Project

General

Profile

Issue #570

Android native VPN client to Strongswan problem

Added by Tadas Blinda over 11 years ago. Updated over 9 years ago.

Status:
Closed
Priority:
Normal
Category:
configuration
Affected version:
5.1.2
Resolution:
No change required

Description

Hi everyone,

i've been banging my heads against this issue for several days and i cannot establish connection with VPN server (Centos/Strongswan v5.1.2) from my Android phone using IPSec Xauth RSA (ikev1) connection type. I tried various tutorials but the problem remains the same. Have no problem connecting from iPhone (ikev1).

I am getting "invalid HASH_V1 payload length, decryption failed?" error

This is the configuration for the strongswan connection

ipsec.conf:

conn %default
    ikelifetime=60m
    keylife=20m
    rekeymargin=3m
    keyingtries=1

conn android_IPSec_ikev1
    keyexchange=ikev1
    left=%defaultroute
    leftsubnet=0.0.0.0/0
    leftcert=serverCert.pem
    leftfirewall=yes
    right=%any
    rightsourceip=10.255.0.0/24
    rightdns=212.59.1.1
    rightauth=pubkey
    rightauth2=xauth
    auto=add

ipsec.secret

: RSA serverKey.pem
kemeris : XAUTH "pass1" 

error.log

Apr  8 11:31:32 s1 charon: 11[NET] received packet: from 10.0.0.11[500] to 78.60.3.52[500] (476 bytes)
Apr  8 11:31:32 s1 charon: 11[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V ]
Apr  8 11:31:32 s1 charon: 11[IKE] received NAT-T (RFC 3947) vendor ID
Apr  8 11:31:32 s1 charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
Apr  8 11:31:32 s1 charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
Apr  8 11:31:32 s1 charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-00 vendor ID
Apr  8 11:31:32 s1 charon: 11[IKE] received XAuth vendor ID
Apr  8 11:31:32 s1 charon: 11[IKE] received Cisco Unity vendor ID
Apr  8 11:31:32 s1 charon: 11[IKE] received FRAGMENTATION vendor ID
Apr  8 11:31:32 s1 charon: 11[IKE] received DPD vendor ID
Apr  8 11:31:32 s1 charon: 11[IKE] 10.0.0.11 is initiating a Main Mode IKE_SA
Apr  8 11:31:32 s1 charon: 11[ENC] generating ID_PROT response 0 [ SA V V V ]
Apr  8 11:31:32 s1 charon: 11[NET] sending packet: from 78.60.3.52[500] to 10.0.0.11[500] (136 bytes)
Apr  8 11:31:32 s1 charon: 10[NET] received packet: from 10.0.0.11[500] to 78.60.3.52[500] (228 bytes)
Apr  8 11:31:32 s1 charon: 10[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
Apr  8 11:31:32 s1 charon: 10[IKE] sending cert request for "C=LT, S=Vilniaus m., L=Vilnius, O=Zeusman MB, CN=vpn.zeusman.lt" 
Apr  8 11:31:32 s1 charon: 10[ENC] generating ID_PROT response 0 [ KE No CERTREQ NAT-D NAT-D ]
Apr  8 11:31:32 s1 charon: 10[NET] sending packet: from 78.60.3.52[500] to 10.0.0.11[500] (350 bytes)
Apr  8 11:31:32 s1 charon: 12[NET] received packet: from 10.0.0.11[500] to 78.60.3.52[500] (1228 bytes)
Apr  8 11:31:32 s1 charon: 12[ENC] parsed ID_PROT request 0 [ ID CERT SIG ]
Apr  8 11:31:32 s1 charon: 12[IKE] received end entity cert "C=GB, O=Zeusman MB, CN=Tadas Blinda" 
Apr  8 11:31:32 s1 charon: 12[CFG] looking for XAuthInitRSA peer configs matching 78.60.3.52...10.0.0.11[C=GB, O=Zeusman MB, CN=Tadas Blinda]
Apr  8 11:31:32 s1 charon: 12[CFG] selected peer config "ios_IPSec_ikev1" 
Apr  8 11:31:32 s1 charon: 12[CFG]   using trusted ca certificate "C=LT, S=Vilniaus m., L=Vilnius, O=Zeusman MB, CN=vpn.zeusman.lt" 
Apr  8 11:31:32 s1 charon: 12[CFG] checking certificate status of "C=GB, O=Zeusman MB, CN=Tadas Blinda" 
Apr  8 11:31:32 s1 charon: 12[CFG] certificate status is not available
Apr  8 11:31:32 s1 charon: 12[CFG]   reached self-signed root ca with a path length of 0
Apr  8 11:31:32 s1 charon: 12[CFG]   using trusted certificate "C=GB, O=Zeusman MB, CN=Tadas Blinda" 
Apr  8 11:31:32 s1 charon: 12[IKE] authentication of 'C=GB, O=Zeusman MB, CN=Tadas Blinda' with RSA successful
Apr  8 11:31:32 s1 charon: 12[IKE] authentication of 'C=LT, S=Vilniaus m., L=Vilnius, O=Zeusman MB, CN=vpn.zeusman.lt' (myself) successful
Apr  8 11:31:32 s1 charon: 12[ENC] generating ID_PROT response 0 [ ID SIG ]
Apr  8 11:31:32 s1 charon: 12[NET] sending packet: from 78.60.3.52[500] to 10.0.0.11[500] (412 bytes)
Apr  8 11:31:32 s1 charon: 12[ENC] generating TRANSACTION request 3632658472 [ HASH CPRQ(X_USER X_PWD) ]
Apr  8 11:31:32 s1 charon: 12[NET] sending packet: from 78.60.3.52[500] to 10.0.0.11[500] (76 bytes)
Apr  8 11:31:32 s1 charon: 13[NET] received packet: from 10.0.0.11[500] to 78.60.3.52[500] (92 bytes)
Apr  8 11:31:32 s1 charon: 13[ENC] invalid HASH_V1 payload length, decryption failed?
Apr  8 11:31:32 s1 charon: 13[ENC] could not decrypt payloads
Apr  8 11:31:32 s1 charon: 13[IKE] message parsing failed
Apr  8 11:31:32 s1 charon: 13[IKE] ignore malformed INFORMATIONAL request
Apr  8 11:31:32 s1 charon: 13[IKE] INFORMATIONAL_V1 request with message ID 2246676801 processing failed
Apr  8 11:31:35 s1 charon: 15[NET] received packet: from 10.0.0.11[500] to 78.60.3.52[500] (1228 bytes)
Apr  8 11:31:35 s1 charon: 15[IKE] received retransmit of request with ID 0, retransmitting response
Apr  8 11:31:35 s1 charon: 15[NET] sending packet: from 78.60.3.52[500] to 10.0.0.11[500] (412 bytes)
Apr  8 11:31:35 s1 charon: 05[NET] received packet: from 10.0.0.11[500] to 78.60.3.52[500] (92 bytes)
Apr  8 11:31:35 s1 charon: 05[ENC] invalid HASH_V1 payload length, decryption failed?
Apr  8 11:31:35 s1 charon: 05[ENC] could not decrypt payloads
Apr  8 11:31:35 s1 charon: 05[IKE] message parsing failed
Apr  8 11:31:35 s1 charon: 05[IKE] ignore malformed INFORMATIONAL request

Is there something I did wrong?

Thanks


Related issues

Related to Issue #836: invalid HASH_V1 payload length, decryption failed?could not decrypt payloads,message parsing failed,ignore malformed INFORMATIONAL requestClosed28.01.2015

History

#1 Updated by Ashok Thota over 10 years ago

Hi
Can you please the paste the configuration of iOS here, because i am getting this error from so many days and there is no clue how to dig out or you can help me out from this problem.

Thanks in advance

#2 Updated by Tobias Brunner over 10 years ago

  • Description updated (diff)
  • Status changed from New to Feedback

This may be related to #836. Are you sure the client is configured for XAuth/RSA authentication (and not only RSA authentication)? Do you have any logs from the client? What Android version is running on the client? On what kind of device?

Connecting from Android 4.4.4 (Nexus 5) with XAuth/RSA works fine here.

#3 Updated by Tobias Brunner over 10 years ago

  • Related to Issue #836: invalid HASH_V1 payload length, decryption failed?could not decrypt payloads,message parsing failed,ignore malformed INFORMATIONAL request added

#4 Updated by G. G. about 10 years ago

Got the same issue on Android 5.0+.
According to the logs on the phone (adb / logcat), it looks like racoon has some issue with the certificate.

#5 Updated by Tobias Brunner almost 10 years ago

  • Category set to configuration
  • Status changed from Feedback to Closed
  • Assignee set to Tobias Brunner
  • Resolution set to No change required

Sounds like a client issue (or a configuration issue if the certificate is unsuitable). Closing this for now.

#6 Updated by Bowen Sun over 9 years ago

I'm having the same issue with strongswan 5.1.2, the same config works on iOS(9.3) but not OS X(10.11.4).

ipsec.conf

conn ipsec-ikev1-rsa
  keyexchange=ikev1
  left=%defaultroute
  leftcert=vpn.crt
  leftid=@vpn
  leftsubnet=0.0.0.0/0
  rightauth=pubkey
  rightauth2=xauth
  right=%any
  rightcert=client.crt
  rightid=client
  rightsubnet=10.20.0.0/16
  rightsourceip=10.20.0.2/16
  rightdns=8.8.8.8,8.8.4.4
  auto=add

charon.conf

charon {
  cisco_unity = yes
}

Logs from iOS connection

charon: 09[NET] received packet: from 2.3.4.5[12836] to 1.2.3.4[500]
charon: 09[NET] waiting for data on sockets
charon: 16[NET] received packet: from 2.3.4.5[12836] to 1.2.3.4[500] (848 bytes)
charon: 16[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V V V ]
charon: 16[CFG] looking for an ike config for 1.2.3.4...2.3.4.5
charon: 16[CFG]   candidate: %any...%any, prio 24
charon: 16[CFG]   candidate: %any...%any, prio 24
charon: 16[CFG]   candidate: %any...%any, prio 28
charon: 16[CFG]   candidate: %any...%any, prio 28
charon: 16[CFG] found matching ike config: %any...%any with prio 28
charon: 16[IKE] received NAT-T (RFC 3947) vendor ID
charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
charon: 16[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
charon: 16[IKE] received XAuth vendor ID
charon: 16[IKE] received Cisco Unity vendor ID
charon: 16[IKE] received FRAGMENTATION vendor ID
charon: 16[IKE] received DPD vendor ID
charon: 16[IKE] 2.3.4.5 is initiating a Main Mode IKE_SA
charon: 16[IKE] IKE_SA (unnamed)[6] state change: CREATED => CONNECTING
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable DIFFIE_HELLMAN_GROUP found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable PSEUDO_RANDOM_FUNCTION found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable DIFFIE_HELLMAN_GROUP found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable PSEUDO_RANDOM_FUNCTION found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 16[CFG] selecting proposal:
charon: 16[CFG]   proposal matches
charon: 16[CFG] received proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_2048, IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048, IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1536, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024
charon: 16[CFG] configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:3DES_CBC/AES_CBC_128/AES_CBC_192/AES_CBC_256/AES_CTR_128/AES_CTR_192/AES_CTR_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/CAMELLIA_CTR_128/CAMELLIA_CTR_192/CAMELLIA_CTR_256/AES_CCM_8_128/AES_CCM_8_192/AES_CCM_8_256/AES_CCM_12_128/AES_CCM_12_192/AES_CCM_12_256/AES_CCM_16_128/AES_CCM_16_192/AES_CCM_16_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/CAMELLIA_CCM_8_128/CAMELLIA_CCM_8_192/CAMELLIA_CCM_8_256/CAMELLIA_CCM_12_128/CAMELLIA_CCM_12_192/CAMELLIA_CCM_12_256/CAMELLIA_CCM_16_128/CAMELLIA_CCM_16_192/CAMELLIA_CCM_16_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/PRF_HMAC_MD5/PRF_HMAC_SHA1/PRF_AES128_XCBC/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_CMAC/MODP_1024/MODP_1536/MODP_2048/MODP_3072/MODP_4096/MODP_8192/ECP_256/ECP_384/ECP_521/MODP_1024_160/MODP_2048_224/MODP_2048_256/ECP_192/ECP_224/ECP_224_BP/ECP_256_BP/ECP_384_BP/ECP_512_BP
charon: 16[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
charon: 16[IKE] sending XAuth vendor ID
charon: 16[IKE] sending DPD vendor ID
charon: 16[IKE] sending Cisco Unity vendor ID
charon: 16[IKE] sending NAT-T (RFC 3947) vendor ID
charon: 16[ENC] generating ID_PROT response 0 [ SA V V V V ]
charon: 16[NET] sending packet: from 1.2.3.4[500] to 2.3.4.5[12836] (156 bytes)
charon: 10[NET] sending packet: from 1.2.3.4[500] to 2.3.4.5[12836]
charon: 09[NET] received packet: from 2.3.4.5[12836] to 1.2.3.4[500]
charon: 09[NET] waiting for data on sockets
charon: 04[NET] received packet: from 2.3.4.5[12836] to 1.2.3.4[500] (380 bytes)
charon: 04[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
charon: 04[IKE] local host is behind NAT, sending keep alives
charon: 04[IKE] remote host is behind NAT
charon: 04[IKE] sending cert request for "C=GB, O=org, CN=org CA" 
charon: 04[ENC] generating ID_PROT response 0 [ KE No CERTREQ NAT-D NAT-D ]
charon: 04[NET] sending packet: from 1.2.3.4[500] to 2.3.4.5[12836] (447 bytes)
charon: 10[NET] sending packet: from 1.2.3.4[500] to 2.3.4.5[12836]
charon: 09[NET] received packet: from 2.3.4.5[46876] to 1.2.3.4[4500]
charon: 09[NET] waiting for data on sockets
charon: 15[NET] received packet: from 2.3.4.5[46876] to 1.2.3.4[4500] (1164 bytes)
charon: 15[ENC] parsed ID_PROT request 0 [ ID CERT SIG CERTREQ N(INITIAL_CONTACT) ]
charon: 15[IKE] ignoring certificate request without data
charon: 15[IKE] received end entity cert "C=GB, O=org, CN=client" 
charon: 15[CFG] looking for XAuthInitRSA peer configs matching 1.2.3.4...2.3.4.5[C=GB, O=org, CN=client]
charon: 15[CFG]   candidate "ipsec-l2tp-psk", match: 1/1/24 (me/other/ike)
charon: 15[CFG]   candidate "ipsec-l2tp-rsa", match: 1/1/24 (me/other/ike)
charon: 15[CFG]   candidate "ipsec-ikev1-psk", match: 1/1/28 (me/other/ike)
charon: 15[CFG]   candidate "ipsec-ikev1-rsa", match: 1/20/28 (me/other/ike)
charon: 15[CFG] selected peer config "ipsec-ikev1-rsa" 
charon: 15[CFG]   certificate "C=GB, O=org, CN=client" key: 2048 bit RSA
charon: 15[CFG]   using trusted ca certificate "C=GB, O=org, CN=org CA" 
charon: 15[CFG] checking certificate status of "C=GB, O=org, CN=client" 
charon: 15[CFG] ocsp check skipped, no ocsp found
charon: 15[CFG] certificate status is not available
charon: 15[CFG]   certificate "C=GB, O=org, CN=org CA" key: 2048 bit RSA
charon: 15[CFG]   reached self-signed root ca with a path length of 0
charon: 15[CFG]   using trusted certificate "C=GB, O=org, CN=client" 
charon: 15[IKE] authentication of 'C=GB, O=org, CN=client' with RSA successful
charon: 15[IKE] authentication of 'vpn' (myself) successful
charon: 15[IKE] queueing XAUTH task
charon: 15[IKE] sending end entity cert "C=GB, O=org, CN=vpn" 
charon: 15[ENC] generating ID_PROT response 0 [ ID CERT SIG ]
charon: 15[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46876] (1164 bytes)
charon: 10[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46876]
charon: 15[IKE] activating new tasks
charon: 15[IKE]   activating XAUTH task
charon: 15[ENC] generating TRANSACTION request 3177247268 [ HASH CPRQ(X_USER X_PWD) ]
charon: 15[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46876] (92 bytes)
charon: 10[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46876]
charon: 09[NET] received packet: from 2.3.4.5[46876] to 1.2.3.4[4500]
charon: 09[NET] waiting for data on sockets
charon: 01[NET] received packet: from 2.3.4.5[46876] to 1.2.3.4[4500] (108 bytes)
charon: 01[ENC] parsed TRANSACTION response 3177247268 [ HASH CPRP(X_USER X_PWD) ]
charon: 01[IKE] XAuth authentication of 'avatar' successful
charon: 01[IKE] reinitiating already active tasks
charon: 01[IKE]   XAUTH task
charon: 01[ENC] generating TRANSACTION request 37044732 [ HASH CPS(X_STATUS) ]
charon: 01[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46876] (92 bytes)
charon: 10[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46876]
charon: 09[NET] received packet: from 2.3.4.5[46876] to 1.2.3.4[4500]
charon: 09[NET] waiting for data on sockets
charon: 09[NET] received packet: from 2.3.4.5[46876] to 1.2.3.4[4500]
charon: 09[NET] waiting for data on sockets
charon: 06[NET] received packet: from 2.3.4.5[46876] to 1.2.3.4[4500] (92 bytes)
charon: 06[ENC] parsed TRANSACTION response 37044732 [ HASH CPA(X_STATUS) ]
charon: 06[IKE] IKE_SA ipsec-ikev1-rsa[6] established between 1.2.3.4[vpn]...2.3.4.5[C=GB, O=org, CN=client]
charon: 06[IKE] IKE_SA ipsec-ikev1-rsa[6] state change: CONNECTING => ESTABLISHED
charon: 06[IKE] scheduling reauthentication in 9988s
charon: 06[IKE] maximum IKE_SA lifetime 10528s
charon: 06[IKE] activating new tasks
charon: 06[IKE] nothing to initiate
charon: 03[NET] received packet: from 2.3.4.5[46876] to 1.2.3.4[4500] (188 bytes)
charon: 03[ENC] unknown attribute type (28683)
charon: 03[ENC] parsed TRANSACTION request 564327026 [ HASH CPRQ(ADDR MASK DNS NBNS EXP VER U_BANNER U_DEFDOM U_SPLITDNS U_SPLITINC U_LOCALLAN U_PFS U_SAVEPWD U_FWTYPE U_BKPSRV (28683)) ]
charon: 03[IKE] processing INTERNAL_IP4_ADDRESS attribute
charon: 03[IKE] processing INTERNAL_IP4_NETMASK attribute
charon: 03[IKE] processing INTERNAL_IP4_DNS attribute
charon: 03[IKE] processing INTERNAL_IP4_NBNS attribute
charon: 03[IKE] processing INTERNAL_ADDRESS_EXPIRY attribute
charon: 03[IKE] processing APPLICATION_VERSION attribute
charon: 03[IKE] processing UNITY_BANNER attribute
charon: 03[IKE] processing UNITY_DEF_DOMAIN attribute
charon: 03[IKE] processing UNITY_SPLITDNS_NAME attribute
charon: 03[IKE] processing UNITY_SPLIT_INCLUDE attribute
charon: 03[IKE] processing UNITY_LOCAL_LAN attribute
charon: 03[IKE] processing UNITY_PFS attribute
charon: 03[IKE] processing UNITY_SAVE_PASSWD attribute
charon: 03[IKE] processing UNITY_FW_TYPE attribute
charon: 03[IKE] processing UNITY_BACKUP_SERVERS attribute
charon: 03[IKE] processing (28683) attribute
charon: 03[IKE] peer requested virtual IP %any
charon: 03[CFG] assigning new lease to 'avatar'
charon: 03[IKE] assigning virtual IP 10.20.0.3 to peer 'avatar'
charon: 03[CFG] proposing traffic selectors for us:
charon: 03[CFG]  0.0.0.0/0
charon: 03[ENC] generating TRANSACTION response 564327026 [ HASH CPRP(ADDR DNS DNS) ]
charon: 03[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46876] (108 bytes)
charon: 10[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46876]
charon: 09[NET] received packet: from 2.3.4.5[46876] to 1.2.3.4[4500]
charon: 09[NET] waiting for data on sockets
charon: 02[NET] received packet: from 2.3.4.5[46876] to 1.2.3.4[4500] (300 bytes)
charon: 02[ENC] parsed QUICK_MODE request 768699248 [ HASH SA No ID ID ]
charon: 02[CFG] looking for a child config for 0.0.0.0/0 === 10.20.0.3/32
charon: 02[CFG] proposing traffic selectors for us:
charon: 02[CFG]  0.0.0.0/0
charon: 02[CFG] proposing traffic selectors for other:
charon: 02[CFG]  10.20.0.0/16
charon: 02[CFG]   candidate "ipsec-ikev1-rsa" with prio 5+1
charon: 02[CFG] found matching child config "ipsec-ikev1-rsa" with prio 6
charon: 02[CFG] selecting traffic selectors for other:
charon: 02[CFG]  config: 10.20.0.0/16, received: 10.20.0.3/32 => match: 10.20.0.3/32
charon: 02[CFG] selecting traffic selectors for us:
charon: 02[CFG]  config: 0.0.0.0/0, received: 0.0.0.0/0 => match: 0.0.0.0/0
charon: 02[CFG] selecting proposal:
charon: 02[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 02[CFG] selecting proposal:
charon: 02[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 02[CFG] selecting proposal:
charon: 02[CFG]   proposal matches
charon: 02[CFG] received proposals: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_MD5_96/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_MD5_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_MD5_96/NO_EXT_SEQ
charon: 02[CFG] configured proposals: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/AES_CBC_192/AES_CBC_256/3DES_CBC/BLOWFISH_CBC_256/HMAC_SHA1_96/AES_XCBC_96/HMAC_MD5_96/NO_EXT_SEQ
charon: 02[CFG] selected proposal: ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ
charon: 02[CFG] changing proposed traffic selectors for us:
charon: 02[CFG]  0.0.0.0/0
charon: 02[ENC] generating QUICK_MODE response 768699248 [ HASH SA No ID ID ]
charon: 02[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46876] (188 bytes)
charon: 10[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46876]
charon: 09[NET] received packet: from 2.3.4.5[46876] to 1.2.3.4[4500]
charon: 09[NET] waiting for data on sockets
charon: 11[NET] received packet: from 2.3.4.5[46876] to 1.2.3.4[4500] (76 bytes)
charon: 11[ENC] parsed QUICK_MODE request 768699248 [ HASH ]
charon: 11[CFG] proposing traffic selectors for us:
charon: 11[CFG]  0.0.0.0/0
charon: 11[IKE] CHILD_SA ipsec-ikev1-rsa{2} established with SPIs cda17068_i 09e76e13_o and TS 0.0.0.0/0 === 10.20.0.3/32

Logs from OS X which doesn't work

charon: 09[NET] received packet: from 2.3.4.5[12897] to 1.2.3.4[500]
charon: 09[NET] waiting for data on sockets
charon: 05[NET] received packet: from 2.3.4.5[12897] to 1.2.3.4[500] (848 bytes)
charon: 05[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V V V ]
charon: 05[CFG] looking for an ike config for 1.2.3.4...2.3.4.5
charon: 05[CFG]   candidate: %any...%any, prio 24
charon: 05[CFG]   candidate: %any...%any, prio 24
charon: 05[CFG]   candidate: %any...%any, prio 28
charon: 05[CFG]   candidate: %any...%any, prio 28
charon: 05[CFG] found matching ike config: %any...%any with prio 28
charon: 05[IKE] received NAT-T (RFC 3947) vendor ID
charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
charon: 05[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
charon: 05[IKE] received XAuth vendor ID
charon: 05[IKE] received Cisco Unity vendor ID
charon: 05[IKE] received FRAGMENTATION vendor ID
charon: 05[IKE] received DPD vendor ID
charon: 05[IKE] 2.3.4.5 is initiating a Main Mode IKE_SA
charon: 05[IKE] IKE_SA (unnamed)[7] state change: CREATED => CONNECTING
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable DIFFIE_HELLMAN_GROUP found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable PSEUDO_RANDOM_FUNCTION found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable DIFFIE_HELLMAN_GROUP found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable PSEUDO_RANDOM_FUNCTION found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   no acceptable ENCRYPTION_ALGORITHM found
charon: 05[CFG] selecting proposal:
charon: 05[CFG]   proposal matches
charon: 05[CFG] received proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_2048, IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048, IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1536, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1536, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024, IKE:DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024
charon: 05[CFG] configured proposals: IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536, IKE:3DES_CBC/AES_CBC_128/AES_CBC_192/AES_CBC_256/AES_CTR_128/AES_CTR_192/AES_CTR_256/CAMELLIA_CBC_128/CAMELLIA_CBC_192/CAMELLIA_CBC_256/CAMELLIA_CTR_128/CAMELLIA_CTR_192/CAMELLIA_CTR_256/AES_CCM_8_128/AES_CCM_8_192/AES_CCM_8_256/AES_CCM_12_128/AES_CCM_12_192/AES_CCM_12_256/AES_CCM_16_128/AES_CCM_16_192/AES_CCM_16_256/AES_GCM_8_128/AES_GCM_8_192/AES_GCM_8_256/AES_GCM_12_128/AES_GCM_12_192/AES_GCM_12_256/AES_GCM_16_128/AES_GCM_16_192/AES_GCM_16_256/CAMELLIA_CCM_8_128/CAMELLIA_CCM_8_192/CAMELLIA_CCM_8_256/CAMELLIA_CCM_12_128/CAMELLIA_CCM_12_192/CAMELLIA_CCM_12_256/CAMELLIA_CCM_16_128/CAMELLIA_CCM_16_192/CAMELLIA_CCM_16_256/HMAC_MD5_96/HMAC_SHA1_96/AES_XCBC_96/AES_CMAC_96/HMAC_SHA2_256_128/HMAC_SHA2_384_192/HMAC_SHA2_512_256/PRF_HMAC_MD5/PRF_HMAC_SHA1/PRF_AES128_XCBC/PRF_HMAC_SHA2_256/PRF_HMAC_SHA2_384/PRF_HMAC_SHA2_512/PRF_AES128_CMAC/MODP_1024/MODP_1536/MODP_2048/MODP_3072/MODP_4096/MODP_8192/ECP_256/ECP_384/ECP_521/MODP_1024_160/MODP_2048_224/MODP_2048_256/ECP_192/ECP_224/ECP_224_BP/ECP_256_BP/ECP_384_BP/ECP_512_BP
charon: 05[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
charon: 05[IKE] sending XAuth vendor ID
charon: 05[IKE] sending DPD vendor ID
charon: 05[IKE] sending Cisco Unity vendor ID
charon: 05[IKE] sending NAT-T (RFC 3947) vendor ID
charon: 05[ENC] generating ID_PROT response 0 [ SA V V V V ]
charon: 05[NET] sending packet: from 1.2.3.4[500] to 2.3.4.5[12897] (156 bytes)
charon: 10[NET] sending packet: from 1.2.3.4[500] to 2.3.4.5[12897]
charon: 09[NET] received packet: from 2.3.4.5[12897] to 1.2.3.4[500]
charon: 09[NET] waiting for data on sockets
charon: 11[NET] received packet: from 2.3.4.5[12897] to 1.2.3.4[500] (380 bytes)
charon: 11[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
charon: 11[IKE] local host is behind NAT, sending keep alives
charon: 11[IKE] remote host is behind NAT
charon: 11[IKE] sending cert request for "C=GB, O=org, CN=org CA" 
charon: 11[ENC] generating ID_PROT response 0 [ KE No CERTREQ NAT-D NAT-D ]
charon: 11[NET] sending packet: from 1.2.3.4[500] to 2.3.4.5[12897] (447 bytes)
charon: 10[NET] sending packet: from 1.2.3.4[500] to 2.3.4.5[12897]
charon: 09[NET] received packet: from 2.3.4.5[46952] to 1.2.3.4[4500]
charon: 09[NET] waiting for data on sockets
charon: 12[NET] received packet: from 2.3.4.5[46952] to 1.2.3.4[4500] (1132 bytes)
charon: 12[ENC] parsed ID_PROT request 0 [ ID CERT SIG CERTREQ ]
charon: 12[IKE] ignoring certificate request without data
charon: 12[IKE] received end entity cert "C=GB, O=org, CN=client" 
charon: 12[CFG] looking for XAuthInitRSA peer configs matching 1.2.3.4...2.3.4.5[C=GB, O=org, CN=client]
charon: 12[CFG]   candidate "ipsec-l2tp-psk", match: 1/1/24 (me/other/ike)
charon: 12[CFG]   candidate "ipsec-l2tp-rsa", match: 1/1/24 (me/other/ike)
charon: 12[CFG]   candidate "ipsec-ikev1-psk", match: 1/1/28 (me/other/ike)
charon: 12[CFG]   candidate "ipsec-ikev1-rsa", match: 1/20/28 (me/other/ike)
charon: 12[CFG] selected peer config "ipsec-ikev1-rsa" 
charon: 12[CFG]   certificate "C=GB, O=org, CN=client" key: 2048 bit RSA
charon: 12[CFG]   using trusted ca certificate "C=GB, O=org, CN=org CA" 
charon: 12[CFG] checking certificate status of "C=GB, O=org, CN=client" 
charon: 12[CFG] ocsp check skipped, no ocsp found
charon: 12[CFG] certificate status is not available
charon: 12[CFG]   certificate "C=GB, O=org, CN=org CA" key: 2048 bit RSA
charon: 12[CFG]   reached self-signed root ca with a path length of 0
charon: 12[CFG]   using trusted certificate "C=GB, O=org, CN=client" 
charon: 12[IKE] authentication of 'C=GB, O=org, CN=client' with RSA successful
charon: 12[IKE] authentication of 'vpn' (myself) successful
charon: 12[IKE] queueing XAUTH task
charon: 12[IKE] sending end entity cert "C=GB, O=org, CN=vpn" 
charon: 12[ENC] generating ID_PROT response 0 [ ID CERT SIG ]
charon: 12[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46952] (1164 bytes)
charon: 10[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46952]
charon: 12[IKE] activating new tasks
charon: 12[IKE]   activating XAUTH task
charon: 12[ENC] generating TRANSACTION request 3955598473 [ HASH CPRQ(X_USER X_PWD) ]
charon: 12[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46952] (92 bytes)
charon: 10[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46952]
charon: 09[NET] received packet: from 2.3.4.5[46952] to 1.2.3.4[4500]
charon: 09[NET] waiting for data on sockets
charon: 13[NET] received packet: from 2.3.4.5[46952] to 1.2.3.4[4500] (92 bytes)
charon: 13[ENC] invalid HASH_V1 payload length, decryption failed?
charon: 13[ENC] could not decrypt payloads
charon: 13[IKE] message parsing failed
charon: 13[IKE] ignore malformed INFORMATIONAL request
charon: 13[IKE] INFORMATIONAL_V1 request with message ID 2673243766 processing failed
charon: 16[IKE] sending retransmit 1 of request message ID 3955598473, seq 1
charon: 16[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46952] (92 bytes)
charon: 10[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46952]
charon: 04[IKE] sending retransmit 2 of request message ID 3955598473, seq 1
charon: 04[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46952] (92 bytes)
charon: 10[NET] sending packet: from 1.2.3.4[4500] to 2.3.4.5[46952]

#7 Updated by Bowen Sun over 9 years ago

Attaching OS X racoon logs

vpnracoon[10077] <Debug>: New IKE-Session to 1.2.3.4[500].
vpnracoon[10077] <Notice>: Connecting.
vpnracoon[10077] <Debug>: *** New Phase 1
vpnracoon[10077] <Debug>: ****** state changed to: IKEv1 ident I start
vpnracoon[10077] <Debug>: ===
vpnracoon[10077] <Info>: initiate new phase 1 negotiation: 10.143.187.41[500]<=>1.2.3.4[500]
vpnracoon[10077] <Info>: begin Identity Protection mode.
vpnracoon[10077] <Notice>: IPSec Phase 1 started (Initiated by me).
vpnracoon[10077] <Debug>: new cookie:
vpnracoon[10077] <Debug>: add payload of len 540, next type 13
vpnracoon[10077] <Debug>: add payload of len 16, next type 13
vpnracoon[10077] <Debug>: add payload of len 16, next type 13
vpnracoon[10077] <Debug>: add payload of len 16, next type 13
vpnracoon[10077] <Debug>: add payload of len 16, next type 13
vpnracoon[10077] <Debug>: add payload of len 16, next type 13
vpnracoon[10077] <Debug>: add payload of len 16, next type 13
vpnracoon[10077] <Debug>: add payload of len 16, next type 13
vpnracoon[10077] <Debug>: add payload of len 16, next type 13
vpnracoon[10077] <Debug>: add payload of len 16, next type 13
vpnracoon[10077] <Debug>: add payload of len 16, next type 13
vpnracoon[10077] <Debug>: add payload of len 8, next type 13
vpnracoon[10077] <Debug>: add payload of len 16, next type 13
vpnracoon[10077] <Debug>: add payload of len 20, next type 13
vpnracoon[10077] <Debug>: add payload of len 16, next type 0
vpnracoon[10077] <Debug>: 848 bytes from 10.143.187.41[500] to 1.2.3.4[500]
vpnracoon[10077] <Debug>: sockname 10.143.187.41[500]
vpnracoon[10077] <Debug>: send packet from 10.143.187.41[500]
vpnracoon[10077] <Debug>: send packet to 1.2.3.4[500]
vpnracoon[10077] <Debug>: @@@@@@ data being sent:
vpnracoon[10077] <Debug>: 1 times of 848 bytes message will be sent to 1.2.3.4[500]
vpnracoon[10077] <Debug>: Resend Phase 1 packet 25fdff6c38a3a9c8:0000000000000000
vpnracoon[10077] <Debug>: ****** state changed to: IKEv1 ident I msg1 sent
vpnracoon[10077] <Notice>: IKE Packet: transmit success. (Initiator, Main-Mode message 1).
vpnracoon[10077] <Notice>: >>>>> phase change status = Phase 1 started by us
vpnracoon[10077] <Debug>: vpn control writing 20 bytes
vpnracoon[10077] <Debug>: @@@@@@ data from readmsg:
vpnracoon[10077] <Debug>: @@@@@@ data from readmsg:
vpnracoon[10077] <Debug>: 156 bytes message received from 1.2.3.4[500] to 10.143.187.41[500]
vpnracoon[10077] <Debug>: start search for IKE-Session. target 1.2.3.4[500].
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[500].
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 1.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: start search for IKE-Session. target 1.2.3.4[500].
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[500].
vpnracoon[10077] <Debug>: Pre-existing IKE-Session to 1.2.3.4[500]. case 1.
vpnracoon[10077] <Debug>: begin.
vpnracoon[10077] <Debug>: seen nptype=1(sa)
vpnracoon[10077] <Debug>: seen nptype=13(vid)
vpnracoon[10077] <Debug>: seen nptype=13(vid)
vpnracoon[10077] <Debug>: seen nptype=13(vid)
vpnracoon[10077] <Debug>: seen nptype=13(vid)
vpnracoon[10077] <Debug>: succeed.
vpnracoon[10077] <Info>: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
vpnracoon[10077] <Info>: received Vendor ID: DPD
vpnracoon[10077] <Info>: received Vendor ID: CISCO-UNITY
vpnracoon[10077] <Info>: received Vendor ID: RFC 3947
vpnracoon[10077] <Info>: Selected NAT-T version: RFC 3947
vpnracoon[10077] <Debug>: begin.
vpnracoon[10077] <Debug>: seen nptype=2(prop)
vpnracoon[10077] <Debug>: succeed.
vpnracoon[10077] <Debug>: proposal #1 len=44
vpnracoon[10077] <Debug>: begin.
vpnracoon[10077] <Debug>: seen nptype=3(trns)
vpnracoon[10077] <Debug>: succeed.
vpnracoon[10077] <Debug>: transform #1 len=36
vpnracoon[10077] <Debug>: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
vpnracoon[10077] <Debug>: encryption(aes)
vpnracoon[10077] <Debug>: type=Key Length, flag=0x8000, lorv=256
vpnracoon[10077] <Debug>: type=Hash Algorithm, flag=0x8000, lorv=SHA256
vpnracoon[10077] <Debug>: hash(sha2_256)
vpnracoon[10077] <Debug>: type=Group Description, flag=0x8000, lorv=2048-bit MODP group
vpnracoon[10077] <Debug>: hmac(modp2048)
vpnracoon[10077] <Debug>: type=Authentication Method, flag=0x8000, lorv=XAuth RSASIG client
vpnracoon[10077] <Debug>: type=Life Type, flag=0x8000, lorv=seconds
vpnracoon[10077] <Debug>: type=Life Duration, flag=0x8000, lorv=3600
vpnracoon[10077] <Debug>: pair 1:
vpnracoon[10077] <Debug>:  0x7fc5c8e35130: next=0x0 tnext=0x0
vpnracoon[10077] <Debug>: proposal #1: 1 transform
vpnracoon[10077] <Debug>: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
vpnracoon[10077] <Debug>: trns#=1, trns-id=IKE
vpnracoon[10077] <Debug>: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
vpnracoon[10077] <Debug>: type=Key Length, flag=0x8000, lorv=256
vpnracoon[10077] <Debug>: type=Hash Algorithm, flag=0x8000, lorv=SHA256
vpnracoon[10077] <Debug>: type=Group Description, flag=0x8000, lorv=2048-bit MODP group
vpnracoon[10077] <Debug>: type=Authentication Method, flag=0x8000, lorv=XAuth RSASIG client
vpnracoon[10077] <Debug>: type=Life Type, flag=0x8000, lorv=seconds
vpnracoon[10077] <Debug>: type=Life Duration, flag=0x8000, lorv=3600
vpnracoon[10077] <Debug>: Compared: DB:Peer
vpnracoon[10077] <Debug>: (version = 0:0)
vpnracoon[10077] <Debug>: (lifetime = 3600:3600)
vpnracoon[10077] <Debug>: (lifebyte = 0:0)
vpnracoon[10077] <Debug>: enctype = AES-CBC:AES-CBC
vpnracoon[10077] <Debug>: (encklen = 256:256)
vpnracoon[10077] <Debug>: hashtype = SHA256:SHA256
vpnracoon[10077] <Debug>: authmethod = XAuth RSASIG client:XAuth RSASIG client
vpnracoon[10077] <Debug>: dh_group = 2048-bit MODP group:2048-bit MODP group
vpnracoon[10077] <Debug>: an acceptable proposal found.
vpnracoon[10077] <Debug>: hmac(modp2048)
vpnracoon[10077] <Debug>: agreed on XAuth RSASIG client auth.
vpnracoon[10077] <Debug>: ****** state changed to: IKEv1 ident I msg2 rcvd
vpnracoon[10077] <Notice>: >>>>> phase change status = Phase 1 started by peer
vpnracoon[10077] <Debug>: vpn control writing 20 bytes
vpnracoon[10077] <Notice>: IKE Packet: receive success. (Initiator, Main-Mode message 2).
vpnracoon[10077] <Debug>: ===
vpnracoon[10077] <Debug>: compute DH's private.
vpnracoon[10077] <Debug>: compute DH's public.
vpnracoon[10077] <Info>: Hashing 1.2.3.4[500] with algo #4
vpnracoon[10077] <Debug>: hash(sha2_256)
vpnracoon[10077] <Info>: Hashing 10.143.187.41[500] with algo #4
vpnracoon[10077] <Debug>: hash(sha2_256)
vpnracoon[10077] <Info>: Adding remote and local NAT-D payloads.
vpnracoon[10077] <Debug>: add payload of len 256, next type 10
vpnracoon[10077] <Debug>: add payload of len 16, next type 20
vpnracoon[10077] <Debug>: add payload of len 32, next type 20
vpnracoon[10077] <Debug>: add payload of len 32, next type 0
vpnracoon[10077] <Debug>: 380 bytes from 10.143.187.41[500] to 1.2.3.4[500]
vpnracoon[10077] <Debug>: sockname 10.143.187.41[500]
vpnracoon[10077] <Debug>: send packet from 10.143.187.41[500]
vpnracoon[10077] <Debug>: send packet to 1.2.3.4[500]
vpnracoon[10077] <Debug>: @@@@@@ data being sent:
vpnracoon[10077] <Debug>: 1 times of 380 bytes message will be sent to 1.2.3.4[500]
vpnracoon[10077] <Debug>: Resend Phase 1 packet 25fdff6c38a3a9c8:8a5d06340be69dad
vpnracoon[10077] <Debug>: ****** state changed to: IKEv1 ident I msg3 sent
vpnracoon[10077] <Notice>: IKE Packet: transmit success. (Initiator, Main-Mode message 3).
vpnracoon[10077] <Debug>: @@@@@@ data from readmsg:
vpnracoon[10077] <Debug>: @@@@@@ data from readmsg:
vpnracoon[10077] <Debug>: 447 bytes message received from 1.2.3.4[500] to 10.143.187.41[500]
vpnracoon[10077] <Debug>: start search for IKE-Session. target 1.2.3.4[500].
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[500].
vpnracoon[10077] <Debug>: Pre-existing IKE-Session to 1.2.3.4[500]. case 1.
vpnracoon[10077] <Debug>: begin.
vpnracoon[10077] <Debug>: seen nptype=4(ke)
vpnracoon[10077] <Debug>: seen nptype=10(nonce)
vpnracoon[10077] <Debug>: seen nptype=7(cr)
vpnracoon[10077] <Debug>: seen nptype=20(nat-d)
vpnracoon[10077] <Debug>: seen nptype=20(nat-d)
vpnracoon[10077] <Debug>: succeed.
vpnracoon[10077] <Debug>: CR saved
vpnracoon[10077] <Info>: Hashing 10.143.187.41[500] with algo #4
vpnracoon[10077] <Debug>: hash(sha2_256)
vpnracoon[10077] <Info>: NAT-D payload #0 doesn't match
vpnracoon[10077] <Info>: Hashing 1.2.3.4[500] with algo #4
vpnracoon[10077] <Debug>: hash(sha2_256)
vpnracoon[10077] <Info>: NAT-D payload #1 doesn't match
vpnracoon[10077] <Info>: NAT detected: ME PEER
vpnracoon[10077] <Debug>: peer transmitted CR: X.509 Certificate Signature
vpnracoon[10077] <Debug>: ****** state changed to: IKEv1 ident I msg4 rcvd
vpnracoon[10077] <Notice>: IKE Packet: receive success. (Initiator, Main-Mode message 4).
vpnracoon[10077] <Debug>: ===
vpnracoon[10077] <Debug>: compute DH's shared.
vpnracoon[10077] <Debug>: hmac(hmac_sha2_256)
vpnracoon[10077] <Debug>: hmac(hmac_sha2_256)
vpnracoon[10077] <Debug>: hmac(hmac_sha2_256)
vpnracoon[10077] <Debug>: hmac(hmac_sha2_256)
vpnracoon[10077] <Debug>: encryption(aes)
vpnracoon[10077] <Debug>: hash(sha2_256)
vpnracoon[10077] <Debug>: hash(sha2_256)
vpnracoon[10077] <Debug>: encryption(aes)
vpnracoon[10077] <Debug>: done with chking cert status 0
vpnracoon[10077] <Debug>: created CERT payload
vpnracoon[10077] <Debug>: use ID type of DER_ASN1_DN
vpnracoon[10077] <Debug>: hmac(hmac_sha2_256)
vpnracoon[10077] <Debug>: create my CR: X.509 Certificate Signature
vpnracoon[10077] <Debug>: failed to add initial-contact payload: rekey 0, ini-contact 1, contacted 1.
vpnracoon[10077] <Debug>: add payload of len 50, next type 6
vpnracoon[10077] <Debug>: add payload of len 770, next type 9
vpnracoon[10077] <Debug>: add payload of len 256, next type 7
vpnracoon[10077] <Debug>: add payload of len 1, next type 0
vpnracoon[10077] <Debug>: Begin encryption.
vpnracoon[10077] <Debug>: encryption(aes)
vpnracoon[10077] <Debug>: pad length = 11
vpnracoon[10077] <Debug>: About to encrypt 1104 bytes
vpnracoon[10077] <Debug>: encryption(aes)
vpnracoon[10077] <Debug>: Encrypted.
vpnracoon[10077] <Debug>: Adding NON-ESP marker
vpnracoon[10077] <Debug>: 1136 bytes from 10.143.187.41[4500] to 1.2.3.4[4500]
vpnracoon[10077] <Debug>: sockname 10.143.187.41[4500]
vpnracoon[10077] <Debug>: send packet from 10.143.187.41[4500]
vpnracoon[10077] <Debug>: send packet to 1.2.3.4[4500]
vpnracoon[10077] <Debug>: @@@@@@ data being sent:
vpnracoon[10077] <Debug>: 1 times of 1136 bytes message will be sent to 1.2.3.4[4500]
vpnracoon[10077] <Debug>: Resend Phase 1 packet 25fdff6c38a3a9c8:8a5d06340be69dad
vpnracoon[10077] <Debug>: Adding NON-ESP marker
vpnracoon[10077] <Debug>: ****** state changed to: IKEv1 ident I msg5 sent
vpnracoon[10077] <Notice>: IKE Packet: transmit success. (Initiator, Main-Mode message 5).
vpnracoon[10077] <Debug>: @@@@@@ data from readmsg:
vpnracoon[10077] <Debug>: @@@@@@ data from readmsg:
vpnracoon[10077] <Debug>: 1164 bytes message received from 1.2.3.4[4500] to 10.143.187.41[4500]
vpnracoon[10077] <Debug>: start search for IKE-Session. target 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: Pre-existing IKE-Session to 1.2.3.4[4500]. case 1.
vpnracoon[10077] <Debug>: Begin decryption.
vpnracoon[10077] <Debug>: encryption(aes)
vpnracoon[10077] <Debug>: IV was saved for next processing:
vpnracoon[10077] <Debug>: encryption(aes)
vpnracoon[10077] <Debug>: decrypted payload by IV:
vpnracoon[10077] <Debug>: padding len=0
vpnracoon[10077] <Debug>: skip to trim padding.
vpnracoon[10077] <Debug>: decrypted.
vpnracoon[10077] <Debug>: begin.
vpnracoon[10077] <Debug>: seen nptype=5(id)
vpnracoon[10077] <Debug>: seen nptype=6(cert)
vpnracoon[10077] <Debug>: seen nptype=9(sig)
vpnracoon[10077] <Debug>: succeed.
vpnracoon[10077] <Debug>: CERT saved:
vpnracoon[10077] <Debug>: *** SIGN passed
vpnracoon[10077] <Error>: Error evaluating certificate.
vpnracoon[10077] <Debug>: eval result = kSecTrustResultRecoverableTrustFailure.
vpnracoon[10077] <Error>: ---------------Returned error strings: ---------------.
vpnracoon[10077] <Error>: -----------------------------------------------------.
vpnracoon[10077] <Error>: the peer's certificate is not verified.
vpnracoon[10077] <Notice>: IKEv1 Phase 1 AUTH: failed. (Initiator, Main-Mode Message 6).
vpnracoon[10077] <Debug>: sending vpn_control ike failed message - code=22  from=local.
vpnracoon[10077] <Debug>: *** New Phase 2
vpnracoon[10077] <Debug>: ****** state changed to: IKEv1 info
vpnracoon[10077] <Debug>: Compute IV for Phase 2
vpnracoon[10077] <Debug>: hash(sha2_256)
vpnracoon[10077] <Debug>: encryption(aes)
vpnracoon[10077] <Debug>: hmac(hmac_sha2_256)
vpnracoon[10077] <Debug>: Begin encryption.
vpnracoon[10077] <Debug>: encryption(aes)
vpnracoon[10077] <Debug>: pad length = 16
vpnracoon[10077] <Debug>: About to encrypt 64 bytes
vpnracoon[10077] <Debug>: encryption(aes)
vpnracoon[10077] <Debug>: Encrypted.
vpnracoon[10077] <Debug>: Adding NON-ESP marker
vpnracoon[10077] <Debug>: 96 bytes from 10.143.187.41[4500] to 1.2.3.4[4500]
vpnracoon[10077] <Debug>: sockname 10.143.187.41[4500]
vpnracoon[10077] <Debug>: send packet from 10.143.187.41[4500]
vpnracoon[10077] <Debug>: send packet to 1.2.3.4[4500]
vpnracoon[10077] <Debug>: @@@@@@ data being sent:
vpnracoon[10077] <Debug>: 1 times of 96 bytes message will be sent to 1.2.3.4[4500]
vpnracoon[10077] <Debug>: sendto Information notify.
vpnracoon[10077] <Notice>: IKE Packet: transmit success. (Information message).
vpnracoon[10077] <Debug>: IV freed
vpnracoon[10077] <Notice>: IKEv1 Information-Notice: transmit success. (ISAKMP-SA).
vpnracoon[10077] <Notice>: IKE Packet: receive failed. (Initiator, Main-Mode Message 6).
vpnracoon[10077] <Debug>: received disconnect command on vpn control socket.
vpnracoon[10077] <Notice>: IPSec disconnecting from server 1.2.3.4
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Debug>: in ike_session_purgephXbydstaddrwop... purging Phase 1 and related Phase 2 structures
vpnracoon[10077] <Info>: ISAKMP-SA expired 10.143.187.41[4500]-1.2.3.4[4500] spi:25fdff6c38a3a9c8:8a5d06340be69dad
vpnracoon[10077] <Debug>: ****** state changed to: Phase 1 expired
vpnracoon[10077] <Debug>: no ph1bind replacement found. NULL ph1.
vpnracoon[10077] <Error>: failed to send vpn_control message: Broken pipe
vpnracoon[10077] <Debug>: ==== Got usr1 signal - re-parsing configuration.
vpnracoon[10077] <Debug>: ==== flush negotiating sessions.
vpnracoon[10077] <Debug>: flushing ph2 handles: ignore_estab_or_assert 1...
vpnracoon[10077] <Debug>: Flushing Phase 1 handles: ignore_estab_or_assert 1...
vpnracoon[10077] <Debug>: already stopped ike_session_stopped_by_controller.
vpnracoon[10077] <Notice>: Disconnecting. (Connection tried to negotiate for, 0.325792 seconds).
vpnracoon[10077] <Notice>: IKE Packets Receive Failure-Rate Statistic. (Failure-Rate = 50.000).
vpnracoon[10077] <Notice>: IKE Phase 1 Authentication Failure-Rate Statistic. (Failure-Rate = 100.000).
vpnracoon[10077] <Debug>: Freeing IKE-Session to 1.2.3.4[4500].
vpnracoon[10077] <Debug>: IV freed
vpnracoon[10077] <Debug>: ===== parsing configuration
vpnracoon[10077] <Debug>: reading configuration file /etc/racoon/racoon.conf
vpnracoon[10077] <Debug>: lifetime = 60
vpnracoon[10077] <Debug>: lifebyte = 0
vpnracoon[10077] <Debug>: encklen=0
vpnracoon[10077] <Debug>: p:1 t:1
vpnracoon[10077] <Debug>: 3DES-CBC(5)
vpnracoon[10077] <Debug>: SHA(2)
vpnracoon[10077] <Debug>: 1024-bit MODP group(2)
vpnracoon[10077] <Debug>: pre-shared key(1)
vpnracoon[10077] <Debug>:
vpnracoon[10077] <Debug>: hmac(modp1024)
vpnracoon[10077] <Debug>: filename: /var/run/racoon/*.conf
vpnracoon[10077] <Debug>: reading configuration file /var/run/racoon/fda5:b218:a5c6:dd50:3d18:a795:18af:61bd.conf
vpnracoon[10077] <Debug>: lifetime = 900
vpnracoon[10077] <Debug>: lifebyte = 0
vpnracoon[10077] <Debug>: encklen=128
vpnracoon[10077] <Debug>: p:1 t:1
vpnracoon[10077] <Debug>: AES-CBC(7)
vpnracoon[10077] <Debug>: SHA256(4)
vpnracoon[10077] <Debug>: 1024-bit MODP group(2)
vpnracoon[10077] <Debug>: pre-shared key(1)
vpnracoon[10077] <Debug>:
vpnracoon[10077] <Debug>: lifetime = 900
vpnracoon[10077] <Debug>: lifebyte = 0
vpnracoon[10077] <Debug>: encklen=128
vpnracoon[10077] <Debug>: p:1 t:2
vpnracoon[10077] <Debug>: AES-CBC(7)
vpnracoon[10077] <Debug>: SHA(2)
vpnracoon[10077] <Debug>: 1024-bit MODP group(2)
vpnracoon[10077] <Debug>: pre-shared key(1)
vpnracoon[10077] <Debug>:
vpnracoon[10077] <Debug>: hmac(modp1024)
vpnracoon[10077] <Debug>: parse succeeded.
vpnracoon[10077] <Info>: caught signal 13
vpnracoon[10077] <Debug>: @@@@@@ data from readmsg:
vpnracoon[10077] <Debug>: @@@@@@ data from readmsg:
vpnracoon[10077] <Debug>: 92 bytes message received from 1.2.3.4[4500] to 10.143.187.41[4500]
vpnracoon[10077] <Debug>: start search for IKE-Session. target 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 1.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: start search for IKE-Session. target 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 1.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: still search for IKE-Session. this 1.2.3.4[4500].
vpnracoon[10077] <Debug>: still searching. skipping... session to 1.2.3.4[4500] is already stopped, active ph1 0 ph2 0.
vpnracoon[10077] <Debug>: New IKE-Session to 1.2.3.4[4500].
vpnracoon[10077] <Notice>: Connecting.
vpnracoon[10077] <Error>: mode config 6 from 1.2.3.4[4500], but we have no ISAKMP-SA.
vpnracoon[10077] <Debug>: vpn_control socket closed by peer.
vpnracoon[10077] <Debug>: received disconnect all command.
vpnracoon[10077] <Notice>: IPSec disconnecting from server 1.2.3.4

#8 Updated by Tobias Brunner over 9 years ago

vpnracoon[10077] <Error>: Error evaluating certificate.
vpnracoon[10077] <Debug>: eval result = kSecTrustResultRecoverableTrustFailure.
vpnracoon[10077] <Error>: ---------------Returned error strings: ---------------.
vpnracoon[10077] <Error>: -----------------------------------------------------.
vpnracoon[10077] <Error>: the peer's certificate is not verified.
vpnracoon[10077] <Notice>: IKEv1 Phase 1 AUTH: failed. (Initiator, Main-Mode Message 6).
vpnracoon[10077] <Debug>: sending vpn_control ike failed message - code=22  from=local.

Your client log says it all!