2023:02:08-17:25:52 station12 pluto[29707]: forgetting secrets 2023:02:08-17:25:52 station12 pluto[29707]: loading secrets from "/etc/ipsec.secrets" 2023:02:08-17:25:52 station12 pluto[29707]: loaded PSK secret for ST12 ST11 2023:02:08-17:25:52 station12 pluto[29707]: listening for IKE messages 2023:02:08-17:25:52 station12 pluto[29707]: forgetting secrets 2023:02:08-17:25:52 station12 pluto[29707]: loading secrets from "/etc/ipsec.secrets" 2023:02:08-17:25:52 station12 pluto[29707]: loaded PSK secret for ST12 ST11 2023:02:08-17:25:52 station12 pluto[29707]: loading ca certificates from '/etc/ipsec.d/cacerts' 2023:02:08-17:25:52 station12 pluto[29707]: loaded ca certificate from '/etc/ipsec.d/cacerts/VPN Signing CA.pem' 2023:02:08-17:25:52 station12 pluto[29707]: loading aa certificates from '/etc/ipsec.d/aacerts' 2023:02:08-17:25:52 station12 pluto[29707]: loading ocsp certificates from '/etc/ipsec.d/ocspcerts' 2023:02:08-17:25:52 station12 pluto[29707]: loading attribute certificates from '/etc/ipsec.d/acerts' 2023:02:08-17:25:52 station12 pluto[29707]: Changing to directory '/etc/ipsec.d/crls' 2023:02:08-17:25:52 station12 pluto[29707]: "S_Station 11": deleting connection 2023:02:08-17:25:52 station12 pluto[29707]: "S_Station 11" #6: deleting state (STATE_MAIN_I3) 2023:02:08-17:25:52 station12 pluto[29707]: added connection description "S_Station 11" 2023:02:08-17:25:52 station12 pluto[29707]: "S_Station 11" #7: initiating Main Mode 2023:02:08-17:25:52 station12 pluto[29707]: "S_Station 11" #7: received Vendor ID payload [XAUTH] 2023:02:08-17:25:52 station12 pluto[29707]: "S_Station 11" #7: received Vendor ID payload [Dead Peer Detection] 2023:02:08-17:25:52 station12 pluto[29707]: "S_Station 11" #7: ignoring Vendor ID payload [Cisco-Unity] 2023:02:08-17:25:52 station12 pluto[29707]: "S_Station 11" #7: received Vendor ID payload [RFC 3947] 2023:02:08-17:25:52 station12 pluto[29707]: "S_Station 11" #7: enabling possible NAT-traversal with method 3 2023:02:08-17:25:53 station12 pluto[29707]: "S_Station 11" #7: NAT-Traversal: Result using RFC 3947: i am NATed 2023:02:08-17:25:53 station12 pluto[29707]: "S_Station 11" #7: next payload type of ISAKMP Hash Payload has an unknown value: 118 2023:02:08-17:25:53 station12 pluto[29707]: "S_Station 11" #7: malformed payload in packet 2023:02:08-17:26:03 station12 pluto[29707]: "S_Station 11" #7: next payload type of ISAKMP Hash Payload has an unknown value: 72 2023:02:08-17:26:03 station12 pluto[29707]: "S_Station 11" #7: malformed payload in packet 2023:02:08-17:26:23 station12 pluto[29707]: "S_Station 11" #7: next payload type of ISAKMP Hash Payload has an unknown value: 201 2023:02:08-17:26:23 station12 pluto[29707]: "S_Station 11" #7: malformed payload in packet 2023:02:08-17:27:03 station12 pluto[29707]: "S_Station 11" #7: max number of retransmissions (2) reached STATE_MAIN_I3. Possible authentication failure: no acceptable response to our first encrypted message 2023:02:08-17:27:03 station12 pluto[29707]: "S_Station 11" #7: starting keying attempt 2 of an unlimited number 2023:02:08-17:27:03 station12 pluto[29707]: "S_Station 11" #8: initiating Main Mode to replace #7 2023:02:08-17:27:03 station12 pluto[29707]: "S_Station 11" #8: received Vendor ID payload [XAUTH] 2023:02:08-17:27:03 station12 pluto[29707]: "S_Station 11" #8: received Vendor ID payload [Dead Peer Detection] 2023:02:08-17:27:03 station12 pluto[29707]: "S_Station 11" #8: ignoring Vendor ID payload [Cisco-Unity] 2023:02:08-17:27:03 station12 pluto[29707]: "S_Station 11" #8: received Vendor ID payload [RFC 3947] 2023:02:08-17:27:03 station12 pluto[29707]: "S_Station 11" #8: enabling possible NAT-traversal with method 3 2023:02:08-17:27:03 station12 pluto[29707]: "S_Station 11" #8: NAT-Traversal: Result using RFC 3947: i am NATed 2023:02:08-17:27:03 station12 pluto[29707]: "S_Station 11" #8: next payload type of ISAKMP Hash Payload has an unknown value: 41 2023:02:08-17:27:03 station12 pluto[29707]: "S_Station 11" #8: malformed payload in packet 2023:02:08-17:27:13 station12 pluto[29707]: "S_Station 11" #8: next payload type of ISAKMP Hash Payload has an unknown value: 177 2023:02:08-17:27:13 station12 pluto[29707]: "S_Station 11" #8: malformed payload in packet 2023:02:08-17:27:33 station12 pluto[29707]: "S_Station 11" #8: byte 2 of ISAKMP Hash Payload must be zero, but is not 2023:02:08-17:27:33 station12 pluto[29707]: "S_Station 11" #8: malformed payload in packet 2023:02:08-17:28:13 station12 pluto[29707]: "S_Station 11" #8: max number of retransmissions (2) reached STATE_MAIN_I3. Possible authentication failure: no acceptable response to our first encrypted message 2023:02:08-17:28:13 station12 pluto[29707]: "S_Station 11" #8: starting keying attempt 3 of an unlimited number 2023:02:08-17:28:13 station12 pluto[29707]: "S_Station 11" #9: initiating Main Mode to replace #8 2023:02:08-17:28:13 station12 pluto[29707]: "S_Station 11" #9: received Vendor ID payload [XAUTH] 2023:02:08-17:28:13 station12 pluto[29707]: "S_Station 11" #9: received Vendor ID payload [Dead Peer Detection] 2023:02:08-17:28:13 station12 pluto[29707]: "S_Station 11" #9: ignoring Vendor ID payload [Cisco-Unity] 2023:02:08-17:28:13 station12 pluto[29707]: "S_Station 11" #9: received Vendor ID payload [RFC 3947] 2023:02:08-17:28:13 station12 pluto[29707]: "S_Station 11" #9: enabling possible NAT-traversal with method 3 2023:02:08-17:28:13 station12 pluto[29707]: "S_Station 11" #9: NAT-Traversal: Result using RFC 3947: i am NATed 2023:02:08-17:28:13 station12 pluto[29707]: "S_Station 11" #9: next payload type of ISAKMP Hash Payload has an unknown value: 206 2023:02:08-17:28:13 station12 pluto[29707]: "S_Station 11" #9: malformed payload in packet 2023:02:08-17:28:23 station12 pluto[29707]: "S_Station 11" #9: next payload type of ISAKMP Hash Payload has an unknown value: 113 2023:02:08-17:28:23 station12 pluto[29707]: "S_Station 11" #9: malformed payload in packet 2023:02:08-17:28:44 station12 pluto[29707]: "S_Station 11" #9: next payload type of ISAKMP Hash Payload has an unknown value: 192 2023:02:08-17:28:44 station12 pluto[29707]: "S_Station 11" #9: malformed payload in packet