[Swan] no (wildcard) connection has been configured with policy PSK+AGGRESSIVE+IKEV1_ALLOW (fwd)
1one.w01f
dev.1one.w01f at gmail.com
Tue Mar 15 07:55:51 EET 2022
Dear Paul,
Thank you very much for the suggestion. Unfortunately the client doesn't
have options for choosing the algorithms. I then added
ike=3des-md5;modp1536,3des-sha1;modp1536,aes-sha1;modp1536,aes-md5;modp1536
to my ipsec.conf, but I am getting pretty much the same result in the log:
NSS DB directory: sql:/var/lib/ipsec/nss
Initializing NSS
Opening NSS database "sql:/var/lib/ipsec/nss" read-only
NSS initialized
NSS crypto library initialized
FIPS HMAC integrity support [disabled]
libcap-ng support [enabled]
Linux audit support [enabled]
Linux audit activated
Starting Pluto (Libreswan Version 3.29 XFRM(netkey) esp-hw-offload
FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC
SYSTEMD_WATCHDOG LABELED_IPSEC LIBCAP_NG LINUX_AUDIT XAUTH_PAM
NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS)) pid:7125
core dump dir: /run/pluto
secrets file: /etc/ipsec.secrets
leak-detective enabled
NSS crypto [enabled]
XAUTH PAM support [enabled]
| libevent is using pluto's memory allocator
Initializing libevent in pthreads mode: headers: 2.1.11-stable
(2010b00); library: 2.1.11-stable (2010b00)
| libevent_malloc: new ptr-libevent at 0x55b964c91e18 size 40
| libevent_malloc: new ptr-libevent at 0x55b964c918a8 size 40
| libevent_malloc: new ptr-libevent at 0x55b964c91fc8 size 40
| creating event base
| libevent_malloc: new ptr-libevent at 0x55b964c93238 size 56
| libevent_malloc: new ptr-libevent at 0x55b964cb53c8 size 664
| libevent_malloc: new ptr-libevent at 0x55b964cb5698 size 24
| libevent_malloc: new ptr-libevent at 0x55b964cb56e8 size 384
| libevent_malloc: new ptr-libevent at 0x55b964cb4f78 size 16
| libevent_malloc: new ptr-libevent at 0x55b964c94628 size 40
| libevent_malloc: new ptr-libevent at 0x55b964c91f38 size 48
| libevent_realloc: new ptr-libevent at 0x55b964c95f88 size 256
| libevent_malloc: new ptr-libevent at 0x55b964cb5898 size 16
| libevent_free: release ptr-libevent at 0x55b964c93238
| libevent initialized
| init_nat_traversal() initialized with keep_alive=0s
NAT-Traversal support [enabled]
| global one-shot timer EVENT_NAT_T_KEEPALIVE initialized
| global one-shot timer EVENT_FREE_ROOT_CERTS initialized
| libevent_realloc: new ptr-libevent at 0x55b964c92cf8 size 64
| global periodic timer EVENT_REINIT_SECRET enabled with interval of
3600 seconds
| global one-shot timer EVENT_REVIVE_CONNS initialized
| global periodic timer EVENT_PENDING_DDNS enabled with interval of
60 seconds
| global periodic timer EVENT_PENDING_PHASE2 enabled with interval
of 120 seconds
Encryption algorithms:
AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS
{256,192,*128} aes_ccm, aes_ccm_c
AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS
{256,192,*128} aes_ccm_b
AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS
{256,192,*128} aes_ccm_a
3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS
[*192] 3des
CAMELLIA_CTR IKEv1: ESP IKEv2: ESP
{256,192,*128}
CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE
ESP {256,192,*128} camellia
AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS
{256,192,*128} aes_gcm, aes_gcm_c
AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS
{256,192,*128} aes_gcm_b
AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS
{256,192,*128} aes_gcm_a
AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS
{256,192,*128} aesctr
AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS
{256,192,*128} aes
SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE
ESP {256,192,*128} serpent
TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE
ESP {256,192,*128} twofish
TWOFISH_SSH IKEv1: IKE IKEv2: IKE
ESP {256,192,*128} twofish_cbc_ssh
NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS
{256,192,*128} aes_gmac
NULL IKEv1: ESP IKEv2: ESP []
CHACHA20_POLY1305 IKEv1: IKEv2: IKE
ESP [*256] chacha20poly1305
Hash algorithms:
MD5 IKEv1: IKE IKEv2:
SHA1 IKEv1: IKE IKEv2: FIPS sha
SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256
SHA2_384 IKEv1: IKE IKEv2: FIPS sha384
SHA2_512 IKEv1: IKE IKEv2: FIPS sha512
PRF algorithms:
HMAC_MD5 IKEv1: IKE IKEv2:
IKE md5
HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1
HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2,
sha256, sha2_256
HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS
sha384, sha2_384
HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS
sha512, sha2_512
AES_XCBC IKEv1: IKEv2:
IKE aes128_xcbc
Integrity algorithms:
HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH md5, hmac_md5
HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH
FIPS sha, sha1, sha1_96, hmac_sha1
HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH
FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512
HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH
FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384
HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH
FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256
HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH
AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP
AH aes_xcbc, aes128_xcbc, aes128_xcbc_96
AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH
FIPS aes_cmac
NONE IKEv1: ESP IKEv2: IKE ESP FIPS null
DH algorithms:
NONE IKEv1: IKEv2: IKE ESP AH
FIPS null, dh0
MODP1024 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH dh2
MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP
AH dh5
MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH
FIPS dh14
MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH
FIPS dh15
MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH
FIPS dh16
MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH
FIPS dh17
MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH
FIPS dh18
DH19 IKEv1: IKE IKEv2: IKE ESP AH
FIPS ecp_256, ecp256
DH20 IKEv1: IKE IKEv2: IKE ESP AH
FIPS ecp_384, ecp384
DH21 IKEv1: IKE IKEv2: IKE ESP AH
FIPS ecp_521, ecp521
DH31 IKEv1: IKE IKEv2: IKE ESP
AH curve25519
8 CPU cores online
starting up 7 crypto helpers
started thread for crypto helper 0
started thread for crypto helper 1
| starting up helper thread 0
seccomp security for crypto helper not supported
| starting up helper thread 1
seccomp security for crypto helper not supported
| status value returned by setting the priority of this thread
(crypto helper 1) 22
| crypto helper 1 waiting (nothing to do)
| starting up helper thread 2
seccomp security for crypto helper not supported
| status value returned by setting the priority of this thread
(crypto helper 2) 22
started thread for crypto helper 2
| status value returned by setting the priority of this thread
(crypto helper 0) 22
| starting up helper thread 3
started thread for crypto helper 3
started thread for crypto helper 4
| crypto helper 2 waiting (nothing to do)
started thread for crypto helper 5
| crypto helper 0 waiting (nothing to do)
seccomp security for crypto helper not supported
started thread for crypto helper 6
| status value returned by setting the priority of this thread
(crypto helper 3) 22
| starting up helper thread 4
| checking IKEv1 state table
| MAIN_R0: category: half-open IKE SA flags: 0:
| -> MAIN_R1 EVENT_SO_DISCARD
| starting up helper thread 6
seccomp security for crypto helper not supported
| status value returned by setting the priority of this thread
(crypto helper 6) 22
| crypto helper 3 waiting (nothing to do)
seccomp security for crypto helper not supported
| MAIN_I1: category: half-open IKE SA flags: 0:
| status value returned by setting the priority of this thread
(crypto helper 4) 22
| -> MAIN_I2 EVENT_RETRANSMIT
| starting up helper thread 5
| crypto helper 4 waiting (nothing to do)
| MAIN_R1: category: open IKE SA flags: 200:
| -> MAIN_R2 EVENT_RETRANSMIT
| -> UNDEFINED EVENT_RETRANSMIT
seccomp security for crypto helper not supported
| -> UNDEFINED EVENT_RETRANSMIT
| status value returned by setting the priority of this thread
(crypto helper 5) 22
| MAIN_I2: category: open IKE SA flags: 0:
| -> MAIN_I3 EVENT_RETRANSMIT
| -> UNDEFINED EVENT_RETRANSMIT
| -> UNDEFINED EVENT_RETRANSMIT
| MAIN_R2: category: open IKE SA flags: 0:
| -> MAIN_R3 EVENT_SA_REPLACE
| -> MAIN_R3 EVENT_SA_REPLACE
| -> UNDEFINED EVENT_SA_REPLACE
| crypto helper 5 waiting (nothing to do)
| MAIN_I3: category: open IKE SA flags: 0:
| -> MAIN_I4 EVENT_SA_REPLACE
| -> MAIN_I4 EVENT_SA_REPLACE
| -> UNDEFINED EVENT_SA_REPLACE
| MAIN_R3: category: established IKE SA flags: 200:
| -> UNDEFINED EVENT_NULL
| MAIN_I4: category: established IKE SA flags: 0:
| -> UNDEFINED EVENT_NULL
| AGGR_R0: category: half-open IKE SA flags: 0:
| -> AGGR_R1 EVENT_SO_DISCARD
| AGGR_I1: category: half-open IKE SA flags: 0:
| -> AGGR_I2 EVENT_SA_REPLACE
| -> AGGR_I2 EVENT_SA_REPLACE
| AGGR_R1: category: open IKE SA flags: 200:
| -> AGGR_R2 EVENT_SA_REPLACE
| -> AGGR_R2 EVENT_SA_REPLACE
| AGGR_I2: category: established IKE SA flags: 200:
| -> UNDEFINED EVENT_NULL
| AGGR_R2: category: established IKE SA flags: 0:
| -> UNDEFINED EVENT_NULL
| QUICK_R0: category: established CHILD SA flags: 0:
| -> QUICK_R1 EVENT_RETRANSMIT
| QUICK_I1: category: established CHILD SA flags: 0:
| -> QUICK_I2 EVENT_SA_REPLACE
| crypto helper 6 waiting (nothing to do)
| QUICK_R1: category: established CHILD SA flags: 0:
| -> QUICK_R2 EVENT_SA_REPLACE
| QUICK_I2: category: established CHILD SA flags: 200:
| -> UNDEFINED EVENT_NULL
| QUICK_R2: category: established CHILD SA flags: 0:
| -> UNDEFINED EVENT_NULL
| INFO: category: informational flags: 0:
| -> UNDEFINED EVENT_NULL
| INFO_PROTECTED: category: informational flags: 0:
| -> UNDEFINED EVENT_NULL
| XAUTH_R0: category: established IKE SA flags: 0:
| -> XAUTH_R1 EVENT_NULL
| XAUTH_R1: category: established IKE SA flags: 0:
| -> MAIN_R3 EVENT_SA_REPLACE
| MODE_CFG_R0: category: informational flags: 0:
| -> MODE_CFG_R1 EVENT_SA_REPLACE
| MODE_CFG_R1: category: established IKE SA flags: 0:
| -> MODE_CFG_R2 EVENT_SA_REPLACE
| MODE_CFG_R2: category: established IKE SA flags: 0:
| -> UNDEFINED EVENT_NULL
| MODE_CFG_I1: category: established IKE SA flags: 0:
| -> MAIN_I4 EVENT_SA_REPLACE
| XAUTH_I0: category: established IKE SA flags: 0:
| -> XAUTH_I1 EVENT_RETRANSMIT
| XAUTH_I1: category: established IKE SA flags: 0:
| -> MAIN_I4 EVENT_RETRANSMIT
| checking IKEv2 state table
| PARENT_I0: category: ignore flags: 0:
| -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT)
| PARENT_I1: category: half-open IKE SA flags: 0:
| -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process
SA_INIT reply notification)
| -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process
IKE_SA_INIT reply, initiate IKE_AUTH)
| PARENT_I2: category: open IKE SA flags: 0:
| -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX
AUTH notification)
| -> PARENT_I2 EVENT_NULL (Initiator: process
AUTHENTICATION_FAILED AUTH notification)
| -> PARENT_I2 EVENT_NULL (Initiator: process
UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification)
| -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH
response)
| -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response
containing unknown notification)
| PARENT_I3: category: established IKE SA flags: 0:
| -> PARENT_I3 EVENT_RETAIN (I3: Informational Request)
| -> PARENT_I3 EVENT_RETAIN (I3: Informational Response)
| -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request)
| -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response)
| PARENT_R1: category: half-open IKE SA flags: 0:
| -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process
IKE_AUTH request (no SKEYSEED))
| -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder:
process IKE_AUTH request)
| PARENT_R2: category: established IKE SA flags: 0:
| -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request)
| -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response)
| -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request)
| -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response)
| V2_CREATE_I0: category: established IKE SA flags: 0:
| -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate
CREATE_CHILD_SA IPsec SA)
| V2_CREATE_I: category: established IKE SA flags: 0:
| -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec
SA Response)
| V2_REKEY_IKE_I0: category: established IKE SA flags: 0:
| -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate
CREATE_CHILD_SA IKE Rekey)
| V2_REKEY_IKE_I: category: established IKE SA flags: 0:
| -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE
Rekey Response)
| V2_REKEY_CHILD_I0: category: established IKE SA flags: 0:
| -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate
CREATE_CHILD_SA IPsec Rekey SA)
| V2_REKEY_CHILD_I: category: established IKE SA flags: 0: <none>
| V2_CREATE_R: category: established IKE SA flags: 0:
| -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to
CREATE_CHILD_SA IPsec SA Request)
| V2_REKEY_IKE_R: category: established IKE SA flags: 0:
| -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to
CREATE_CHILD_SA IKE Rekey)
| V2_REKEY_CHILD_R: category: established IKE SA flags: 0: <none>
| V2_IPSEC_I: category: established CHILD SA flags: 0: <none>
| V2_IPSEC_R: category: established CHILD SA flags: 0: <none>
| IKESA_DEL: category: established IKE SA flags: 0:
| -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL)
| CHILDSA_DEL: category: informational flags: 0: <none>
| PARENT_R0: category: half-open IKE SA flags: 0:
| -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to
IKE_SA_INIT)
Using Linux XFRM/NETKEY IPsec interface code on 5.13.0-35-generic
| Hard-wiring algorithms
| adding AES_CCM_16 to kernel algorithm db
| adding AES_CCM_12 to kernel algorithm db
| adding AES_CCM_8 to kernel algorithm db
| adding 3DES_CBC to kernel algorithm db
| adding CAMELLIA_CBC to kernel algorithm db
| adding AES_GCM_16 to kernel algorithm db
| adding AES_GCM_12 to kernel algorithm db
| adding AES_GCM_8 to kernel algorithm db
| adding AES_CTR to kernel algorithm db
| adding AES_CBC to kernel algorithm db
| adding SERPENT_CBC to kernel algorithm db
| adding TWOFISH_CBC to kernel algorithm db
| adding NULL_AUTH_AES_GMAC to kernel algorithm db
| adding NULL to kernel algorithm db
| adding CHACHA20_POLY1305 to kernel algorithm db
| adding HMAC_MD5_96 to kernel algorithm db
| adding HMAC_SHA1_96 to kernel algorithm db
| adding HMAC_SHA2_512_256 to kernel algorithm db
| adding HMAC_SHA2_384_192 to kernel algorithm db
| adding HMAC_SHA2_256_128 to kernel algorithm db
| adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db
| adding AES_XCBC_96 to kernel algorithm db
| adding AES_CMAC_96 to kernel algorithm db
| adding NONE to kernel algorithm db
| global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20
seconds
| setup kernel fd callback
| pluto_event_add: new KERNEL_XRM_FD-pe at 0x55b964c931c8
| libevent_malloc: new ptr-libevent at 0x55b964c9e388 size 128
| libevent_malloc: new ptr-libevent at 0x55b964cbaa98 size 16
| pluto_event_add: new KERNEL_ROUTE_FD-pe at 0x55b964c92078
| libevent_malloc: new ptr-libevent at 0x55b964c9e688 size 128
| libevent_malloc: new ptr-libevent at 0x55b964cbaa58 size 16
| global one-shot timer EVENT_CHECK_CRLS initialized
selinux support is NOT enabled.
systemd watchdog for ipsec service configured with timeout of
200000000 usecs
watchdog: sending probes every 100 secs
| pluto_sd: executing action action: start(2), status 0
| global periodic timer EVENT_SD_WATCHDOG enabled with interval of
100 seconds
| unbound context created - setting debug level to 5
| /etc/hosts lookups activated
| /etc/resolv.conf usage activated
| outgoing-port-avoid set 0-65535
| outgoing-port-permit set 32768-60999
| Loading dnssec root key from:/usr/share/dns/root.key
| No additional dnssec trust anchors defined via dnssec-trusted= option
| Setting up events, loop start
| pluto_event_add: new PLUTO_CTL_FD-pe at 0x55b964c92168
| libevent_malloc: new ptr-libevent at 0x55b964cc5aa8 size 128
| libevent_malloc: new ptr-libevent at 0x55b964cc79c8 size 16
| libevent_realloc: new ptr-libevent at 0x55b964cc9118 size 256
| libevent_malloc: new ptr-libevent at 0x55b964cc9248 size 8
| libevent_realloc: new ptr-libevent at 0x55b964c94488 size 144
| libevent_malloc: new ptr-libevent at 0x55b964c32ed8 size 152
| libevent_malloc: new ptr-libevent at 0x55b964cc9288 size 16
| signal event handler PLUTO_SIGCHLD installed
| libevent_malloc: new ptr-libevent at 0x55b964cc92c8 size 8
| libevent_malloc: new ptr-libevent at 0x55b964c32d08 size 152
| signal event handler PLUTO_SIGTERM installed
| libevent_malloc: new ptr-libevent at 0x55b964cc9308 size 8
| libevent_malloc: new ptr-libevent at 0x55b964c30738 size 152
| signal event handler PLUTO_SIGHUP installed
| created addconn helper (pid:7133) using fork+execve
| forked child 7133
seccomp security not supported
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen)
-> fd at 14 (in whack_handle() at rcv_whack.c:717)
| Added new connection xauth-psk with policy
PSK+ENCRYPT+TUNNEL+DONT_REKEY+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
| ike (phase1) algorithm values: 3DES_CBC-HMAC_MD5-MODP1536,
3DES_CBC-HMAC_SHA1-MODP1536, AES_CBC-HMAC_SHA1-MODP1536,
AES_CBC-HMAC_MD5-MODP1536
| counting wild cards for <server.address.redacted> is 0
| counting wild cards for (none) is 15
| add new addresspool to global pools 10.231.247.10-10.231.247.254
size 245 ptr 0x55b964cc9f98
| based upon policy, the connection is a template.
| reference addresspool of conn xauth-psk[0] kind CK_TEMPLATE refcnt 0
added connection description "xauth-psk"
| ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s;
rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy:
PSK+ENCRYPT+TUNNEL+DONT_REKEY+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
|
0.0.0.0/0===<server.address.redacted><<server.address.redacted>>[MS+XS+S=C]...%any[+MC+XC+S=C]
| close_any(fd at 14) (in whack_process() at rcv_whack.c:698)
| accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen)
-> fd at 14 (in whack_handle() at rcv_whack.c:717)
| pluto_sd: executing action action: reloading(4), status 0
listening for IKE messages
| Inspecting interface lo
| found lo with address 127.0.0.1
| Inspecting interface enp0s31f6
| found enp0s31f6 with address 192.168.0.56
| Inspecting interface ap0
| found ap0 with address 192.168.12.1
| Inspecting interface vipnet
| found vipnet with address <server.address.redacted>
Kernel supports NIC esp-hw-offload
adding interface vipnet/vipnet (esp-hw-offload=no)
<server.address.redacted>:500
| NAT-Traversal: Trying sockopt style NAT-T
| NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T
family IPv4
adding interface vipnet/vipnet <server.address.redacted>:4500
Kernel supports NIC esp-hw-offload
adding interface ap0/ap0 (esp-hw-offload=no) 192.168.12.1:500
| NAT-Traversal: Trying sockopt style NAT-T
| NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T
family IPv4
adding interface ap0/ap0 192.168.12.1:4500
Kernel supports NIC esp-hw-offload
adding interface enp0s31f6/enp0s31f6 (esp-hw-offload=no)
192.168.0.56:500
| NAT-Traversal: Trying sockopt style NAT-T
| NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T
family IPv4
adding interface enp0s31f6/enp0s31f6 192.168.0.56:4500
Kernel supports NIC esp-hw-offload
adding interface lo/lo (esp-hw-offload=no) 127.0.0.1:500
| NAT-Traversal: Trying sockopt style NAT-T
| NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T
family IPv4
adding interface lo/lo 127.0.0.1:4500
| found lo with address 0000:0000:0000:0000:0000:0000:0000:0001
| sorting 1 interfaces
Kernel supports NIC esp-hw-offload
adding interface lo/lo (esp-hw-offload=no) ::1:500
| connect_to_host_pair: <server.address.redacted>:500 0.0.0.0:500 ->
hp:none
| pluto_event_add: new ethX-pe at 0x55b964c9dbc8
| libevent_malloc: new ptr-libevent at 0x55b964cc21e8 size 128
| libevent_malloc: new ptr-libevent at 0x55b964cca798 size 16
| setup callback for interface lo:500 fd 23
| pluto_event_add: new ethX-pe at 0x55b964cca7d8
| libevent_malloc: new ptr-libevent at 0x55b964c9e788 size 128
| libevent_malloc: new ptr-libevent at 0x55b964cca848 size 16
| setup callback for interface lo:4500 fd 22
| pluto_event_add: new ethX-pe at 0x55b964cca888
| libevent_malloc: new ptr-libevent at 0x55b964c9e988 size 128
| libevent_malloc: new ptr-libevent at 0x55b964cca8f8 size 16
| setup callback for interface lo:500 fd 21
| pluto_event_add: new ethX-pe at 0x55b964cca938
| libevent_malloc: new ptr-libevent at 0x55b964c9e888 size 128
| libevent_malloc: new ptr-libevent at 0x55b964cca9a8 size 16
| setup callback for interface enp0s31f6:4500 fd 20
| pluto_event_add: new ethX-pe at 0x55b964cca9e8
| libevent_malloc: new ptr-libevent at 0x55b964c9e588 size 128
| libevent_malloc: new ptr-libevent at 0x55b964ccaa58 size 16
| setup callback for interface enp0s31f6:500 fd 19
| pluto_event_add: new ethX-pe at 0x55b964ccaa98
| libevent_malloc: new ptr-libevent at 0x55b964c9e488 size 128
| libevent_malloc: new ptr-libevent at 0x55b964ccab08 size 16
| setup callback for interface ap0:4500 fd 18
| pluto_event_add: new ethX-pe at 0x55b964ccab48
| libevent_malloc: new ptr-libevent at 0x55b964ccabb8 size 128
| libevent_malloc: new ptr-libevent at 0x55b964ccac68 size 16
| setup callback for interface ap0:500 fd 17
| pluto_event_add: new ethX-pe at 0x55b964ccaca8
| libevent_malloc: new ptr-libevent at 0x55b964ccad18 size 128
| libevent_malloc: new ptr-libevent at 0x55b964ccadc8 size 16
| setup callback for interface vipnet:4500 fd 16
| pluto_event_add: new ethX-pe at 0x55b964ccae08
| libevent_malloc: new ptr-libevent at 0x55b964ccae78 size 128
| libevent_malloc: new ptr-libevent at 0x55b964ccaf28 size 16
| setup callback for interface vipnet:500 fd 15
| certs and keys locked by 'free_preshared_secrets'
| certs and keys unlocked by 'free_preshared_secrets'
loading secrets from "/etc/ipsec.secrets"
| Processing PSK at line 2: passed
| certs and keys locked by 'process_secret'
| certs and keys unlocked by 'process_secret'
| pluto_sd: executing action action: ready(5), status 0
| close_any(fd at 14) (in whack_process() at rcv_whack.c:698)
| signal PLUTO_SIGCHLD event
| waitpid returned pid 7133 (exited with status 0)
| reaped addconn helper child (status 0)
| waitpid returned ECHILD (no child processes left)
| kernel_process_msg_cb process netlink message
| netlink_get: XFRM_MSG_NEWSA message
| *received 572 bytes from 192.168.12.87:1500 on vipnet (port=500)
| 0c 75 da 3b 07 7a f1 49 00 00 00 00 00 00 00 00
| 01 10 04 00 00 00 00 00 00 00 02 3c 04 00 00 9c
| 00 00 00 01 00 00 00 01 00 00 00 90 01 01 00 04
| 03 00 00 24 01 01 00 00 80 0b 00 01 80 0c 70 80
| 80 01 00 07 80 0e 00 80 80 03 00 01 80 02 00 02
| 80 04 00 05 03 00 00 24 02 01 00 00 80 0b 00 01
| 80 0c 70 80 80 01 00 07 80 0e 00 80 80 03 00 01
| 80 02 00 01 80 04 00 05 03 00 00 20 03 01 00 00
| 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01
| 80 02 00 02 80 04 00 05 00 00 00 20 04 01 00 00
| 80 0b 00 01 80 0c 70 80 80 01 00 05 80 03 00 01
| 80 02 00 01 80 04 00 05 0a 00 00 c4 e3 e1 3f a5
| 89 56 dc 7e 40 cd 82 d5 13 ab 66 74 d5 72 35 18
| d0 b1 3d e3 4b 4d e5 c9 8f 64 78 04 58 84 3a 91
| bf 18 98 37 84 f0 ee 1e a8 08 42 33 b1 a9 38 e6
| ed 5d ae 27 04 3f e3 9d 77 95 5a 92 46 dc c9 47
| 33 cb d7 b4 c4 37 da b3 98 b9 9e da eb 78 87 4e
| f5 8d 2f f4 fe 1a e0 f6 8d 4f 79 84 30 17 17 62
| e3 52 34 30 a9 67 a9 4b 4c a1 f9 fb 74 0c e1 3b
| e9 58 19 a4 bd 28 ae 36 be e7 14 0f 58 f5 09 8c
| 50 19 89 e5 59 5c 6e 99 e1 8b d0 a4 5c 0f b2 75
| 92 6d 81 b6 b5 4d f6 78 db 6d c7 4b d0 c3 84 3a
| 7c 2e c2 be 7b 6b f5 d2 2a 33 09 dc f8 1c 15 7d
| 16 e6 94 c7 da 3d 5e 2b 95 d1 11 c0 05 00 00 14
| a5 64 e4 ab 96 3d 82 ba f1 c0 a5 24 4c e1 6c 73
| 0d 00 00 0c 01 11 05 dc c0 a8 0c 57 0d 00 00 14
| 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f
| 0d 00 00 14 cd 60 46 43 35 df 21 f8 7c fd b2 fc
| 68 b6 a4 48 0d 00 00 14 90 cb 80 91 3e bb 69 6e
| 08 63 81 b5 ec 42 7b 1f 0d 00 00 14 44 85 15 2d
| 18 b6 bb cd 0b e8 a8 46 95 79 dd cc 0d 00 00 14
| 12 f5 f2 8c 45 71 68 a9 70 2d 9f e2 74 cc 01 00
| 0d 00 00 14 af ca d7 13 68 a1 f1 c9 6b 86 96 fc
| 77 57 01 00 0d 00 00 14 4c 53 42 7b 6d 46 5d 1b
| 33 7b b7 55 a3 7a 7f ef 00 00 00 14 b4 f0 1c a9
| 51 e9 da 8d 0b af bb d3 4a d3 04 4e
| processing: start from 192.168.12.87:1500 (in process_md() at
demux.c:441)
| **parse ISAKMP Message:
| initiator cookie:
| 0c 75 da 3b 07 7a f1 49
| responder cookie:
| 00 00 00 00 00 00 00 00
| next payload type: ISAKMP_NEXT_SA (0x1)
| ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
| exchange type: ISAKMP_XCHG_AGGR (0x4)
| flags: none (0x0)
| Message ID: 0 (0x0)
| length: 572 (0x23c)
| processing version=1.0 packet with exchange type=ISAKMP_XCHG_AGGR (4)
| State DB: IKEv1 state object not found (find_state_ikev1_init)
| #null state always idle
| got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x432 opt: 0x102000
| ***parse ISAKMP Security Association Payload:
| next payload type: ISAKMP_NEXT_KE (0x4)
| length: 156 (0x9c)
| DOI: ISAKMP_DOI_IPSEC (0x1)
| got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x430 opt: 0x102000
| ***parse ISAKMP Key Exchange Payload:
| next payload type: ISAKMP_NEXT_NONCE (0xa)
| length: 196 (0xc4)
| got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x420 opt: 0x102000
| ***parse ISAKMP Nonce Payload:
| next payload type: ISAKMP_NEXT_ID (0x5)
| length: 20 (0x14)
| got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x20 opt: 0x102000
| ***parse ISAKMP Identification Payload:
| next payload type: ISAKMP_NEXT_VID (0xd)
| length: 12 (0xc)
| ID type: ID_IPV4_ADDR (0x1)
| DOI specific A: 17 (0x11)
| DOI specific B: 1500 (0x5dc)
| obj: c0 a8 0c 57
| got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
| ***parse ISAKMP Vendor ID Payload:
| next payload type: ISAKMP_NEXT_VID (0xd)
| length: 20 (0x14)
| got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
| ***parse ISAKMP Vendor ID Payload:
| next payload type: ISAKMP_NEXT_VID (0xd)
| length: 20 (0x14)
| got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
| ***parse ISAKMP Vendor ID Payload:
| next payload type: ISAKMP_NEXT_VID (0xd)
| length: 20 (0x14)
| got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
| ***parse ISAKMP Vendor ID Payload:
| next payload type: ISAKMP_NEXT_VID (0xd)
| length: 20 (0x14)
| got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
| ***parse ISAKMP Vendor ID Payload:
| next payload type: ISAKMP_NEXT_VID (0xd)
| length: 20 (0x14)
| got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
| ***parse ISAKMP Vendor ID Payload:
| next payload type: ISAKMP_NEXT_VID (0xd)
| length: 20 (0x14)
| got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
| ***parse ISAKMP Vendor ID Payload:
| next payload type: ISAKMP_NEXT_VID (0xd)
| length: 20 (0x14)
| got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
| ***parse ISAKMP Vendor ID Payload:
| next payload type: ISAKMP_NEXT_NONE (0x0)
| length: 20 (0x14)
| quirks.qnat_traversal_vid set to=117 [RFC 3947]
| received Vendor ID payload [RFC 3947]
| Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
| ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
| Ignoring older NAT-T Vendor ID payload
[draft-ietf-ipsec-nat-t-ike-02_n]
| ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
| ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
| received Vendor ID payload [Cisco-Unity]
| received Vendor ID payload [Dead Peer Detection]
packet from 192.168.12.87:1500: ignoring unknown Vendor ID payload
[4c53427b6d465d1b337bb755a37a7fef]
packet from 192.168.12.87:1500: ignoring unknown Vendor ID payload
[b4f01ca951e9da8d0bafbbd34ad3044e]
| ****parse IPsec DOI SIT:
| IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
| ****parse ISAKMP Proposal Payload:
| next payload type: ISAKMP_NEXT_NONE (0x0)
| length: 144 (0x90)
| proposal number: 1 (0x1)
| protocol ID: PROTO_ISAKMP (0x1)
| SPI size: 0 (0x0)
| number of transforms: 4 (0x4)
| *****parse ISAKMP Transform Payload (ISAKMP):
| next payload type: ISAKMP_NEXT_T (0x3)
| length: 36 (0x24)
| ISAKMP transform number: 1 (0x1)
| ISAKMP transform ID: KEY_IKE (0x1)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
| length/value: 1 (0x1)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
| length/value: 28800 (0x7080)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
| length/value: 7 (0x7)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
| length/value: 128 (0x80)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
| length/value: 1 (0x1)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
| length/value: 2 (0x2)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
| length/value: 5 (0x5)
| *****parse ISAKMP Transform Payload (ISAKMP):
| next payload type: ISAKMP_NEXT_T (0x3)
| length: 36 (0x24)
| ISAKMP transform number: 2 (0x2)
| ISAKMP transform ID: KEY_IKE (0x1)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
| length/value: 1 (0x1)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
| length/value: 28800 (0x7080)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
| length/value: 7 (0x7)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
| length/value: 128 (0x80)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
| length/value: 1 (0x1)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
| length/value: 1 (0x1)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
| length/value: 5 (0x5)
| *****parse ISAKMP Transform Payload (ISAKMP):
| next payload type: ISAKMP_NEXT_T (0x3)
| length: 32 (0x20)
| ISAKMP transform number: 3 (0x3)
| ISAKMP transform ID: KEY_IKE (0x1)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
| length/value: 1 (0x1)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
| length/value: 28800 (0x7080)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
| length/value: 5 (0x5)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
| length/value: 1 (0x1)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
| length/value: 2 (0x2)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
| length/value: 5 (0x5)
| *****parse ISAKMP Transform Payload (ISAKMP):
| next payload type: ISAKMP_NEXT_NONE (0x0)
| length: 32 (0x20)
| ISAKMP transform number: 4 (0x4)
| ISAKMP transform ID: KEY_IKE (0x1)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
| length/value: 1 (0x1)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
| length/value: 28800 (0x7080)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
| length/value: 5 (0x5)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
| length/value: 1 (0x1)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
| length/value: 1 (0x1)
| ******parse ISAKMP Oakley attribute:
| af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
| length/value: 5 (0x5)
| find_host_connection me=<server.address.redacted>:500
him=192.168.12.87:1500 policy=PSK+AGGRESSIVE+IKEV1_ALLOW
| find_host_pair: comparing <server.address.redacted>:500 to 0.0.0.0:500
| find_next_host_connection policy=PSK+AGGRESSIVE+IKEV1_ALLOW
| find_next_host_connection returns empty
| find_host_connection me=<server.address.redacted>:500
him=%any:1500 policy=PSK+AGGRESSIVE+IKEV1_ALLOW
| find_host_pair: comparing <server.address.redacted>:500 to 0.0.0.0:500
| find_next_host_connection policy=PSK+AGGRESSIVE+IKEV1_ALLOW
| found policy =
PSK+ENCRYPT+TUNNEL+DONT_REKEY+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
(xauth-psk)
| find_next_host_connection returns empty
packet from 192.168.12.87:1500: initial Aggressive Mode message from
192.168.12.87 but no (wildcard) connection has been configured with
policy PSK+AGGRESSIVE+IKEV1_ALLOW
| complete v1 state transition with STF_IGNORE
| processing: stop from 192.168.12.87:1500 (in process_md() at
demux.c:443)
| processing: STOP state #0 (in process_md() at demux.c:445)
| processing: STOP connection NULL (in process_md() at demux.c:446)
Thanks.
Cheers,
Wolf
On 15/03/2022 01:48, Paul Wouters wrote:
>
>
> ---------- Forwarded message ----------
> Date: Mon, 14 Mar 2022 13:47:01
> From: Paul Wouters <paul.wouters at aiven.io>
> Cc: swan at lists.libreswan.org
> To: 1one.w01f <dev.1one.w01f at gmail.com>
> Subject: Re: [Swan] no (wildcard) connection has been configured with
> policy
> PSK+AGGRESSIVE+IKEV1_ALLOW
>
>
>
> On Sun, 13 Mar 2022, 1one.w01f wrote:
>
>> Date: Sun, 13 Mar 2022 09:28:57
>> From: 1one.w01f <dev.1one.w01f at gmail.com>
>> To: swan at lists.libreswan.org
>> Subject: Re: [Swan] no (wildcard) connection has been configured with
>> policy
>> PSK+AGGRESSIVE+IKEV1_ALLOW
>
> Based on your logs, I think the ike= hash algorithm is the problem:
>
> Mar 13 16:19:32.346942: | ******parse ISAKMP Oakley attribute:
> Mar 13 16:19:32.346954: | af+type:
> AF+OAKLEY_AUTHENTICATION_METHOD
> (0x8003)
> Mar 13 16:19:32.346965: | length/value: 1 (0x1)
>
>
> That is MD5. Can you tell the other end to use SHA1 or SHA256 instead ?
>
> If not, you can try and add:
>
> ike=3des-md5;modp1536
>
> Paul
>
> _______________________________________________
> Swan mailing list
> Swan at lists.libreswan.org
> https://lists.libreswan.org/mailman/listinfo/swan
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.libreswan.org/pipermail/swan/attachments/20220315/b838f68b/attachment-0001.htm>
More information about the Swan
mailing list