feb 19 02:10:00 VM-e2b7 charon: 07[IKE] received MS NT5 ISAKMPOAKLEY v9
vendor ID
Feb 19 02:10:00 VM-e2b7 charon: 07[IKE] received MS-Negotiation Discovery
Capable vendor ID
Feb 19 02:10:00 VM-e2b7 charon: 07[IKE] received Vid-Initial-Contact vendor
ID
Feb 19 02:10:00 VM-e2b7 charon: 07[ENC] received unknown vendor ID:
01:52:8b:bb:c0:06:96:12:18:49:ab:9a:1c:5b:2a:51:00:00:00:02
Feb 19 02:10:00 VM-e2b7 charon: 07[IKE] 154.77.***.** is initiating an
IKE_SA
Feb 19 02:10:00 VM-e2b7 charon: 07[CFG] selecting proposal:
Feb 19 02:10:00 VM-e2b7 charon: 07[CFG] selecting proposal:
Feb 19 02:10:00 VM-e2b7 charon: 07[CFG] proposal matches
Feb 19 02:10:00 VM-e2b7 charon: 07[CFG] received proposals:
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048,
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048,
IKE:AES_CBC_256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_2048
Feb 19 02:10:00 VM-e2b7 charon: 07[CFG] configured proposals:
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024,
IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_256/
HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048,
IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048,
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048,
IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
Feb 19 02:10:00 VM-e2b7 charon: 07[CFG] selected proposal:
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Feb 19 02:10:00 VM-e2b7 charon: 07[IKE] remote host is behind NAT
Feb 19 02:10:00 VM-e2b7 charon: 07[ENC] generating IKE_SA_INIT response 0 [
SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(MULT_AUTH) ]
Feb 19 02:10:00 VM-e2b7 charon: 07[NET] sending packet: from
102.1*9.2**.***[500] to 154.77.***.**[500] (448 bytes)
Feb 19 02:10:00 VM-e2b7 charon: 09[NET] received packet: from
154.77.***.**[4500] to 102.1*9.2**.***[4500] (580 bytes)
Feb 19 02:10:00 VM-e2b7 charon: 09[ENC] parsed IKE_AUTH request 1 [ EF(1/3)
]
Feb 19 02:10:00 VM-e2b7 charon: 09[ENC] received fragment #1 of 3, waiting
for complete IKE message
Feb 19 02:10:00 VM-e2b7 charon: 10[NET] received packet: from
154.77.***.**[4500] to 102.1*9.2**.***[4500] (580 bytes)
Feb 19 02:10:00 VM-e2b7 charon: 10[ENC] parsed IKE_AUTH request 1 [ EF(2/3)
]
Feb 19 02:10:00 VM-e2b7 charon: 10[ENC] received fragment #2 of 3, waiting
for complete IKE message
Feb 19 02:10:01 VM-e2b7 charon: 11[NET] received packet: from
154.77.***.**[4500] to 102.1*9.2**.***[4500] (532 bytes)
Feb 19 02:10:01 VM-e2b7 charon: 11[ENC] parsed IKE_AUTH request 1 [ EF(3/3)
]
Feb 19 02:10:01 VM-e2b7 charon: 11[ENC] received fragment #3 of 3,
reassembling fragmented IKE message
Feb 19 02:10:01 VM-e2b7 charon: 11[ENC] parsed IKE_AUTH request 1 [ IDi
CERTREQ N(MOBIKE_SUP) CPRQ(ADDR DNS NBNS SRV ADDR6 DNS6 SRV6) SA TSi TSr ]
Feb 19 02:10:01 VM-e2b7 charon: 11[IKE] received 53 cert requests for an
unknown ca
Feb 19 02:10:01 VM-e2b7 charon: 11[CFG] looking for peer configs matching
102.1*9.2**.***[%any]...154.77.***.**[192.168.43.156]
Feb 19 02:10:01 VM-e2b7 charon: 11[CFG] candidate "ikev2-vpn", match:
1/1/28 (me/other/ike)
Feb 19 02:10:01 VM-e2b7 charon: 11[CFG] selected peer config 'ikev2-vpn'
Feb 19 02:10:01 VM-e2b7 charon: 11[IKE] EAP-Identity request configured,
but not supported
Feb 19 02:10:01 VM-e2b7 charon: 11[IKE] initiating EAP_MSCHAPV2 method (id
0x64)
Feb 19 02:10:01 VM-e2b7 charon: 11[IKE] peer supports MOBIKE
Feb 19 02:10:01 VM-e2b7 charon: 11[IKE] authentication of '102.1*9.2**.***'
(myself) with RSA signature successful
Feb 19 02:10:01 VM-e2b7 charon: 11[IKE] sending end entity cert
"CN=102.1*9.2**.***"
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 07[CFG] received proposals:
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048,
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048,
IKE:AES_CBC_256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_2048
Feb 19 02:10:01 VM-e2b7 charon: 11[ENC] generating IKE_AUTH response 1 [
IDr CERT AUTH EAP/REQ/MSCHAPV2 ]
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 07[CFG] configured proposals:
IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024...
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 07[CFG] selected proposal:
IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 07[IKE] remote host is behind NAT
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 07[ENC] generating IKE_SA_INIT
response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(MULT_AUTH) ]
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 07[NET] sending packet: from
102.1*9.2**.***[500] to 154.77.***.**[500] (448 bytes)
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 09[NET] received packet: from
154.77.***.**[4500] to 102.1*9.2**.***[4500] (580 bytes)
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 09[ENC] parsed IKE_AUTH request 1 [
EF(1/3) ]
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 09[ENC] received fragment #1 of 3,
waiting for complete IKE message
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 10[NET] received packet: from
154.77.***.**[4500] to 102.1*9.2**.***[4500] (580 bytes)
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 10[ENC] parsed IKE_AUTH request 1 [
EF(2/3) ]
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 10[ENC] received fragment #2 of 3,
waiting for complete IKE message
Feb 19 02:10:01 VM-e2b7 charon: 11[ENC] splitting IKE message with length
of 1936 bytes into 2 fragments
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 11[NET] received packet: from
154.77.***.**[4500] to 102.1*9.2**.***[4500] (532 bytes)
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 11[ENC] parsed IKE_AUTH request 1 [
EF(3/3) ]
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 11[ENC] received fragment #3 of 3,
reassembling fragmented IKE message
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 11[ENC] parsed IKE_AUTH request 1 [
IDi CERTREQ N(MOBIKE_SUP) CPRQ(ADDR DNS NBNS SRV ADDR6 DNS6 SRV6) SA TSi
TSr ]
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 11[IKE] received 53 cert requests for
an unknown ca
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 11[CFG] looking for peer configs
matching 102.1*9.2**.***[%any]...154.77.***.**[192.168.43.156]
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 11[CFG] candidate "ikev2-vpn",
match: 1/1/28 (me/other/ike)
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 11[CFG] selected peer config
'ikev2-vpn'
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 11[IKE] EAP-Identity request
configured, but not supported
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 11[IKE] initiating EAP_MSCHAPV2 method
(id 0x64)
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 11[IKE] peer supports MOBIKE
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 11[IKE] authentication of
'102.1*9.2**.***' (myself) with RSA signature successful
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 11[IKE] sending end entity cert
"CN=102.1*9.2**.***"
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 11[ENC] generating IKE_AUTH response 1
[ IDr CERT AUTH EAP/REQ/MSCHAPV2 ]
Feb 19 02:10:01 VM-e2b7 ipsec[1011]: 11[ENC] splitting IKE message with
length of 1936 bytes into 2 fragments
Feb 19 02:10:01 VM-e2b7 charon: 11[ENC] generating IKE_AUTH response 1 [
EF(1/2) ]
Feb 19 02:10:01 VM-e2b7 charon: 11[ENC] generating IKE_AUTH response 1 [
EF(2/2) ]
Feb 19 02:10:01 VM-e2b7 charon: 11[NET] sending packet: from
102.1*9.2**.***[4500] to 154.77.***.**[4500] (1236 bytes)
Feb 19 02:10:01 VM-e2b7 charon: 11[NET] sending packet: from
102.1*9.2**.***[4500] to 154.77.***.**[4500] (772 bytes)
Feb 19 02:10:01 VM-e2b7 kernel: [ 2543.189073] [UFW BLOCK] IN=ens3 OUT=
MAC=06:97:9c:00:00:8f:00:1d:b5:c0:a7:c0:08:00 SRC=154.77.***.**
DST=102.1*9.2**.*** LEN=52 TOS=0x10 PREC=0x20 TTL=116 ID=27223 DF PROTO=TCP
SPT=54229 DPT=443 WINDOW=17520 RES=0x00 SYN URGP=0
Feb 19 02:10:30 VM-e2b7 charon: 14[JOB] deleting half open IKE_SA with
154.77.***.** after timeout
Feb 19 02:13:28 VM-e2b7 charon: 13[CFG] proposing traffic selectors for us:
Feb 19 02:13:28 VM-e2b7 charon: 13[CFG] 0.0.0.0/0
Feb 19 02:13:28 VM-e2b7 charon: 13[CFG] proposing traffic selectors for
other:
Feb 19 02:13:28 VM-e2b7 charon: 13[CFG] dynamic
Please assist with this. I am almost there.
Thanks in advance.
regards,
Moses K
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20190219/e8bb67d2/attachment-0001.html>
More information about the Users
mailing list