[vpn-help] Access Manager - Disconnected during Phase-2 (Windows 7 64 bit)

Nathan Ng geenjai at gmail.com
Mon Jan 25 01:26:37 CST 2010


Hey Matt,

I downloaded the latest beta, and tried running with the
0.0.0.0/0.0.0.0addresses. I'm attaching the output. I also tried
running with the firewall
disabled.. to no avail.

-Nathan

On Thu, Jan 14, 2010 at 1:34 AM, Matthew Grooms <mgrooms at shrew.net> wrote:

> On 1/13/2010 11:55 PM, Nathan Ng wrote:
>
>> Hi,
>>
>> I'm having the same trouble that Clayton had, and it seems that some
>> others here are having, especially with our traces ending in the same
>> spot. I've played with the all of the different PFS Exchange groups in
>> the Phase 2 config, and nothing seems to be working. I'm attaching the
>> output from the trace, with the PFS Exchange on group 2.
>>
>> Any help would be greatly appreciated.
>>
>>
> Have you tried the latest 2.1.6 beta? Have a look at this post ...
>
> http://lists.shrew.net/mailman/htdig/vpn-help/2009-December/002572.html
>
> -Matthew
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.shrew.net/pipermail/vpn-help/attachments/20100125/ce503913/attachment-0002.html>
-------------- next part --------------
10/01/25 01:21:35 ## : IKE Daemon, ver 2.1.6
10/01/25 01:21:35 ## : Copyright 2009 Shrew Soft Inc.
10/01/25 01:21:35 ## : This product linked OpenSSL 0.9.8h 28 May 2008
10/01/25 01:21:35 ii : opened 'C:\Program Files\ShrewSoft\VPN Client\debug\iked.log'
10/01/25 01:21:35 ii : opened 'C:\Program Files\ShrewSoft\VPN Client/debug/dump-ike-encrypt.cap'
10/01/25 01:21:35 ii : rebuilding vnet device list ...
10/01/25 01:21:35 ii : device ROOT\VNET\0000 disabled
10/01/25 01:21:35 ii : network process thread begin ...
10/01/25 01:21:35 ii : pfkey process thread begin ...
10/01/25 01:21:35 ii : ipc server process thread begin ...
10/01/25 01:21:39 ii : ipc client process thread begin ...
10/01/25 01:21:39 <A : peer config add message
10/01/25 01:21:39 DB : peer added ( obj count = 1 )
10/01/25 01:21:39 ii : local address 192.XXX.X.XXX selected for peer
10/01/25 01:21:39 DB : tunnel added ( obj count = 1 )
10/01/25 01:21:39 <A : proposal config message
10/01/25 01:21:39 <A : proposal config message
10/01/25 01:21:39 <A : client config message
10/01/25 01:21:39 <A : xauth username message
10/01/25 01:21:39 <A : xauth password message
10/01/25 01:21:39 <A : local id 'UofMvpn' message
10/01/25 01:21:39 <A : preshared key message
10/01/25 01:21:39 <A : remote resource message
10/01/25 01:21:39 <A : peer tunnel enable message
10/01/25 01:21:39 DB : new phase1 ( ISAKMP initiator )
10/01/25 01:21:39 DB : exchange type is aggressive
10/01/25 01:21:39 DB : 192.XXX.X.XXX:500 <-> 160.XX.XXX.XX:500
10/01/25 01:21:39 DB : 010c456b144f159a:0000000000000000
10/01/25 01:21:39 DB : phase1 added ( obj count = 1 )
10/01/25 01:21:39 >> : security association payload
10/01/25 01:21:39 >> : - proposal #1 payload 
10/01/25 01:21:39 >> : -- transform #1 payload 
10/01/25 01:21:39 >> : -- transform #2 payload 
10/01/25 01:21:39 >> : -- transform #3 payload 
10/01/25 01:21:39 >> : -- transform #4 payload 
10/01/25 01:21:39 >> : -- transform #5 payload 
10/01/25 01:21:39 >> : -- transform #6 payload 
10/01/25 01:21:39 >> : -- transform #7 payload 
10/01/25 01:21:39 >> : -- transform #8 payload 
10/01/25 01:21:39 >> : -- transform #9 payload 
10/01/25 01:21:39 >> : -- transform #10 payload 
10/01/25 01:21:39 >> : -- transform #11 payload 
10/01/25 01:21:39 >> : -- transform #12 payload 
10/01/25 01:21:39 >> : -- transform #13 payload 
10/01/25 01:21:39 >> : -- transform #14 payload 
10/01/25 01:21:39 >> : -- transform #15 payload 
10/01/25 01:21:39 >> : -- transform #16 payload 
10/01/25 01:21:39 >> : -- transform #17 payload 
10/01/25 01:21:39 >> : -- transform #18 payload 
10/01/25 01:21:39 >> : key exchange payload
10/01/25 01:21:39 >> : nonce payload
10/01/25 01:21:39 >> : identification payload
10/01/25 01:21:39 >> : vendor id payload
10/01/25 01:21:39 ii : local supports XAUTH
10/01/25 01:21:39 >> : vendor id payload
10/01/25 01:21:39 ii : local supports nat-t ( draft v00 )
10/01/25 01:21:39 >> : vendor id payload
10/01/25 01:21:39 ii : local supports nat-t ( draft v01 )
10/01/25 01:21:39 >> : vendor id payload
10/01/25 01:21:39 ii : local supports nat-t ( draft v02 )
10/01/25 01:21:39 >> : vendor id payload
10/01/25 01:21:39 ii : local supports nat-t ( draft v03 )
10/01/25 01:21:39 >> : vendor id payload
10/01/25 01:21:39 ii : local supports nat-t ( rfc )
10/01/25 01:21:39 >> : vendor id payload
10/01/25 01:21:39 ii : local supports DPDv1
10/01/25 01:21:39 >> : vendor id payload
10/01/25 01:21:39 ii : local is SHREW SOFT compatible
10/01/25 01:21:39 >> : vendor id payload
10/01/25 01:21:39 ii : local is NETSCREEN compatible
10/01/25 01:21:39 >> : vendor id payload
10/01/25 01:21:39 ii : local is SIDEWINDER compatible
10/01/25 01:21:39 >> : vendor id payload
10/01/25 01:21:39 ii : local is CISCO UNITY compatible
10/01/25 01:21:39 >= : cookies 010c456b144f159a:0000000000000000
10/01/25 01:21:39 >= : message 00000000
10/01/25 01:21:39 -> : send IKE packet 192.XXX.X.XXX:500 -> 160.XX.XXX.XX:500 ( 1159 bytes )
10/01/25 01:21:39 DB : phase1 resend event scheduled ( ref count = 2 )
10/01/25 01:21:39 <- : recv IKE packet 160.XX.XXX.XX:500 -> 192.XXX.X.XXX:500 ( 388 bytes )
10/01/25 01:21:39 DB : phase1 found
10/01/25 01:21:39 ii : processing phase1 packet ( 388 bytes )
10/01/25 01:21:39 =< : cookies 010c456b144f159a:44c1176cdf1619ff
10/01/25 01:21:39 =< : message 00000000
10/01/25 01:21:39 << : security association payload
10/01/25 01:21:39 << : - propsal #1 payload 
10/01/25 01:21:39 << : -- transform #13 payload 
10/01/25 01:21:39 ii : unmatched isakmp proposal/transform
10/01/25 01:21:39 ii : cipher type ( 3des != aes )
10/01/25 01:21:39 ii : unmatched isakmp proposal/transform
10/01/25 01:21:39 ii : cipher type ( 3des != aes )
10/01/25 01:21:39 ii : unmatched isakmp proposal/transform
10/01/25 01:21:39 ii : cipher type ( 3des != aes )
10/01/25 01:21:39 ii : unmatched isakmp proposal/transform
10/01/25 01:21:39 ii : cipher type ( 3des != aes )
10/01/25 01:21:39 ii : unmatched isakmp proposal/transform
10/01/25 01:21:39 ii : cipher type ( 3des != aes )
10/01/25 01:21:39 ii : unmatched isakmp proposal/transform
10/01/25 01:21:39 ii : cipher type ( 3des != aes )
10/01/25 01:21:39 ii : unmatched isakmp proposal/transform
10/01/25 01:21:39 ii : cipher type ( 3des != blowfish )
10/01/25 01:21:39 ii : unmatched isakmp proposal/transform
10/01/25 01:21:39 ii : cipher type ( 3des != blowfish )
10/01/25 01:21:39 ii : unmatched isakmp proposal/transform
10/01/25 01:21:39 ii : cipher type ( 3des != blowfish )
10/01/25 01:21:39 ii : unmatched isakmp proposal/transform
10/01/25 01:21:39 ii : cipher type ( 3des != blowfish )
10/01/25 01:21:39 ii : unmatched isakmp proposal/transform
10/01/25 01:21:39 ii : cipher type ( 3des != blowfish )
10/01/25 01:21:39 ii : unmatched isakmp proposal/transform
10/01/25 01:21:39 ii : cipher type ( 3des != blowfish )
10/01/25 01:21:39 ii : matched isakmp proposal #1 transform #13
10/01/25 01:21:39 ii : - transform    = ike
10/01/25 01:21:39 ii : - cipher type  = 3des
10/01/25 01:21:39 ii : - key length   = default
10/01/25 01:21:39 ii : - hash type    = md5
10/01/25 01:21:39 ii : - dh group     = modp-1024
10/01/25 01:21:39 ii : - auth type    = xauth-initiator-psk
10/01/25 01:21:39 ii : - life seconds = 86400
10/01/25 01:21:39 ii : - life kbytes  = 0
10/01/25 01:21:39 << : key exchange payload
10/01/25 01:21:39 << : nonce payload
10/01/25 01:21:39 << : identification payload
10/01/25 01:21:39 ii : phase1 id target is any
10/01/25 01:21:39 ii : phase1 id match 
10/01/25 01:21:39 ii : received = ipv4-host 160.XX.XXX.XX
10/01/25 01:21:39 << : hash payload
10/01/25 01:21:39 << : vendor id payload
10/01/25 01:21:39 ii : peer is CISCO UNITY compatible
10/01/25 01:21:39 << : vendor id payload
10/01/25 01:21:39 ii : peer supports XAUTH
10/01/25 01:21:39 << : vendor id payload
10/01/25 01:21:39 ii : peer supports DPDv1
10/01/25 01:21:39 << : vendor id payload
10/01/25 01:21:39 ii : unknown vendor id ( 20 bytes )
10/01/25 01:21:39 0x : 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000
10/01/25 01:21:39 << : vendor id payload
10/01/25 01:21:39 ii : unknown vendor id ( 16 bytes )
10/01/25 01:21:39 0x : b106b071 df1719ff 0e38296c b81fd887
10/01/25 01:21:39 << : vendor id payload
10/01/25 01:21:39 ii : unknown vendor id ( 16 bytes )
10/01/25 01:21:39 0x : 1f07f70e aa6514d3 b0fa9654 2a500401
10/01/25 01:21:39 ii : nat-t is unsupported by remote peer
10/01/25 01:21:39 == : DH shared secret ( 128 bytes )
10/01/25 01:21:39 == : SETKEYID ( 16 bytes )
10/01/25 01:21:39 == : SETKEYID_d ( 16 bytes )
10/01/25 01:21:39 == : SETKEYID_a ( 16 bytes )
10/01/25 01:21:39 == : SETKEYID_e ( 16 bytes )
10/01/25 01:21:39 == : cipher key ( 32 bytes )
10/01/25 01:21:39 == : cipher iv ( 8 bytes )
10/01/25 01:21:39 == : phase1 hash_i ( computed ) ( 16 bytes )
10/01/25 01:21:39 >> : hash payload
10/01/25 01:21:39 >= : cookies 010c456b144f159a:44c1176cdf1619ff
10/01/25 01:21:39 >= : message 00000000
10/01/25 01:21:39 >= : encrypt iv ( 8 bytes )
10/01/25 01:21:39 == : encrypt packet ( 48 bytes )
10/01/25 01:21:39 == : stored iv ( 8 bytes )
10/01/25 01:21:39 DB : phase1 resend event canceled ( ref count = 1 )
10/01/25 01:21:39 -> : send IKE packet 192.XXX.X.XXX:500 -> 160.XX.XXX.XX:500 ( 80 bytes )
10/01/25 01:21:39 == : phase1 hash_r ( computed ) ( 16 bytes )
10/01/25 01:21:39 == : phase1 hash_r ( received ) ( 16 bytes )
10/01/25 01:21:39 ii : phase1 sa established
10/01/25 01:21:39 ii : 160.XX.XXX.XX:500 <-> 192.XXX.X.XXX:500
10/01/25 01:21:39 ii : 10c456b144f159a:44c1176cdf1619ff
10/01/25 01:21:39 ii : sending peer INITIAL-CONTACT notification
10/01/25 01:21:39 ii : - 192.XXX.X.XXX:500 -> 160.XX.XXX.XX:500
10/01/25 01:21:39 ii : - isakmp spi = 010c456b144f159a:44c1176cdf1619ff
10/01/25 01:21:39 ii : - data size 0
10/01/25 01:21:39 >> : hash payload
10/01/25 01:21:39 >> : notification payload
10/01/25 01:21:39 == : new informational hash ( 16 bytes )
10/01/25 01:21:39 == : new informational iv ( 8 bytes )
10/01/25 01:21:39 >= : cookies 010c456b144f159a:44c1176cdf1619ff
10/01/25 01:21:39 >= : message ebd31e57
10/01/25 01:21:39 >= : encrypt iv ( 8 bytes )
10/01/25 01:21:39 == : encrypt packet ( 76 bytes )
10/01/25 01:21:39 == : stored iv ( 8 bytes )
10/01/25 01:21:39 -> : send IKE packet 192.XXX.X.XXX:500 -> 160.XX.XXX.XX:500 ( 104 bytes )
10/01/25 01:21:39 DB : phase2 not found
10/01/25 01:21:39 <- : recv IKE packet 160.XX.XXX.XX:500 -> 192.XXX.X.XXX:500 ( 100 bytes )
10/01/25 01:21:39 DB : phase1 found
10/01/25 01:21:39 ii : processing config packet ( 100 bytes )
10/01/25 01:21:39 DB : config not found
10/01/25 01:21:39 DB : config added ( obj count = 1 )
10/01/25 01:21:39 == : new config iv ( 8 bytes )
10/01/25 01:21:39 =< : cookies 010c456b144f159a:44c1176cdf1619ff
10/01/25 01:21:39 =< : message f3f45f1d
10/01/25 01:21:39 =< : decrypt iv ( 8 bytes )
10/01/25 01:21:39 == : decrypt packet ( 100 bytes )
10/01/25 01:21:39 <= : stored iv ( 8 bytes )
10/01/25 01:21:39 << : hash payload
10/01/25 01:21:39 << : attribute payload
10/01/25 01:21:39 == : configure hash_i ( computed ) ( 16 bytes )
10/01/25 01:21:39 == : configure hash_c ( computed ) ( 16 bytes )
10/01/25 01:21:39 ii : configure hash verified
10/01/25 01:21:39 ii : - xauth authentication type
10/01/25 01:21:39 ii : - xauth username
10/01/25 01:21:39 ii : - xauth password
10/01/25 01:21:39 ii : received basic xauth request - Enter Username and Password.
10/01/25 01:21:39 ii : - standard xauth username
10/01/25 01:21:39 ii : - standard xauth password
10/01/25 01:21:39 ii : sending xauth response for xUSERNAMEx
10/01/25 01:21:39 >> : hash payload
10/01/25 01:21:39 >> : attribute payload
10/01/25 01:21:39 == : new configure hash ( 16 bytes )
10/01/25 01:21:39 >= : cookies 010c456b144f159a:44c1176cdf1619ff
10/01/25 01:21:39 >= : message f3f45f1d
10/01/25 01:21:39 >= : encrypt iv ( 8 bytes )
10/01/25 01:21:39 == : encrypt packet ( 84 bytes )
10/01/25 01:21:39 == : stored iv ( 8 bytes )
10/01/25 01:21:39 -> : send IKE packet 192.XXX.X.XXX:500 -> 160.XX.XXX.XX:500 ( 112 bytes )
10/01/25 01:21:39 DB : config resend event scheduled ( ref count = 2 )
10/01/25 01:21:40 <- : recv IKE packet 160.XX.XXX.XX:500 -> 192.XXX.X.XXX:500 ( 60 bytes )
10/01/25 01:21:40 DB : phase1 found
10/01/25 01:21:40 ii : processing config packet ( 60 bytes )
10/01/25 01:21:40 DB : config found
10/01/25 01:21:40 == : new config iv ( 8 bytes )
10/01/25 01:21:40 =< : cookies 010c456b144f159a:44c1176cdf1619ff
10/01/25 01:21:40 =< : message 13ee6912
10/01/25 01:21:40 =< : decrypt iv ( 8 bytes )
10/01/25 01:21:40 == : decrypt packet ( 60 bytes )
10/01/25 01:21:40 <= : stored iv ( 8 bytes )
10/01/25 01:21:40 << : hash payload
10/01/25 01:21:40 << : attribute payload
10/01/25 01:21:40 == : configure hash_i ( computed ) ( 16 bytes )
10/01/25 01:21:40 == : configure hash_c ( computed ) ( 16 bytes )
10/01/25 01:21:40 ii : configure hash verified
10/01/25 01:21:40 ii : received xauth result - 
10/01/25 01:21:40 ii : user xUSERNAMEx authentication succeeded
10/01/25 01:21:40 ii : sending xauth acknowledge
10/01/25 01:21:40 >> : hash payload
10/01/25 01:21:40 >> : attribute payload
10/01/25 01:21:40 == : new configure hash ( 16 bytes )
10/01/25 01:21:40 >= : cookies 010c456b144f159a:44c1176cdf1619ff
10/01/25 01:21:40 >= : message 13ee6912
10/01/25 01:21:40 >= : encrypt iv ( 8 bytes )
10/01/25 01:21:40 == : encrypt packet ( 56 bytes )
10/01/25 01:21:40 == : stored iv ( 8 bytes )
10/01/25 01:21:40 DB : config resend event canceled ( ref count = 1 )
10/01/25 01:21:40 -> : send IKE packet 192.XXX.X.XXX:500 -> 160.XX.XXX.XX:500 ( 88 bytes )
10/01/25 01:21:40 DB : config resend event scheduled ( ref count = 2 )
10/01/25 01:21:40 ii : building config attribute list
10/01/25 01:21:40 ii : - IP4 Address
10/01/25 01:21:40 ii : - Address Expiry
10/01/25 01:21:40 ii : - IP4 Netamask
10/01/25 01:21:40 ii : - IP4 DNS Server
10/01/25 01:21:40 ii : - IP4 WINS Server
10/01/25 01:21:40 ii : - DNS Suffix
10/01/25 01:21:40 ii : - Split DNS Domain
10/01/25 01:21:40 ii : - Login Banner
10/01/25 01:21:40 ii : - Save Password
10/01/25 01:21:40 ii : - Application Version = Cisco Systems VPN Client 4.8.01.0300:WinNT
10/01/25 01:21:40 ii : - Firewall Type = CISCO-UNKNOWN
10/01/25 01:21:40 == : new config iv ( 8 bytes )
10/01/25 01:21:40 ii : sending config pull request
10/01/25 01:21:40 >> : hash payload
10/01/25 01:21:40 >> : attribute payload
10/01/25 01:21:40 == : new configure hash ( 16 bytes )
10/01/25 01:21:40 >= : cookies 010c456b144f159a:44c1176cdf1619ff
10/01/25 01:21:40 >= : message d277e877
10/01/25 01:21:40 >= : encrypt iv ( 8 bytes )
10/01/25 01:21:40 == : encrypt packet ( 154 bytes )
10/01/25 01:21:40 == : stored iv ( 8 bytes )
10/01/25 01:21:40 DB : config resend event canceled ( ref count = 1 )
10/01/25 01:21:40 -> : send IKE packet 192.XXX.X.XXX:500 -> 160.XX.XXX.XX:500 ( 184 bytes )
10/01/25 01:21:40 DB : config resend event scheduled ( ref count = 2 )
10/01/25 01:21:40 <- : recv IKE packet 160.XX.XXX.XX:500 -> 192.XXX.X.XXX:500 ( 204 bytes )
10/01/25 01:21:40 DB : phase1 found
10/01/25 01:21:40 ii : processing config packet ( 204 bytes )
10/01/25 01:21:40 DB : config found
10/01/25 01:21:40 =< : cookies 010c456b144f159a:44c1176cdf1619ff
10/01/25 01:21:40 =< : message d277e877
10/01/25 01:21:40 =< : decrypt iv ( 8 bytes )
10/01/25 01:21:40 == : decrypt packet ( 204 bytes )
10/01/25 01:21:40 <= : trimmed packet padding ( 5 bytes )
10/01/25 01:21:40 <= : stored iv ( 8 bytes )
10/01/25 01:21:40 << : hash payload
10/01/25 01:21:40 << : attribute payload
10/01/25 01:21:40 == : configure hash_i ( computed ) ( 16 bytes )
10/01/25 01:21:40 == : configure hash_c ( computed ) ( 16 bytes )
10/01/25 01:21:40 ii : configure hash verified
10/01/25 01:21:40 ii : received config pull response
10/01/25 01:21:40 ii : - IP4 Address = 134.XX.X.X
10/01/25 01:21:40 ii : - IP4 DNS Server = 128.101.101.101
10/01/25 01:21:40 ii : - IP4 DNS Server = 134.84.84.84
10/01/25 01:21:40 ii : - Save Password = 0
10/01/25 01:21:40 ii : - DNS Suffix = UMN.EDU
10/01/25 01:21:40 ii : - Application Version = Cisco Systems, Inc./VPN 3000 Concentrator Version 4.1.5.Rel built by vmurphy on Jun 18 2004 00:22:46
10/01/25 01:21:40 DB : config resend event canceled ( ref count = 1 )
10/01/25 01:21:40 !! : invalid private netmask, defaulting to class c
10/01/25 01:21:40 ii : enabled adapter ROOT\VNET\0000 
10/01/25 01:21:40 ii : apapter ROOT\VNET\0000 MTU is 1500
10/01/25 01:21:40 ii : creating NONE INBOUND policy ANY:160.XX.XXX.XX:* -> ANY:192.XXX.X.XXX:*
10/01/25 01:21:40 DB : policy added ( obj count = 1 )
10/01/25 01:21:40 K> : send pfkey X_SPDADD UNSPEC message
10/01/25 01:21:40 ii : creating NONE OUTBOUND policy ANY:192.XXX.X.XXX:* -> ANY:160.XX.XXX.XX:*
10/01/25 01:21:40 K< : recv pfkey X_SPDADD UNSPEC message
10/01/25 01:21:40 DB : policy found
10/01/25 01:21:40 ii : created NONE policy route for 160.XX.XXX.XX/32
10/01/25 01:21:40 DB : policy added ( obj count = 2 )
10/01/25 01:21:40 K> : send pfkey X_SPDADD UNSPEC message
10/01/25 01:21:40 ii : creating IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:134.XX.X.X:*
10/01/25 01:21:40 DB : policy added ( obj count = 3 )
10/01/25 01:21:40 K> : send pfkey X_SPDADD UNSPEC message
10/01/25 01:21:40 ii : creating IPSEC OUTBOUND policy ANY:134.XX.X.X:* -> ANY:0.0.0.0/0:*
10/01/25 01:21:40 K< : recv pfkey X_SPDADD UNSPEC message
10/01/25 01:21:40 DB : policy found
10/01/25 01:21:40 ii : calling init phase2 for initial policy
10/01/25 01:21:40 DB : policy found
10/01/25 01:21:40 DB : policy not found
10/01/25 01:21:40 !! : unable to locate inbound policy for init phase2
10/01/25 01:21:40 K< : recv pfkey X_SPDADD UNSPEC message
10/01/25 01:21:40 DB : policy found
10/01/25 01:21:40 ii : created IPSEC policy route for 0.0.0.0
10/01/25 01:21:40 DB : policy added ( obj count = 4 )
10/01/25 01:21:40 K> : send pfkey X_SPDADD UNSPEC message
10/01/25 01:21:40 ii : split DNS bypassed ( no split domains defined )
10/01/25 01:21:40 K< : recv pfkey X_SPDADD UNSPEC message
10/01/25 01:21:40 DB : policy found
10/01/25 01:21:43 K< : recv pfkey ACQUIRE UNSPEC message
10/01/25 01:21:43 DB : policy found
10/01/25 01:21:43 DB : policy found
10/01/25 01:21:43 DB : tunnel found
10/01/25 01:21:43 DB : new phase2 ( IPSEC initiator )
10/01/25 01:21:43 DB : phase2 added ( obj count = 1 )
10/01/25 01:21:43 K> : send pfkey GETSPI ESP message
10/01/25 01:21:43 K< : recv pfkey GETSPI ESP message
10/01/25 01:21:43 DB : phase2 found
10/01/25 01:21:43 ii : updated spi for 1 ipsec-esp proposal
10/01/25 01:21:43 DB : phase1 found
10/01/25 01:21:43 >> : hash payload
10/01/25 01:21:43 >> : security association payload
10/01/25 01:21:43 >> : - proposal #1 payload 
10/01/25 01:21:43 >> : -- transform #1 payload 
10/01/25 01:21:43 >> : -- transform #2 payload 
10/01/25 01:21:43 >> : -- transform #3 payload 
10/01/25 01:21:43 >> : -- transform #4 payload 
10/01/25 01:21:43 >> : -- transform #5 payload 
10/01/25 01:21:43 >> : -- transform #6 payload 
10/01/25 01:21:43 >> : -- transform #7 payload 
10/01/25 01:21:43 >> : -- transform #8 payload 
10/01/25 01:21:43 >> : -- transform #9 payload 
10/01/25 01:21:43 >> : -- transform #10 payload 
10/01/25 01:21:43 >> : -- transform #11 payload 
10/01/25 01:21:43 >> : -- transform #12 payload 
10/01/25 01:21:43 >> : -- transform #13 payload 
10/01/25 01:21:43 >> : -- transform #14 payload 
10/01/25 01:21:43 >> : -- transform #15 payload 
10/01/25 01:21:43 >> : -- transform #16 payload 
10/01/25 01:21:43 >> : -- transform #17 payload 
10/01/25 01:21:43 >> : -- transform #18 payload 
10/01/25 01:21:43 >> : nonce payload
10/01/25 01:21:43 >> : key exchange payload
10/01/25 01:21:43 >> : identification payload
10/01/25 01:21:43 >> : identification payload
10/01/25 01:21:43 == : phase2 hash_i ( input ) ( 836 bytes )
10/01/25 01:21:43 == : phase2 hash_i ( computed ) ( 16 bytes )
10/01/25 01:21:43 == : new phase2 iv ( 8 bytes )
10/01/25 01:21:43 >= : cookies 010c456b144f159a:44c1176cdf1619ff
10/01/25 01:21:43 >= : message 3affb86a
10/01/25 01:21:43 >= : encrypt iv ( 8 bytes )
10/01/25 01:21:43 == : encrypt packet ( 880 bytes )
10/01/25 01:21:43 == : stored iv ( 8 bytes )
10/01/25 01:21:43 -> : send IKE packet 192.XXX.X.XXX:500 -> 160.XX.XXX.XX:500 ( 912 bytes )
10/01/25 01:21:43 DB : phase2 resend event scheduled ( ref count = 2 )
10/01/25 01:21:43 <- : recv IKE packet 160.XX.XXX.XX:500 -> 192.XXX.X.XXX:500 ( 76 bytes )
10/01/25 01:21:43 DB : phase1 found
10/01/25 01:21:43 ii : processing informational packet ( 76 bytes )
10/01/25 01:21:43 == : new informational iv ( 8 bytes )
10/01/25 01:21:43 =< : cookies 010c456b144f159a:44c1176cdf1619ff
10/01/25 01:21:43 =< : message 38c34834
10/01/25 01:21:43 =< : decrypt iv ( 8 bytes )
10/01/25 01:21:43 == : decrypt packet ( 76 bytes )
10/01/25 01:21:43 <= : stored iv ( 8 bytes )
10/01/25 01:21:43 << : hash payload
10/01/25 01:21:43 << : delete payload
10/01/25 01:21:43 == : informational hash_i ( computed ) ( 16 bytes )
10/01/25 01:21:43 == : informational hash_c ( received ) ( 16 bytes )
10/01/25 01:21:43 ii : informational hash verified
10/01/25 01:21:43 ii : received peer DELETE message
10/01/25 01:21:43 ii : - 160.XX.XXX.XX:500 -> 192.XXX.X.XXX:500
10/01/25 01:21:43 ii : - isakmp spi = 010c456b144f159a:44c1176cdf1619ff
10/01/25 01:21:43 DB : phase1 found
10/01/25 01:21:43 ii : cleanup, marked phase1 010c456b144f159a:44c1176cdf1619ff for removal
10/01/25 01:21:43 DB : phase1 soft event canceled ( ref count = 4 )
10/01/25 01:21:43 DB : phase1 hard event canceled ( ref count = 3 )
10/01/25 01:21:43 DB : phase1 dead event canceled ( ref count = 2 )
10/01/25 01:21:43 DB : config deleted ( obj count = 0 )
10/01/25 01:21:43 ii : phase1 removal before expire time
10/01/25 01:21:43 DB : phase1 not found
10/01/25 01:21:43 DB : phase1 deleted ( obj count = 0 )
10/01/25 01:21:43 DB : policy found
10/01/25 01:21:43 ii : removing IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:134.XX.X.X:*
10/01/25 01:21:43 K> : send pfkey X_SPDDELETE2 UNSPEC message
10/01/25 01:21:43 DB : policy found
10/01/25 01:21:43 ii : removing IPSEC OUTBOUND policy ANY:134.XX.X.X:* -> ANY:0.0.0.0/0:*
10/01/25 01:21:43 K> : send pfkey X_SPDDELETE2 UNSPEC message
10/01/25 01:21:43 K< : recv pfkey X_SPDDELETE2 UNSPEC message
10/01/25 01:21:43 ii : removed IPSEC policy route for ANY:0.0.0.0/0:*
10/01/25 01:21:43 DB : policy found
10/01/25 01:21:43 ii : removing NONE INBOUND policy ANY:160.XX.XXX.XX:* -> ANY:192.XXX.X.XXX:*
10/01/25 01:21:43 K> : send pfkey X_SPDDELETE2 UNSPEC message
10/01/25 01:21:43 DB : policy found
10/01/25 01:21:43 ii : removing NONE OUTBOUND policy ANY:192.XXX.X.XXX:* -> ANY:160.XX.XXX.XX:*
10/01/25 01:21:43 K> : send pfkey X_SPDDELETE2 UNSPEC message
10/01/25 01:21:43 ii : removed NONE policy route for ANY:160.XX.XXX.XX:*
10/01/25 01:21:43 DB : policy found
10/01/25 01:21:43 DB : policy deleted ( obj count = 3 )
10/01/25 01:21:43 K< : recv pfkey X_SPDDELETE2 UNSPEC message
10/01/25 01:21:43 DB : policy found
10/01/25 01:21:43 DB : policy deleted ( obj count = 2 )
10/01/25 01:21:43 K< : recv pfkey X_SPDDELETE2 UNSPEC message
10/01/25 01:21:43 DB : policy found
10/01/25 01:21:43 DB : policy deleted ( obj count = 1 )
10/01/25 01:21:43 K< : recv pfkey X_SPDDELETE2 UNSPEC message
10/01/25 01:21:43 DB : policy found
10/01/25 01:21:43 DB : policy deleted ( obj count = 0 )
10/01/25 01:21:43 ii : disable adapter ROOT\VNET\0000
10/01/25 01:21:43 DB : tunnel dpd event canceled ( ref count = 3 )
10/01/25 01:21:43 DB : tunnel stats event canceled ( ref count = 2 )
10/01/25 01:21:43 DB : removing tunnel config references
10/01/25 01:21:43 DB : removing tunnel phase2 references
10/01/25 01:21:43 DB : phase2 resend event canceled ( ref count = 1 )
10/01/25 01:21:43 ii : phase2 removal before expire time
10/01/25 01:21:43 DB : phase2 deleted ( obj count = 0 )
10/01/25 01:21:43 DB : removing tunnel phase1 references
10/01/25 01:21:43 DB : tunnel deleted ( obj count = 0 )
10/01/25 01:21:43 DB : removing all peer tunnel refrences
10/01/25 01:21:43 DB : peer deleted ( obj count = 0 )
10/01/25 01:21:43 ii : ipc client process thread exit ...


More information about the vpn-help mailing list