2011:10:06-22:28:35 peit pluto[11216]: shutting down 2011:10:06-22:28:35 peit pluto[11216]: forgetting secrets 2011:10:06-22:28:35 peit pluto[11216]: "D_REF_FxCpIhgkHj_3": deleting connection 2011:10:06-22:28:35 peit pluto[11216]: "D_REF_FxCpIhgkHj_2": deleting connection 2011:10:06-22:28:35 peit pluto[11216]: "D_REF_FxCpIhgkHj_1": deleting connection 2011:10:06-22:28:35 peit pluto[11216]: "D_REF_FxCpIhgkHj_0": deleting connection 2011:10:06-22:28:35 peit pluto[11216]: shutting down interface lo/lo ::1 2011:10:06-22:28:35 peit pluto[11216]: shutting down interface lo/lo 127.0.0.1 2011:10:06-22:28:35 peit pluto[11216]: shutting down interface lo/lo 127.0.0.1 2011:10:06-22:28:35 peit pluto[11216]: shutting down interface eth0/eth0 192.168.10.102 2011:10:06-22:28:35 peit pluto[11216]: shutting down interface eth0/eth0 192.168.10.102 2011:10:06-22:28:35 peit pluto[11216]: shutting down interface eth0/eth0 192.168.100.100 2011:10:06-22:28:35 peit pluto[11216]: shutting down interface eth0/eth0 192.168.100.100 2011:10:06-22:28:35 peit pluto[11216]: shutting down interface eth1/eth1 192.168.10.103 2011:10:06-22:28:35 peit pluto[11216]: shutting down interface eth1/eth1 192.168.10.103 2011:10:06-22:28:35 peit ipsec_starter[11215]: pluto stopped after 20 ms 2011:10:06-22:28:35 peit ipsec_starter[11215]: ipsec starter stopped 2011:10:06-22:29:59 peit ipsec_starter[6191]: Starting strongSwan 4.4.1git20100610 IPsec [starter]... 2011:10:06-22:29:59 peit pluto[6199]: Starting IKEv1 pluto daemon (strongSwan 4.4.1git20100610) THREADS VENDORID CISCO_QUIRKS 2011:10:06-22:29:59 peit ipsec_starter[6197]: pluto (6199) started after 20 ms 2011:10:06-22:29:59 peit pluto[6199]: loaded plugins: curl ldap aes des blowfish serpent twofish sha1 sha2 md5 random x509 pubkey pkcs1 pgp dnskey pem sqlite hmac gmp xauth attr attr-sql resolve 2011:10:06-22:29:59 peit pluto[6199]: including NAT-Traversal patch (Version 0.6c) 2011:10:06-22:29:59 peit pluto[6199]: Using Linux 2.6 IPsec interface code 2011:10:06-22:30:01 peit pluto[6199]: loading ca certificates from '/etc/ipsec.d/cacerts' 2011:10:06-22:30:01 peit pluto[6199]: loaded ca certificate from '/etc/ipsec.d/cacerts/REF_OlgYQdVnVS.pem' 2011:10:06-22:30:01 peit pluto[6199]: loading aa certificates from '/etc/ipsec.d/aacerts' 2011:10:06-22:30:01 peit pluto[6199]: loading ocsp certificates from '/etc/ipsec.d/ocspcerts' 2011:10:06-22:30:01 peit pluto[6199]: Changing to directory '/etc/ipsec.d/crls' 2011:10:06-22:30:01 peit pluto[6199]: loading attribute certificates from '/etc/ipsec.d/acerts' 2011:10:06-22:30:01 peit pluto[6199]: listening for IKE messages 2011:10:06-22:30:01 peit pluto[6199]: adding interface eth1/eth1 192.168.10.103:500 2011:10:06-22:30:01 peit pluto[6199]: adding interface eth1/eth1 192.168.10.103:4500 2011:10:06-22:30:01 peit pluto[6199]: adding interface eth0/eth0 192.168.100.100:500 2011:10:06-22:30:01 peit pluto[6199]: adding interface eth0/eth0 192.168.100.100:4500 2011:10:06-22:30:01 peit pluto[6199]: adding interface eth0/eth0 192.168.10.102:500 2011:10:06-22:30:01 peit pluto[6199]: adding interface eth0/eth0 192.168.10.102:4500 2011:10:06-22:30:01 peit pluto[6199]: adding interface lo/lo 127.0.0.1:500 2011:10:06-22:30:01 peit pluto[6199]: adding interface lo/lo 127.0.0.1:4500 2011:10:06-22:30:01 peit pluto[6199]: adding interface lo/lo ::1:500 2011:10:06-22:30:01 peit pluto[6199]: loading secrets from "/etc/ipsec.secrets" 2011:10:06-22:30:01 peit pluto[6199]: loaded private key from 'REF_AzxLRMBDJU.pem' 2011:10:06-22:30:01 peit pluto[6199]: loaded host certificate from '/etc/ipsec.d/certs/REF_AzxLRMBDJU.pem' 2011:10:06-22:30:01 peit pluto[6199]: loaded host certificate from '/etc/ipsec.d/certs/REF_QEeiHChXat_254f941c.pem' 2011:10:06-22:30:01 peit pluto[6199]: added connection description "D_REF_FxCpIhgkHj_0" 2011:10:06-22:30:01 peit pluto[6199]: loaded host certificate from '/etc/ipsec.d/certs/REF_AzxLRMBDJU.pem' 2011:10:06-22:30:01 peit pluto[6199]: loaded host certificate from '/etc/ipsec.d/certs/REF_QEeiHChXat_254f941c.pem' 2011:10:06-22:30:01 peit pluto[6199]: added connection description "D_REF_FxCpIhgkHj_1" 2011:10:06-22:30:01 peit pluto[6199]: loaded host certificate from '/etc/ipsec.d/certs/REF_AzxLRMBDJU.pem' 2011:10:06-22:30:01 peit pluto[6199]: loaded host certificate from '/etc/ipsec.d/certs/REF_tTmPFSmWsy_7df5ab29.pem' 2011:10:06-22:30:01 peit pluto[6199]: added connection description "D_REF_FxCpIhgkHj_2" 2011:10:06-22:30:01 peit pluto[6199]: loaded host certificate from '/etc/ipsec.d/certs/REF_AzxLRMBDJU.pem' 2011:10:06-22:30:01 peit pluto[6199]: loaded host certificate from '/etc/ipsec.d/certs/REF_tTmPFSmWsy_7df5ab29.pem' 2011:10:06-22:30:01 peit pluto[6199]: added connection description "D_REF_FxCpIhgkHj_3" 2011:10:06-22:36:42 peit pluto[6199]: packet from 84.94.16.28:500: received Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004] 2011:10:06-22:36:42 peit pluto[6199]: packet from 84.94.16.28:500: ignoring Vendor ID payload [FRAGMENTATION] 2011:10:06-22:36:42 peit pluto[6199]: packet from 84.94.16.28:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] 2011:10:06-22:36:42 peit pluto[6199]: packet from 84.94.16.28:500: ignoring Vendor ID payload [Vid-Initial-Contact] 2011:10:06-22:36:42 peit pluto[6199]: packet from 84.94.16.28:500: initial Main Mode message received on 192.168.10.103:500 but no connection has been authorized with policy=PSK 2011:10:06-22:36:43 peit pluto[6199]: packet from 84.94.16.28:500: received Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004] 2011:10:06-22:36:43 peit pluto[6199]: packet from 84.94.16.28:500: ignoring Vendor ID payload [FRAGMENTATION] 2011:10:06-22:36:43 peit pluto[6199]: packet from 84.94.16.28:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] 2011:10:06-22:36:43 peit pluto[6199]: packet from 84.94.16.28:500: ignoring Vendor ID payload [Vid-Initial-Contact] 2011:10:06-22:36:43 peit pluto[6199]: packet from 84.94.16.28:500: initial Main Mode message received on 192.168.10.103:500 but no connection has been authorized with policy=PSK 2011:10:06-22:36:45 peit pluto[6199]: packet from 84.94.16.28:500: received Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004] 2011:10:06-22:36:45 peit pluto[6199]: packet from 84.94.16.28:500: ignoring Vendor ID payload [FRAGMENTATION] 2011:10:06-22:36:45 peit pluto[6199]: packet from 84.94.16.28:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] 2011:10:06-22:36:45 peit pluto[6199]: packet from 84.94.16.28:500: ignoring Vendor ID payload [Vid-Initial-Contact] 2011:10:06-22:36:45 peit pluto[6199]: packet from 84.94.16.28:500: initial Main Mode message received on 192.168.10.103:500 but no connection has been authorized with policy=PSK 2011:10:06-22:36:49 peit pluto[6199]: packet from 84.94.16.28:500: received Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004] 2011:10:06-22:36:49 peit pluto[6199]: packet from 84.94.16.28:500: ignoring Vendor ID payload [FRAGMENTATION] 2011:10:06-22:36:49 peit pluto[6199]: packet from 84.94.16.28:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] 2011:10:06-22:36:49 peit pluto[6199]: packet from 84.94.16.28:500: ignoring Vendor ID payload [Vid-Initial-Contact] 2011:10:06-22:36:49 peit pluto[6199]: packet from 84.94.16.28:500: initial Main Mode message received on 192.168.10.103:500 but no connection has been authorized with policy=PSK 2011:10:06-22:36:57 peit pluto[6199]: packet from 84.94.16.28:500: received Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004] 2011:10:06-22:36:57 peit pluto[6199]: packet from 84.94.16.28:500: ignoring Vendor ID payload [FRAGMENTATION] 2011:10:06-22:36:57 peit pluto[6199]: packet from 84.94.16.28:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] 2011:10:06-22:36:57 peit pluto[6199]: packet from 84.94.16.28:500: ignoring Vendor ID payload [Vid-Initial-Contact] 2011:10:06-22:36:57 peit pluto[6199]: packet from 84.94.16.28:500: initial Main Mode message received on 192.168.10.103:500 but no connection has been authorized with policy=PSK 2011:10:06-22:37:13 peit pluto[6199]: packet from 84.94.16.28:500: received Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004] 2011:10:06-22:37:13 peit pluto[6199]: packet from 84.94.16.28:500: ignoring Vendor ID payload [FRAGMENTATION] 2011:10:06-22:37:13 peit pluto[6199]: packet from 84.94.16.28:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] 2011:10:06-22:37:13 peit pluto[6199]: packet from 84.94.16.28:500: ignoring Vendor ID payload [Vid-Initial-Contact] 2011:10:06-22:37:13 peit pluto[6199]: packet from 84.94.16.28:500: initial Main Mode message received on 192.168.10.103:500 but no connection has been authorized with policy=PSK 2011:10:06-22:37:37 peit openl2tpd[7071]: Start, trace_flags=00000000 2011:10:06-22:37:37 peit openl2tpd[7071]: OpenL2TP V1.6, (c) Copyright 2004,2005,2006,2007,2008 Katalix Systems Ltd. 2011:10:06-22:37:37 peit openl2tpd[7071]: Loading plugin /usr/lib/openl2tp/ppp_unix.so, version V1.5 2011:10:06-22:37:37 peit openl2tpd[7071]: Using config file: /etc/openl2tpd.conf 2011:10:06-22:37:37 peit pluto[6199]: added connection description "S_REF_umuHINYXyz_0" 2011:10:06-22:37:37 peit pluto[6199]: added connection description "S_REF_umuHINYXyz_1" 2011:10:06-22:37:37 peit pluto[6199]: listening for IKE messages 2011:10:06-22:37:37 peit pluto[6199]: forgetting secrets 2011:10:06-22:37:37 peit pluto[6199]: loading secrets from "/etc/ipsec.secrets" 2011:10:06-22:37:37 peit pluto[6199]: loaded private key from 'REF_AzxLRMBDJU.pem' 2011:10:06-22:37:37 peit pluto[6199]: loaded PSK secret for 192.168.10.103 %any 2011:10:06-22:37:37 peit pluto[6199]: forgetting secrets 2011:10:06-22:37:37 peit pluto[6199]: loading secrets from "/etc/ipsec.secrets" 2011:10:06-22:37:37 peit pluto[6199]: loaded private key from 'REF_AzxLRMBDJU.pem' 2011:10:06-22:37:37 peit pluto[6199]: loaded PSK secret for 192.168.10.103 %any 2011:10:06-22:37:37 peit pluto[6199]: loading ca certificates from '/etc/ipsec.d/cacerts' 2011:10:06-22:37:37 peit pluto[6199]: loaded ca certificate from '/etc/ipsec.d/cacerts/REF_OlgYQdVnVS.pem' 2011:10:06-22:37:37 peit pluto[6199]: loading aa certificates from '/etc/ipsec.d/aacerts' 2011:10:06-22:37:37 peit pluto[6199]: loading ocsp certificates from '/etc/ipsec.d/ocspcerts' 2011:10:06-22:37:37 peit pluto[6199]: loading attribute certificates from '/etc/ipsec.d/acerts' 2011:10:06-22:37:37 peit pluto[6199]: Changing to directory '/etc/ipsec.d/crls' 2011:10:06-22:37:40 peit pluto[6199]: packet from 84.94.16.28:500: ignoring Delete SA payload: not encrypted 2011:10:06-22:38:22 peit pluto[6199]: packet from 84.94.16.28:500: received Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000004] 2011:10:06-22:38:22 peit pluto[6199]: packet from 84.94.16.28:500: ignoring Vendor ID payload [FRAGMENTATION] 2011:10:06-22:38:22 peit pluto[6199]: packet from 84.94.16.28:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] 2011:10:06-22:38:22 peit pluto[6199]: packet from 84.94.16.28:500: ignoring Vendor ID payload [Vid-Initial-Contact] 2011:10:06-22:38:22 peit pluto[6199]: "S_REF_umuHINYXyz_1"[1] 84.94.16.28 #1: responding to Main Mode from unknown peer 84.94.16.28 2011:10:06-22:38:22 peit pluto[6199]: "S_REF_umuHINYXyz_1"[1] 84.94.16.28 #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike-02/03: both are NATed 2011:10:06-22:38:23 peit pluto[6199]: "S_REF_umuHINYXyz_1"[1] 84.94.16.28 #1: Peer ID is ID_FQDN: 'user-6ad269b022' 2011:10:06-22:38:23 peit pluto[6199]: "S_REF_umuHINYXyz_1"[2] 84.94.16.28 #1: deleting connection "S_REF_umuHINYXyz_1" instance with peer 84.94.16.28 {isakmp=#0/ipsec=#0} 2011:10:06-22:38:23 peit pluto[6199]: | NAT-T: new mapping 84.94.16.28:500/4500) 2011:10:06-22:38:23 peit pluto[6199]: "S_REF_umuHINYXyz_1"[2] 84.94.16.28:4500 #1: sent MR3, ISAKMP SA established 2011:10:06-22:38:23 peit pluto[6199]: "S_REF_umuHINYXyz_1"[2] 84.94.16.28:4500 #1: cannot respond to IPsec SA request because no connection is known for 84.108.31.110/32===192.168.10.103:4500[192.168.10.103]:17/1701...84.94.16.28:4500[user-6ad269b022]:17/%any 2011:10:06-22:38:23 peit pluto[6199]: "S_REF_umuHINYXyz_1"[2] 84.94.16.28:4500 #1: sending encrypted notification INVALID_ID_INFORMATION to 84.94.16.28:4500 2011:10:06-22:38:25 peit pluto[6199]: "S_REF_umuHINYXyz_1"[2] 84.94.16.28:4500 #1: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0xf52d6bab (perhaps this is a duplicated packet) 2011:10:06-22:38:25 peit pluto[6199]: "S_REF_umuHINYXyz_1"[2] 84.94.16.28:4500 #1: sending encrypted notification INVALID_MESSAGE_ID to 84.94.16.28:4500 2011:10:06-22:38:26 peit pluto[6199]: "S_REF_umuHINYXyz_1"[2] 84.94.16.28:4500 #1: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0xf52d6bab (perhaps this is a duplicated packet) 2011:10:06-22:38:26 peit pluto[6199]: "S_REF_umuHINYXyz_1"[2] 84.94.16.28:4500 #1: sending encrypted notification INVALID_MESSAGE_ID to 84.94.16.28:4500 2011:10:06-22:38:31 peit pluto[6199]: "S_REF_umuHINYXyz_1"[2] 84.94.16.28:4500 #1: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0xf52d6bab (perhaps this is a duplicated packet) 2011:10:06-22:38:31 peit pluto[6199]: "S_REF_umuHINYXyz_1"[2] 84.94.16.28:4500 #1: sending encrypted notification INVALID_MESSAGE_ID to 84.94.16.28:4500 2011:10:06-22:38:39 peit pluto[6199]: "S_REF_umuHINYXyz_1"[2] 84.94.16.28:4500 #1: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0xf52d6bab (perhaps this is a duplicated packet) 2011:10:06-22:38:39 peit pluto[6199]: "S_REF_umuHINYXyz_1"[2] 84.94.16.28:4500 #1: sending encrypted notification INVALID_MESSAGE_ID to 84.94.16.28:4500 2011:10:06-22:38:55 peit pluto[6199]: "S_REF_umuHINYXyz_1"[2] 84.94.16.28:4500 #1: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0xf52d6bab (perhaps this is a duplicated packet) 2011:10:06-22:38:55 peit pluto[6199]: "S_REF_umuHINYXyz_1"[2] 84.94.16.28:4500 #1: sending encrypted notification INVALID_MESSAGE_ID to 84.94.16.28:4500 2011:10:06-22:39:27 peit pluto[6199]: "S_REF_umuHINYXyz_1"[2] 84.94.16.28:4500 #1: received Delete SA payload: deleting ISAKMP State #1 2011:10:06-22:39:27 peit pluto[6199]: "S_REF_umuHINYXyz_1"[2] 84.94.16.28:4500: deleting connection "S_REF_umuHINYXyz_1" instance with peer 84.94.16.28 {isakmp=#0/ipsec=#0}