[Swan] no (wildcard) connection has been configured with policy PSK+AGGRESSIVE+IKEV1_ALLOW (fwd)

1one.w01f dev.1one.w01f at gmail.com
Tue Mar 15 07:55:51 EET 2022


Dear Paul,

Thank you very much for the suggestion. Unfortunately the client doesn't 
have options for choosing the algorithms. I then added

    ike=3des-md5;modp1536,3des-sha1;modp1536,aes-sha1;modp1536,aes-md5;modp1536

to my ipsec.conf, but I am getting pretty much the same result in the log:

    NSS DB directory: sql:/var/lib/ipsec/nss
    Initializing NSS
    Opening NSS database "sql:/var/lib/ipsec/nss" read-only
    NSS initialized
    NSS crypto library initialized
    FIPS HMAC integrity support [disabled]
    libcap-ng support [enabled]
    Linux audit support [enabled]
    Linux audit activated
    Starting Pluto (Libreswan Version 3.29 XFRM(netkey) esp-hw-offload
    FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC
    SYSTEMD_WATCHDOG LABELED_IPSEC LIBCAP_NG LINUX_AUDIT XAUTH_PAM
    NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS)) pid:7125
    core dump dir: /run/pluto
    secrets file: /etc/ipsec.secrets
    leak-detective enabled
    NSS crypto [enabled]
    XAUTH PAM support [enabled]
    | libevent is using pluto's memory allocator
    Initializing libevent in pthreads mode: headers: 2.1.11-stable
    (2010b00); library: 2.1.11-stable (2010b00)
    | libevent_malloc: new ptr-libevent at 0x55b964c91e18 size 40
    | libevent_malloc: new ptr-libevent at 0x55b964c918a8 size 40
    | libevent_malloc: new ptr-libevent at 0x55b964c91fc8 size 40
    | creating event base
    | libevent_malloc: new ptr-libevent at 0x55b964c93238 size 56
    | libevent_malloc: new ptr-libevent at 0x55b964cb53c8 size 664
    | libevent_malloc: new ptr-libevent at 0x55b964cb5698 size 24
    | libevent_malloc: new ptr-libevent at 0x55b964cb56e8 size 384
    | libevent_malloc: new ptr-libevent at 0x55b964cb4f78 size 16
    | libevent_malloc: new ptr-libevent at 0x55b964c94628 size 40
    | libevent_malloc: new ptr-libevent at 0x55b964c91f38 size 48
    | libevent_realloc: new ptr-libevent at 0x55b964c95f88 size 256
    | libevent_malloc: new ptr-libevent at 0x55b964cb5898 size 16
    | libevent_free: release ptr-libevent at 0x55b964c93238
    | libevent initialized
    | init_nat_traversal() initialized with keep_alive=0s
    NAT-Traversal support  [enabled]
    | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized
    | global one-shot timer EVENT_FREE_ROOT_CERTS initialized
    | libevent_realloc: new ptr-libevent at 0x55b964c92cf8 size 64
    | global periodic timer EVENT_REINIT_SECRET enabled with interval of
    3600 seconds
    | global one-shot timer EVENT_REVIVE_CONNS initialized
    | global periodic timer EVENT_PENDING_DDNS enabled with interval of
    60 seconds
    | global periodic timer EVENT_PENDING_PHASE2 enabled with interval
    of 120 seconds
    Encryption algorithms:
       AES_CCM_16              IKEv1:     ESP     IKEv2:     ESP FIPS 
    {256,192,*128}  aes_ccm, aes_ccm_c
       AES_CCM_12              IKEv1:     ESP     IKEv2:     ESP FIPS 
    {256,192,*128}  aes_ccm_b
       AES_CCM_8               IKEv1:     ESP     IKEv2:     ESP FIPS 
    {256,192,*128}  aes_ccm_a
       3DES_CBC                IKEv1: IKE ESP     IKEv2: IKE ESP FIPS 
    [*192]  3des
       CAMELLIA_CTR            IKEv1:     ESP     IKEv2: ESP          
    {256,192,*128}
       CAMELLIA_CBC            IKEv1: IKE ESP     IKEv2: IKE
    ESP           {256,192,*128}  camellia
       AES_GCM_16              IKEv1:     ESP     IKEv2: IKE ESP FIPS 
    {256,192,*128}  aes_gcm, aes_gcm_c
       AES_GCM_12              IKEv1:     ESP     IKEv2: IKE ESP FIPS 
    {256,192,*128}  aes_gcm_b
       AES_GCM_8               IKEv1:     ESP     IKEv2: IKE ESP FIPS 
    {256,192,*128}  aes_gcm_a
       AES_CTR                 IKEv1: IKE ESP     IKEv2: IKE ESP FIPS 
    {256,192,*128}  aesctr
       AES_CBC                 IKEv1: IKE ESP     IKEv2: IKE ESP FIPS 
    {256,192,*128}  aes
       SERPENT_CBC             IKEv1: IKE ESP     IKEv2: IKE
    ESP           {256,192,*128}  serpent
       TWOFISH_CBC             IKEv1: IKE ESP     IKEv2: IKE
    ESP           {256,192,*128}  twofish
       TWOFISH_SSH             IKEv1: IKE         IKEv2: IKE
    ESP           {256,192,*128}  twofish_cbc_ssh
       NULL_AUTH_AES_GMAC      IKEv1:     ESP     IKEv2:     ESP FIPS 
    {256,192,*128}  aes_gmac
       NULL                    IKEv1:     ESP     IKEv2: ESP           []
       CHACHA20_POLY1305       IKEv1:             IKEv2: IKE
    ESP           [*256]  chacha20poly1305
    Hash algorithms:
       MD5                     IKEv1: IKE IKEv2:
       SHA1                    IKEv1: IKE         IKEv2: FIPS  sha
       SHA2_256                IKEv1: IKE         IKEv2: FIPS  sha2, sha256
       SHA2_384                IKEv1: IKE         IKEv2: FIPS  sha384
       SHA2_512                IKEv1: IKE         IKEv2: FIPS  sha512
    PRF algorithms:
       HMAC_MD5                IKEv1: IKE         IKEv2:
    IKE               md5
       HMAC_SHA1               IKEv1: IKE         IKEv2: IKE FIPS  sha, sha1
       HMAC_SHA2_256           IKEv1: IKE         IKEv2: IKE FIPS  sha2,
    sha256, sha2_256
       HMAC_SHA2_384           IKEv1: IKE         IKEv2: IKE FIPS 
    sha384, sha2_384
       HMAC_SHA2_512           IKEv1: IKE         IKEv2: IKE FIPS 
    sha512, sha2_512
       AES_XCBC                IKEv1:             IKEv2:
    IKE               aes128_xcbc
    Integrity algorithms:
       HMAC_MD5_96             IKEv1: IKE ESP AH  IKEv2: IKE ESP
    AH        md5, hmac_md5
       HMAC_SHA1_96            IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
    FIPS  sha, sha1, sha1_96, hmac_sha1
       HMAC_SHA2_512_256       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
    FIPS  sha512, sha2_512, sha2_512_256, hmac_sha2_512
       HMAC_SHA2_384_192       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
    FIPS  sha384, sha2_384, sha2_384_192, hmac_sha2_384
       HMAC_SHA2_256_128       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
    FIPS  sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256
       HMAC_SHA2_256_TRUNCBUG  IKEv1:     ESP AH  IKEv2: AH
       AES_XCBC_96             IKEv1:     ESP AH  IKEv2: IKE ESP
    AH        aes_xcbc, aes128_xcbc, aes128_xcbc_96
       AES_CMAC_96             IKEv1:     ESP AH  IKEv2:     ESP AH
    FIPS  aes_cmac
       NONE                    IKEv1:     ESP     IKEv2: IKE ESP FIPS  null
    DH algorithms:
       NONE                    IKEv1:             IKEv2: IKE ESP AH
    FIPS  null, dh0
       MODP1024                IKEv1: IKE ESP AH  IKEv2: IKE ESP
    AH        dh2
       MODP1536                IKEv1: IKE ESP AH  IKEv2: IKE ESP
    AH        dh5
       MODP2048                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
    FIPS  dh14
       MODP3072                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
    FIPS  dh15
       MODP4096                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
    FIPS  dh16
       MODP6144                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
    FIPS  dh17
       MODP8192                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
    FIPS  dh18
       DH19                    IKEv1: IKE         IKEv2: IKE ESP AH
    FIPS  ecp_256, ecp256
       DH20                    IKEv1: IKE         IKEv2: IKE ESP AH
    FIPS  ecp_384, ecp384
       DH21                    IKEv1: IKE         IKEv2: IKE ESP AH
    FIPS  ecp_521, ecp521
       DH31                    IKEv1: IKE         IKEv2: IKE ESP
    AH        curve25519
    8 CPU cores online
    starting up 7 crypto helpers
    started thread for crypto helper 0
    started thread for crypto helper 1
    | starting up helper thread 0
    seccomp security for crypto helper not supported
    | starting up helper thread 1
    seccomp security for crypto helper not supported
    | status value returned by setting the priority of this thread
    (crypto helper 1) 22
    | crypto helper 1 waiting (nothing to do)
    | starting up helper thread 2
    seccomp security for crypto helper not supported
    | status value returned by setting the priority of this thread
    (crypto helper 2) 22
    started thread for crypto helper 2
    | status value returned by setting the priority of this thread
    (crypto helper 0) 22
    | starting up helper thread 3
    started thread for crypto helper 3
    started thread for crypto helper 4
    | crypto helper 2 waiting (nothing to do)
    started thread for crypto helper 5
    | crypto helper 0 waiting (nothing to do)
    seccomp security for crypto helper not supported
    started thread for crypto helper 6
    | status value returned by setting the priority of this thread
    (crypto helper 3) 22
    | starting up helper thread 4
    | checking IKEv1 state table
    |   MAIN_R0: category: half-open IKE SA flags: 0:
    |     -> MAIN_R1 EVENT_SO_DISCARD
    | starting up helper thread 6
    seccomp security for crypto helper not supported
    | status value returned by setting the priority of this thread
    (crypto helper 6) 22
    | crypto helper 3 waiting (nothing to do)
    seccomp security for crypto helper not supported
    |   MAIN_I1: category: half-open IKE SA flags: 0:
    | status value returned by setting the priority of this thread
    (crypto helper 4) 22
    |     -> MAIN_I2 EVENT_RETRANSMIT
    | starting up helper thread 5
    | crypto helper 4 waiting (nothing to do)
    |   MAIN_R1: category: open IKE SA flags: 200:
    |     -> MAIN_R2 EVENT_RETRANSMIT
    |     -> UNDEFINED EVENT_RETRANSMIT
    seccomp security for crypto helper not supported
    |     -> UNDEFINED EVENT_RETRANSMIT
    | status value returned by setting the priority of this thread
    (crypto helper 5) 22
    |   MAIN_I2: category: open IKE SA flags: 0:
    |     -> MAIN_I3 EVENT_RETRANSMIT
    |     -> UNDEFINED EVENT_RETRANSMIT
    |     -> UNDEFINED EVENT_RETRANSMIT
    |   MAIN_R2: category: open IKE SA flags: 0:
    |     -> MAIN_R3 EVENT_SA_REPLACE
    |     -> MAIN_R3 EVENT_SA_REPLACE
    |     -> UNDEFINED EVENT_SA_REPLACE
    | crypto helper 5 waiting (nothing to do)
    |   MAIN_I3: category: open IKE SA flags: 0:
    |     -> MAIN_I4 EVENT_SA_REPLACE
    |     -> MAIN_I4 EVENT_SA_REPLACE
    |     -> UNDEFINED EVENT_SA_REPLACE
    |   MAIN_R3: category: established IKE SA flags: 200:
    |     -> UNDEFINED EVENT_NULL
    |   MAIN_I4: category: established IKE SA flags: 0:
    |     -> UNDEFINED EVENT_NULL
    |   AGGR_R0: category: half-open IKE SA flags: 0:
    |     -> AGGR_R1 EVENT_SO_DISCARD
    |   AGGR_I1: category: half-open IKE SA flags: 0:
    |     -> AGGR_I2 EVENT_SA_REPLACE
    |     -> AGGR_I2 EVENT_SA_REPLACE
    |   AGGR_R1: category: open IKE SA flags: 200:
    |     -> AGGR_R2 EVENT_SA_REPLACE
    |     -> AGGR_R2 EVENT_SA_REPLACE
    |   AGGR_I2: category: established IKE SA flags: 200:
    |     -> UNDEFINED EVENT_NULL
    |   AGGR_R2: category: established IKE SA flags: 0:
    |     -> UNDEFINED EVENT_NULL
    |   QUICK_R0: category: established CHILD SA flags: 0:
    |     -> QUICK_R1 EVENT_RETRANSMIT
    |   QUICK_I1: category: established CHILD SA flags: 0:
    |     -> QUICK_I2 EVENT_SA_REPLACE
    | crypto helper 6 waiting (nothing to do)
    |   QUICK_R1: category: established CHILD SA flags: 0:
    |     -> QUICK_R2 EVENT_SA_REPLACE
    |   QUICK_I2: category: established CHILD SA flags: 200:
    |     -> UNDEFINED EVENT_NULL
    |   QUICK_R2: category: established CHILD SA flags: 0:
    |     -> UNDEFINED EVENT_NULL
    |   INFO: category: informational flags: 0:
    |     -> UNDEFINED EVENT_NULL
    |   INFO_PROTECTED: category: informational flags: 0:
    |     -> UNDEFINED EVENT_NULL
    |   XAUTH_R0: category: established IKE SA flags: 0:
    |     -> XAUTH_R1 EVENT_NULL
    |   XAUTH_R1: category: established IKE SA flags: 0:
    |     -> MAIN_R3 EVENT_SA_REPLACE
    |   MODE_CFG_R0: category: informational flags: 0:
    |     -> MODE_CFG_R1 EVENT_SA_REPLACE
    |   MODE_CFG_R1: category: established IKE SA flags: 0:
    |     -> MODE_CFG_R2 EVENT_SA_REPLACE
    |   MODE_CFG_R2: category: established IKE SA flags: 0:
    |     -> UNDEFINED EVENT_NULL
    |   MODE_CFG_I1: category: established IKE SA flags: 0:
    |     -> MAIN_I4 EVENT_SA_REPLACE
    |   XAUTH_I0: category: established IKE SA flags: 0:
    |     -> XAUTH_I1 EVENT_RETRANSMIT
    |   XAUTH_I1: category: established IKE SA flags: 0:
    |     -> MAIN_I4 EVENT_RETRANSMIT
    | checking IKEv2 state table
    |   PARENT_I0: category: ignore flags: 0:
    |     -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT)
    |   PARENT_I1: category: half-open IKE SA flags: 0:
    |     -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process
    SA_INIT reply notification)
    |     -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process
    IKE_SA_INIT reply, initiate IKE_AUTH)
    |   PARENT_I2: category: open IKE SA flags: 0:
    |     -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX
    AUTH notification)
    |     -> PARENT_I2 EVENT_NULL (Initiator: process
    AUTHENTICATION_FAILED AUTH notification)
    |     -> PARENT_I2 EVENT_NULL (Initiator: process
    UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification)
    |     -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH
    response)
    |     -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response
    containing unknown notification)
    |   PARENT_I3: category: established IKE SA flags: 0:
    |     -> PARENT_I3 EVENT_RETAIN (I3: Informational Request)
    |     -> PARENT_I3 EVENT_RETAIN (I3: Informational Response)
    |     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request)
    |     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response)
    |   PARENT_R1: category: half-open IKE SA flags: 0:
    |     -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process
    IKE_AUTH request (no SKEYSEED))
    |     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder:
    process IKE_AUTH request)
    |   PARENT_R2: category: established IKE SA flags: 0:
    |     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request)
    |     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response)
    |     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request)
    |     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response)
    |   V2_CREATE_I0: category: established IKE SA flags: 0:
    |     -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate
    CREATE_CHILD_SA IPsec SA)
    |   V2_CREATE_I: category: established IKE SA flags: 0:
    |     -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec
    SA Response)
    |   V2_REKEY_IKE_I0: category: established IKE SA flags: 0:
    |     -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate
    CREATE_CHILD_SA IKE Rekey)
    |   V2_REKEY_IKE_I: category: established IKE SA flags: 0:
    |     -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE
    Rekey Response)
    |   V2_REKEY_CHILD_I0: category: established IKE SA flags: 0:
    |     -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate
    CREATE_CHILD_SA IPsec Rekey SA)
    |   V2_REKEY_CHILD_I: category: established IKE SA flags: 0: <none>
    |   V2_CREATE_R: category: established IKE SA flags: 0:
    |     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to
    CREATE_CHILD_SA IPsec SA Request)
    |   V2_REKEY_IKE_R: category: established IKE SA flags: 0:
    |     -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to
    CREATE_CHILD_SA IKE Rekey)
    |   V2_REKEY_CHILD_R: category: established IKE SA flags: 0: <none>
    |   V2_IPSEC_I: category: established CHILD SA flags: 0: <none>
    |   V2_IPSEC_R: category: established CHILD SA flags: 0: <none>
    |   IKESA_DEL: category: established IKE SA flags: 0:
    |     -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL)
    |   CHILDSA_DEL: category: informational flags: 0: <none>
    |   PARENT_R0: category: half-open IKE SA flags: 0:
    |     -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to
    IKE_SA_INIT)
    Using Linux XFRM/NETKEY IPsec interface code on 5.13.0-35-generic
    | Hard-wiring algorithms
    | adding AES_CCM_16 to kernel algorithm db
    | adding AES_CCM_12 to kernel algorithm db
    | adding AES_CCM_8 to kernel algorithm db
    | adding 3DES_CBC to kernel algorithm db
    | adding CAMELLIA_CBC to kernel algorithm db
    | adding AES_GCM_16 to kernel algorithm db
    | adding AES_GCM_12 to kernel algorithm db
    | adding AES_GCM_8 to kernel algorithm db
    | adding AES_CTR to kernel algorithm db
    | adding AES_CBC to kernel algorithm db
    | adding SERPENT_CBC to kernel algorithm db
    | adding TWOFISH_CBC to kernel algorithm db
    | adding NULL_AUTH_AES_GMAC to kernel algorithm db
    | adding NULL to kernel algorithm db
    | adding CHACHA20_POLY1305 to kernel algorithm db
    | adding HMAC_MD5_96 to kernel algorithm db
    | adding HMAC_SHA1_96 to kernel algorithm db
    | adding HMAC_SHA2_512_256 to kernel algorithm db
    | adding HMAC_SHA2_384_192 to kernel algorithm db
    | adding HMAC_SHA2_256_128 to kernel algorithm db
    | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db
    | adding AES_XCBC_96 to kernel algorithm db
    | adding AES_CMAC_96 to kernel algorithm db
    | adding NONE to kernel algorithm db
    | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20
    seconds
    | setup kernel fd callback
    | pluto_event_add: new KERNEL_XRM_FD-pe at 0x55b964c931c8
    | libevent_malloc: new ptr-libevent at 0x55b964c9e388 size 128
    | libevent_malloc: new ptr-libevent at 0x55b964cbaa98 size 16
    | pluto_event_add: new KERNEL_ROUTE_FD-pe at 0x55b964c92078
    | libevent_malloc: new ptr-libevent at 0x55b964c9e688 size 128
    | libevent_malloc: new ptr-libevent at 0x55b964cbaa58 size 16
    | global one-shot timer EVENT_CHECK_CRLS initialized
    selinux support is NOT enabled.
    systemd watchdog for ipsec service configured with timeout of
    200000000 usecs
    watchdog: sending probes every 100 secs
    | pluto_sd: executing action action: start(2), status 0
    | global periodic timer EVENT_SD_WATCHDOG enabled with interval of
    100 seconds
    | unbound context created - setting debug level to 5
    | /etc/hosts lookups activated
    | /etc/resolv.conf usage activated
    | outgoing-port-avoid set 0-65535
    | outgoing-port-permit set 32768-60999
    | Loading dnssec root key from:/usr/share/dns/root.key
    | No additional dnssec trust anchors defined via dnssec-trusted= option
    | Setting up events, loop start
    | pluto_event_add: new PLUTO_CTL_FD-pe at 0x55b964c92168
    | libevent_malloc: new ptr-libevent at 0x55b964cc5aa8 size 128
    | libevent_malloc: new ptr-libevent at 0x55b964cc79c8 size 16
    | libevent_realloc: new ptr-libevent at 0x55b964cc9118 size 256
    | libevent_malloc: new ptr-libevent at 0x55b964cc9248 size 8
    | libevent_realloc: new ptr-libevent at 0x55b964c94488 size 144
    | libevent_malloc: new ptr-libevent at 0x55b964c32ed8 size 152
    | libevent_malloc: new ptr-libevent at 0x55b964cc9288 size 16
    | signal event handler PLUTO_SIGCHLD installed
    | libevent_malloc: new ptr-libevent at 0x55b964cc92c8 size 8
    | libevent_malloc: new ptr-libevent at 0x55b964c32d08 size 152
    | signal event handler PLUTO_SIGTERM installed
    | libevent_malloc: new ptr-libevent at 0x55b964cc9308 size 8
    | libevent_malloc: new ptr-libevent at 0x55b964c30738 size 152
    | signal event handler PLUTO_SIGHUP installed
    | created addconn helper (pid:7133) using fork+execve
    | forked child 7133
    seccomp security not supported
    | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen)
    -> fd at 14 (in whack_handle() at rcv_whack.c:717)
    | Added new connection xauth-psk with policy
    PSK+ENCRYPT+TUNNEL+DONT_REKEY+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
    | ike (phase1) algorithm values: 3DES_CBC-HMAC_MD5-MODP1536,
    3DES_CBC-HMAC_SHA1-MODP1536, AES_CBC-HMAC_SHA1-MODP1536,
    AES_CBC-HMAC_MD5-MODP1536
    | counting wild cards for <server.address.redacted> is 0
    | counting wild cards for (none) is 15
    | add new addresspool to global pools 10.231.247.10-10.231.247.254
    size 245 ptr 0x55b964cc9f98
    | based upon policy, the connection is a template.
    | reference addresspool of conn xauth-psk[0] kind CK_TEMPLATE refcnt 0
    added connection description "xauth-psk"
    | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s;
    rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy:
    PSK+ENCRYPT+TUNNEL+DONT_REKEY+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
    |
    0.0.0.0/0===<server.address.redacted><<server.address.redacted>>[MS+XS+S=C]...%any[+MC+XC+S=C]
    | close_any(fd at 14) (in whack_process() at rcv_whack.c:698)
    | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen)
    -> fd at 14 (in whack_handle() at rcv_whack.c:717)
    | pluto_sd: executing action action: reloading(4), status 0
    listening for IKE messages
    | Inspecting interface lo
    | found lo with address 127.0.0.1
    | Inspecting interface enp0s31f6
    | found enp0s31f6 with address 192.168.0.56
    | Inspecting interface ap0
    | found ap0 with address 192.168.12.1
    | Inspecting interface vipnet
    | found vipnet with address <server.address.redacted>
    Kernel supports NIC esp-hw-offload
    adding interface vipnet/vipnet (esp-hw-offload=no)
    <server.address.redacted>:500
    | NAT-Traversal: Trying sockopt style NAT-T
    | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T
    family IPv4
    adding interface vipnet/vipnet <server.address.redacted>:4500
    Kernel supports NIC esp-hw-offload
    adding interface ap0/ap0 (esp-hw-offload=no) 192.168.12.1:500
    | NAT-Traversal: Trying sockopt style NAT-T
    | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T
    family IPv4
    adding interface ap0/ap0 192.168.12.1:4500
    Kernel supports NIC esp-hw-offload
    adding interface enp0s31f6/enp0s31f6 (esp-hw-offload=no)
    192.168.0.56:500
    | NAT-Traversal: Trying sockopt style NAT-T
    | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T
    family IPv4
    adding interface enp0s31f6/enp0s31f6 192.168.0.56:4500
    Kernel supports NIC esp-hw-offload
    adding interface lo/lo (esp-hw-offload=no) 127.0.0.1:500
    | NAT-Traversal: Trying sockopt style NAT-T
    | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T
    family IPv4
    adding interface lo/lo 127.0.0.1:4500
    | found lo with address 0000:0000:0000:0000:0000:0000:0000:0001
    | sorting 1 interfaces
    Kernel supports NIC esp-hw-offload
    adding interface lo/lo (esp-hw-offload=no) ::1:500
    | connect_to_host_pair: <server.address.redacted>:500 0.0.0.0:500 ->
    hp:none
    | pluto_event_add: new ethX-pe at 0x55b964c9dbc8
    | libevent_malloc: new ptr-libevent at 0x55b964cc21e8 size 128
    | libevent_malloc: new ptr-libevent at 0x55b964cca798 size 16
    | setup callback for interface lo:500 fd 23
    | pluto_event_add: new ethX-pe at 0x55b964cca7d8
    | libevent_malloc: new ptr-libevent at 0x55b964c9e788 size 128
    | libevent_malloc: new ptr-libevent at 0x55b964cca848 size 16
    | setup callback for interface lo:4500 fd 22
    | pluto_event_add: new ethX-pe at 0x55b964cca888
    | libevent_malloc: new ptr-libevent at 0x55b964c9e988 size 128
    | libevent_malloc: new ptr-libevent at 0x55b964cca8f8 size 16
    | setup callback for interface lo:500 fd 21
    | pluto_event_add: new ethX-pe at 0x55b964cca938
    | libevent_malloc: new ptr-libevent at 0x55b964c9e888 size 128
    | libevent_malloc: new ptr-libevent at 0x55b964cca9a8 size 16
    | setup callback for interface enp0s31f6:4500 fd 20
    | pluto_event_add: new ethX-pe at 0x55b964cca9e8
    | libevent_malloc: new ptr-libevent at 0x55b964c9e588 size 128
    | libevent_malloc: new ptr-libevent at 0x55b964ccaa58 size 16
    | setup callback for interface enp0s31f6:500 fd 19
    | pluto_event_add: new ethX-pe at 0x55b964ccaa98
    | libevent_malloc: new ptr-libevent at 0x55b964c9e488 size 128
    | libevent_malloc: new ptr-libevent at 0x55b964ccab08 size 16
    | setup callback for interface ap0:4500 fd 18
    | pluto_event_add: new ethX-pe at 0x55b964ccab48
    | libevent_malloc: new ptr-libevent at 0x55b964ccabb8 size 128
    | libevent_malloc: new ptr-libevent at 0x55b964ccac68 size 16
    | setup callback for interface ap0:500 fd 17
    | pluto_event_add: new ethX-pe at 0x55b964ccaca8
    | libevent_malloc: new ptr-libevent at 0x55b964ccad18 size 128
    | libevent_malloc: new ptr-libevent at 0x55b964ccadc8 size 16
    | setup callback for interface vipnet:4500 fd 16
    | pluto_event_add: new ethX-pe at 0x55b964ccae08
    | libevent_malloc: new ptr-libevent at 0x55b964ccae78 size 128
    | libevent_malloc: new ptr-libevent at 0x55b964ccaf28 size 16
    | setup callback for interface vipnet:500 fd 15
    | certs and keys locked by 'free_preshared_secrets'
    | certs and keys unlocked by 'free_preshared_secrets'
    loading secrets from "/etc/ipsec.secrets"
    | Processing PSK at line 2: passed
    | certs and keys locked by 'process_secret'
    | certs and keys unlocked by 'process_secret'
    | pluto_sd: executing action action: ready(5), status 0
    | close_any(fd at 14) (in whack_process() at rcv_whack.c:698)
    | signal PLUTO_SIGCHLD event
    | waitpid returned pid 7133 (exited with status 0)
    | reaped addconn helper child (status 0)
    | waitpid returned ECHILD (no child processes left)
    |  kernel_process_msg_cb process netlink message
    | netlink_get: XFRM_MSG_NEWSA message
    | *received 572 bytes from 192.168.12.87:1500 on vipnet (port=500)
    |   0c 75 da 3b  07 7a f1 49  00 00 00 00  00 00 00 00
    |   01 10 04 00  00 00 00 00  00 00 02 3c  04 00 00 9c
    |   00 00 00 01  00 00 00 01  00 00 00 90  01 01 00 04
    |   03 00 00 24  01 01 00 00  80 0b 00 01  80 0c 70 80
    |   80 01 00 07  80 0e 00 80  80 03 00 01  80 02 00 02
    |   80 04 00 05  03 00 00 24  02 01 00 00  80 0b 00 01
    |   80 0c 70 80  80 01 00 07  80 0e 00 80  80 03 00 01
    |   80 02 00 01  80 04 00 05  03 00 00 20  03 01 00 00
    |   80 0b 00 01  80 0c 70 80  80 01 00 05  80 03 00 01
    |   80 02 00 02  80 04 00 05  00 00 00 20  04 01 00 00
    |   80 0b 00 01  80 0c 70 80  80 01 00 05  80 03 00 01
    |   80 02 00 01  80 04 00 05  0a 00 00 c4  e3 e1 3f a5
    |   89 56 dc 7e  40 cd 82 d5  13 ab 66 74  d5 72 35 18
    |   d0 b1 3d e3  4b 4d e5 c9  8f 64 78 04  58 84 3a 91
    |   bf 18 98 37  84 f0 ee 1e  a8 08 42 33  b1 a9 38 e6
    |   ed 5d ae 27  04 3f e3 9d  77 95 5a 92  46 dc c9 47
    |   33 cb d7 b4  c4 37 da b3  98 b9 9e da  eb 78 87 4e
    |   f5 8d 2f f4  fe 1a e0 f6  8d 4f 79 84  30 17 17 62
    |   e3 52 34 30  a9 67 a9 4b  4c a1 f9 fb  74 0c e1 3b
    |   e9 58 19 a4  bd 28 ae 36  be e7 14 0f  58 f5 09 8c
    |   50 19 89 e5  59 5c 6e 99  e1 8b d0 a4  5c 0f b2 75
    |   92 6d 81 b6  b5 4d f6 78  db 6d c7 4b  d0 c3 84 3a
    |   7c 2e c2 be  7b 6b f5 d2  2a 33 09 dc  f8 1c 15 7d
    |   16 e6 94 c7  da 3d 5e 2b  95 d1 11 c0  05 00 00 14
    |   a5 64 e4 ab  96 3d 82 ba  f1 c0 a5 24  4c e1 6c 73
    |   0d 00 00 0c  01 11 05 dc  c0 a8 0c 57  0d 00 00 14
    |   4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
    |   0d 00 00 14  cd 60 46 43  35 df 21 f8  7c fd b2 fc
    |   68 b6 a4 48  0d 00 00 14  90 cb 80 91  3e bb 69 6e
    |   08 63 81 b5  ec 42 7b 1f  0d 00 00 14  44 85 15 2d
    |   18 b6 bb cd  0b e8 a8 46  95 79 dd cc  0d 00 00 14
    |   12 f5 f2 8c  45 71 68 a9  70 2d 9f e2  74 cc 01 00
    |   0d 00 00 14  af ca d7 13  68 a1 f1 c9  6b 86 96 fc
    |   77 57 01 00  0d 00 00 14  4c 53 42 7b  6d 46 5d 1b
    |   33 7b b7 55  a3 7a 7f ef  00 00 00 14  b4 f0 1c a9
    |   51 e9 da 8d  0b af bb d3  4a d3 04 4e
    | processing: start from 192.168.12.87:1500 (in process_md() at
    demux.c:441)
    | **parse ISAKMP Message:
    |    initiator cookie:
    |   0c 75 da 3b  07 7a f1 49
    |    responder cookie:
    |   00 00 00 00  00 00 00 00
    |    next payload type: ISAKMP_NEXT_SA (0x1)
    |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
    |    exchange type: ISAKMP_XCHG_AGGR (0x4)
    |    flags: none (0x0)
    |    Message ID: 0 (0x0)
    |    length: 572 (0x23c)
    |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_AGGR (4)
    | State DB: IKEv1 state object not found (find_state_ikev1_init)
    | #null state always idle
    | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x432 opt: 0x102000
    | ***parse ISAKMP Security Association Payload:
    |    next payload type: ISAKMP_NEXT_KE (0x4)
    |    length: 156 (0x9c)
    |    DOI: ISAKMP_DOI_IPSEC (0x1)
    | got payload 0x10  (ISAKMP_NEXT_KE) needed: 0x430 opt: 0x102000
    | ***parse ISAKMP Key Exchange Payload:
    |    next payload type: ISAKMP_NEXT_NONCE (0xa)
    |    length: 196 (0xc4)
    | got payload 0x400  (ISAKMP_NEXT_NONCE) needed: 0x420 opt: 0x102000
    | ***parse ISAKMP Nonce Payload:
    |    next payload type: ISAKMP_NEXT_ID (0x5)
    |    length: 20 (0x14)
    | got payload 0x20  (ISAKMP_NEXT_ID) needed: 0x20 opt: 0x102000
    | ***parse ISAKMP Identification Payload:
    |    next payload type: ISAKMP_NEXT_VID (0xd)
    |    length: 12 (0xc)
    |    ID type: ID_IPV4_ADDR (0x1)
    |    DOI specific A: 17 (0x11)
    |    DOI specific B: 1500 (0x5dc)
    |      obj:   c0 a8 0c 57
    | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
    | ***parse ISAKMP Vendor ID Payload:
    |    next payload type: ISAKMP_NEXT_VID (0xd)
    |    length: 20 (0x14)
    | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
    | ***parse ISAKMP Vendor ID Payload:
    |    next payload type: ISAKMP_NEXT_VID (0xd)
    |    length: 20 (0x14)
    | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
    | ***parse ISAKMP Vendor ID Payload:
    |    next payload type: ISAKMP_NEXT_VID (0xd)
    |    length: 20 (0x14)
    | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
    | ***parse ISAKMP Vendor ID Payload:
    |    next payload type: ISAKMP_NEXT_VID (0xd)
    |    length: 20 (0x14)
    | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
    | ***parse ISAKMP Vendor ID Payload:
    |    next payload type: ISAKMP_NEXT_VID (0xd)
    |    length: 20 (0x14)
    | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
    | ***parse ISAKMP Vendor ID Payload:
    |    next payload type: ISAKMP_NEXT_VID (0xd)
    |    length: 20 (0x14)
    | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
    | ***parse ISAKMP Vendor ID Payload:
    |    next payload type: ISAKMP_NEXT_VID (0xd)
    |    length: 20 (0x14)
    | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
    | ***parse ISAKMP Vendor ID Payload:
    |    next payload type: ISAKMP_NEXT_NONE (0x0)
    |    length: 20 (0x14)
    |  quirks.qnat_traversal_vid set to=117 [RFC 3947]
    | received Vendor ID payload [RFC 3947]
    | Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
    | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
    | Ignoring older NAT-T Vendor ID payload
    [draft-ietf-ipsec-nat-t-ike-02_n]
    | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
    | received Vendor ID payload [Cisco-Unity]
    | received Vendor ID payload [Dead Peer Detection]
    packet from 192.168.12.87:1500: ignoring unknown Vendor ID payload
    [4c53427b6d465d1b337bb755a37a7fef]
    packet from 192.168.12.87:1500: ignoring unknown Vendor ID payload
    [b4f01ca951e9da8d0bafbbd34ad3044e]
    | ****parse IPsec DOI SIT:
    |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
    | ****parse ISAKMP Proposal Payload:
    |    next payload type: ISAKMP_NEXT_NONE (0x0)
    |    length: 144 (0x90)
    |    proposal number: 1 (0x1)
    |    protocol ID: PROTO_ISAKMP (0x1)
    |    SPI size: 0 (0x0)
    |    number of transforms: 4 (0x4)
    | *****parse ISAKMP Transform Payload (ISAKMP):
    |    next payload type: ISAKMP_NEXT_T (0x3)
    |    length: 36 (0x24)
    |    ISAKMP transform number: 1 (0x1)
    |    ISAKMP transform ID: KEY_IKE (0x1)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
    |    length/value: 1 (0x1)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
    |    length/value: 28800 (0x7080)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
    |    length/value: 7 (0x7)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
    |    length/value: 128 (0x80)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
    |    length/value: 1 (0x1)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
    |    length/value: 2 (0x2)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
    |    length/value: 5 (0x5)
    | *****parse ISAKMP Transform Payload (ISAKMP):
    |    next payload type: ISAKMP_NEXT_T (0x3)
    |    length: 36 (0x24)
    |    ISAKMP transform number: 2 (0x2)
    |    ISAKMP transform ID: KEY_IKE (0x1)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
    |    length/value: 1 (0x1)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
    |    length/value: 28800 (0x7080)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
    |    length/value: 7 (0x7)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
    |    length/value: 128 (0x80)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
    |    length/value: 1 (0x1)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
    |    length/value: 1 (0x1)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
    |    length/value: 5 (0x5)
    | *****parse ISAKMP Transform Payload (ISAKMP):
    |    next payload type: ISAKMP_NEXT_T (0x3)
    |    length: 32 (0x20)
    |    ISAKMP transform number: 3 (0x3)
    |    ISAKMP transform ID: KEY_IKE (0x1)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
    |    length/value: 1 (0x1)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
    |    length/value: 28800 (0x7080)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
    |    length/value: 5 (0x5)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
    |    length/value: 1 (0x1)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
    |    length/value: 2 (0x2)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
    |    length/value: 5 (0x5)
    | *****parse ISAKMP Transform Payload (ISAKMP):
    |    next payload type: ISAKMP_NEXT_NONE (0x0)
    |    length: 32 (0x20)
    |    ISAKMP transform number: 4 (0x4)
    |    ISAKMP transform ID: KEY_IKE (0x1)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
    |    length/value: 1 (0x1)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
    |    length/value: 28800 (0x7080)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
    |    length/value: 5 (0x5)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
    |    length/value: 1 (0x1)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
    |    length/value: 1 (0x1)
    | ******parse ISAKMP Oakley attribute:
    |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
    |    length/value: 5 (0x5)
    | find_host_connection me=<server.address.redacted>:500
    him=192.168.12.87:1500 policy=PSK+AGGRESSIVE+IKEV1_ALLOW
    | find_host_pair: comparing <server.address.redacted>:500 to 0.0.0.0:500
    | find_next_host_connection policy=PSK+AGGRESSIVE+IKEV1_ALLOW
    | find_next_host_connection returns empty
    | find_host_connection me=<server.address.redacted>:500
    him=%any:1500 policy=PSK+AGGRESSIVE+IKEV1_ALLOW
    | find_host_pair: comparing <server.address.redacted>:500 to 0.0.0.0:500
    | find_next_host_connection policy=PSK+AGGRESSIVE+IKEV1_ALLOW
    | found policy =
    PSK+ENCRYPT+TUNNEL+DONT_REKEY+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
    (xauth-psk)
    | find_next_host_connection returns empty
    packet from 192.168.12.87:1500: initial Aggressive Mode message from
    192.168.12.87 but no (wildcard) connection has been configured with
    policy PSK+AGGRESSIVE+IKEV1_ALLOW
    | complete v1 state transition with STF_IGNORE
    | processing: stop from 192.168.12.87:1500 (in process_md() at
    demux.c:443)
    | processing: STOP state #0 (in process_md() at demux.c:445)
    | processing: STOP connection NULL (in process_md() at demux.c:446)


Thanks.

Cheers,
Wolf

On 15/03/2022 01:48, Paul Wouters wrote:
>
>
> ---------- Forwarded message ----------
> Date: Mon, 14 Mar 2022 13:47:01
> From: Paul Wouters <paul.wouters at aiven.io>
> Cc: swan at lists.libreswan.org
> To: 1one.w01f <dev.1one.w01f at gmail.com>
> Subject: Re: [Swan] no (wildcard) connection has been configured with 
> policy
>     PSK+AGGRESSIVE+IKEV1_ALLOW
>
>
>
> On Sun, 13 Mar 2022, 1one.w01f wrote:
>
>> Date: Sun, 13 Mar 2022 09:28:57
>> From: 1one.w01f <dev.1one.w01f at gmail.com>
>> To: swan at lists.libreswan.org
>> Subject: Re: [Swan] no (wildcard) connection has been configured with 
>> policy
>>     PSK+AGGRESSIVE+IKEV1_ALLOW
>
> Based on your logs, I think the ike= hash algorithm is the problem:
>
> Mar 13 16:19:32.346942: | ******parse ISAKMP Oakley attribute:
>       Mar 13 16:19:32.346954: |    af+type: 
> AF+OAKLEY_AUTHENTICATION_METHOD
>       (0x8003)
>       Mar 13 16:19:32.346965: |    length/value: 1 (0x1)
>
>
> That is MD5. Can you tell the other end to use SHA1 or SHA256 instead ?
>
> If not, you can try and add:
>
>     ike=3des-md5;modp1536
>
> Paul
>
> _______________________________________________
> Swan mailing list
> Swan at lists.libreswan.org
> https://lists.libreswan.org/mailman/listinfo/swan
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.libreswan.org/pipermail/swan/attachments/20220315/b838f68b/attachment-0001.htm>


More information about the Swan mailing list