Hello everyone, i'm trying for two days now to setup an IKedV2 Roadwarrior VPN. the logfiles show, that something is not working correctly during connection establishment. I changed configs in every way i can think of without success. Why is it not working ? Here is the setup.
PF is permissive Home(internet:178.x.x.x, NAT, lan 192.168.1.0/24) -- internet -- Smartphone(internet:89.x.x.x, NAT, WLanAP 192.168.43.0/24) -- Notebook(OpenBSD6.3, 192.168.43.253) Home config ikev2 "VPN HOME" passive esp \ from 192.168.1.1 to 192.168.43.253 \ local 178.x.x.x peer any \ srcid 178.x.x.x \ psk "key" \ config address 192.168.1.100/8 \ config netmask 255.255.255.0 \ config name-server 192.168.1.1 Notebook config ikev2 "VPN HOME" active esp \ from 192.168.43.253 to 192.168.1.1 peer 178.x.x.x \ psk "key" \ tag "VPN" tap enc0 Home net.inet.ip.forwarding=1 net.inet.ah.enable=1 net.inet.esp.enable=1 net.inet.esp.udpencap=1 net.inet.esp.udpencap_port=4500 net.inet.ipcomp.enable=1 Notebook net.inet.ip.forwarding=1 net.inet.ah.enable=1 net.inet.esp.enable=1 net.inet.esp.udpencap=1 net.inet.esp.udpencap_port=4500 net.inet.ipcomp.enable=0 Home server# iked -dvv ikev2 "VPN HOME" passive esp inet from 192.168.1.1 to 192.168.43.253 local 178.x.x.x peer any ikesa enc aes-256,aes-192,aes-128,3des prf hmac-sha2-256,hmac-sha1 auth hmac-sha2-256,hmac-sha1 group modp2048,modp1536,modp1024 childsa enc aes-256,aes-192,aes-128 auth hmac-sha2-256,hmac-sha1 srcid 178.x.x.x lifetime 10800 bytes 536870912 psk key config address 192.168.1.100 config netmask 255.255.255.0 config name-server 192.168.1.1 /etc/iked.conf: loaded 1 configuration rules ca_privkey_serialize: type RSA_KEY length 1190 ca_pubkey_serialize: type RSA_KEY length 270 config_getpolicy: received policy ca_privkey_to_method: type RSA_KEY method RSA_SIG ca_getkey: received private key type RSA_KEY length 1190 ca_getkey: received public key type RSA_KEY length 270 ca_dispatch_parent: config reset config_getpfkey: received pfkey fd 3 config_getcompile: compilation done config_getsocket: received socket fd 4 config_getsocket: received socket fd 5 config_getsocket: received socket fd 6 config_getsocket: received socket fd 7 config_getmobike: mobike ca_reload: local cert type RSA_KEY config_getocsp: ocsp_url none ikev2_dispatch_cert: updated local CERTREQ type RSA_KEY length 0 ikev2_recv: IKE_SA_INIT request from initiator 89.x.x.x:10749 to 178.x.x.x:500 policy 'VPN HOME' id 0, 510 bytes ikev2_recv: ispi 0x6fa80e0bb275c9db rspi 0x0000000000000000 ikev2_policy2id: srcid IPV4/178.x.x.x length 8 ikev2_pld_parse: header ispi 0x6fa80e0bb275c9db rspi 0x0000000000000000 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 510 response 0 ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 112 ikev2_pld_sa: more 0 reserved 0 length 108 proposal #1 protoid IKE spisize 0 xforms 11 spi 0 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96 ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_2048 ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_1536 ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024 ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 ikev2_pld_ke: dh group MODP_2048 reserved 0 ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP ikev2_nat_detection: peer source 0x6fa80e0bb275c9db 0x0000000000000000 89.x.x.x:10749 ikev2_pld_notify: NAT_DETECTION_SOURCE_IP detected NAT, enabling UDP encapsulation ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP ikev2_nat_detection: peer destination 0x6fa80e0bb275c9db 0x0000000000000000 178.x.x.x:500 ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 14 ikev2_pld_notify: protoid NONE spisize 0 type SIGNATURE_HASH_ALGORITHMS ikev2_pld_notify: signature hash SHA2_256 (2) ikev2_pld_notify: signature hash SHA2_384 (3) ikev2_pld_notify: signature hash SHA2_512 (4) sa_state: INIT -> SA_INIT ikev2_sa_negotiate: score 4 sa_stateok: SA_INIT flags 0x0000, require 0x0000 sa_stateflags: 0x0000 -> 0x0020 sa (required 0x0000 ) ikev2_sa_keys: DHSECRET with 256 bytes ikev2_sa_keys: SKEYSEED with 32 bytes ikev2_sa_keys: S with 80 bytes ikev2_prfplus: T1 with 32 bytes ikev2_prfplus: T2 with 32 bytes ikev2_prfplus: T3 with 32 bytes ikev2_prfplus: T4 with 32 bytes ikev2_prfplus: T5 with 32 bytes ikev2_prfplus: T6 with 32 bytes ikev2_prfplus: T7 with 32 bytes ikev2_prfplus: Tn with 224 bytes ikev2_sa_keys: SK_d with 32 bytes ikev2_sa_keys: SK_ai with 32 bytes ikev2_sa_keys: SK_ar with 32 bytes ikev2_sa_keys: SK_ei with 32 bytes ikev2_sa_keys: SK_er with 32 bytes ikev2_sa_keys: SK_pi with 32 bytes ikev2_sa_keys: SK_pr with 32 bytes ikev2_add_proposals: length 44 ikev2_next_payload: length 48 nextpayload KE ikev2_next_payload: length 264 nextpayload NONCE ikev2_next_payload: length 36 nextpayload NOTIFY ikev2_nat_detection: local source 0x6fa80e0bb275c9db 0x103d599e83dc26f7 178.x.x.x:500 ikev2_next_payload: length 28 nextpayload NOTIFY ikev2_nat_detection: local destination 0x6fa80e0bb275c9db 0x103d599e83dc26f7 89.x.x.x:10749 ikev2_next_payload: length 28 nextpayload NOTIFY ikev2_next_payload: length 14 nextpayload NONE ikev2_pld_parse: header ispi 0x6fa80e0bb275c9db rspi 0x103d599e83dc26f7 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 446 response 1 ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48 ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0 xforms 4 spi 0 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048 ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 ikev2_pld_ke: dh group MODP_2048 reserved 0 ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 14 ikev2_pld_notify: protoid NONE spisize 0 type SIGNATURE_HASH_ALGORITHMS ikev2_msg_send: IKE_SA_INIT response from 178.x.x.x:500 to 89.x.x.x:10749 msgid 0, 446 bytes config_free_proposals: free 0x1f284fa6df80 ikev2_recv: IKE_AUTH request from initiator 89.x.x.x:15384 to 178.x.x.x:4500 policy 'VPN HOME' id 1, 272 bytes ikev2_recv: ispi 0x6fa80e0bb275c9db rspi 0x103d599e83dc26f7 ikev2_recv: updated SA to peer 89.x.x.x:15384 local 178.x.x.x:4500 ikev2_pld_parse: header ispi 0x6fa80e0bb275c9db rspi 0x103d599e83dc26f7 nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 272 response 0 ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 244 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 208 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 208/208 padding 13 ikev2_pld_payloads: decrypted payload IDi nextpayload AUTH critical 0x00 length 22 ikev2_pld_id: id FQDN/x131e.void.net length 18 ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical 0x00 length 40 ikev2_pld_auth: method SHARED_KEY_MIC length 32 sa_state: SA_INIT -> AUTH_REQUEST ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 84 ikev2_pld_sa: more 0 reserved 0 length 80 proposal #1 protoid ESP spisize 4 xforms 7 spi 0x16998449 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96 ikev2_pld_xform: more 3 reserved 0 length 8 type ESN id ESN ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.43.253 end 192.168.43.253 ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.1.1 end 192.168.1.1 ikev2_resp_recv: NAT-T message received, updated SA sa_stateok: SA_INIT flags 0x0000, require 0x0000 policy_lookup: peerid 'x131e.void.net' ikev2_msg_auth: responder auth data length 510 ikev2_msg_auth: initiator auth data length 574 ikev2_msg_authverify: method SHARED_KEY_MIC keylen 32 type NONE ikev2_msg_authverify: authentication successful sa_state: AUTH_REQUEST -> AUTH_SUCCESS sa_stateflags: 0x0028 -> 0x0038 auth,authvalid,sa (required 0x0038 auth,authvalid,sa) ikev2_sa_negotiate: score 3 sa_stateflags: 0x0038 -> 0x0038 auth,authvalid,sa (required 0x0038 auth,authvalid,sa) sa_stateok: VALID flags 0x0038, require 0x0038 auth,authvalid,sa sa_state: AUTH_SUCCESS -> VALID sa_stateok: VALID flags 0x0038, require 0x0038 auth,authvalid,sa ikev2_cp_setaddr: pool configured, but IKEV2_CP_REQUEST missing ikev2_resp_recv: failed to send auth response sa_state: VALID -> CLOSED from 89.x.x.x:15384 to 178.x.x.x:4500 policy 'VPN HOME' ikev2_recv: closing SA sa_free: ispi 0x6fa80e0bb275c9db rspi 0x103d599e83dc26f7 config_free_proposals: free 0x1f27b6434380 config_free_proposals: free 0x1f283477de00 config_free_proposals: free 0x1f284fa6db00 ikev2_recv: IKE_AUTH request from initiator 89.x.x.x:15384 to 178.x.x.x:4500 policy 'VPN HOME' id 1, 272 bytes ikev2_recv: ispi 0x6fa80e0bb275c9db rspi 0x103d599e83dc26f7 ikev2_recv: IKE_AUTH request from initiator 89.x.x.x:15384 to 178.x.x.x:4500 policy 'VPN HOME' id 1, 272 bytes ikev2_recv: ispi 0x6fa80e0bb275c9db rspi 0x103d599e83dc26f7 ikev2_recv: IKE_AUTH request from initiator 89.x.x.x:15384 to 178.x.x.x:4500 policy 'VPN HOME' id 1, 272 bytes ikev2_recv: ispi 0x6fa80e0bb275c9db rspi 0x103d599e83dc26f7 ikev2_recv: IKE_AUTH request from initiator 89.x.x.x:15384 to 178.x.x.x:4500 policy 'VPN HOME' id 1, 272 bytes ikev2_recv: ispi 0x6fa80e0bb275c9db rspi 0x103d599e83dc26f7 Notebook [root@x131e jan]$ iked -dvv set_policy: could not find pubkey for /etc/iked/pubkeys/ipv4/178.x.x.x ikev2 "VPN HOME" active esp inet from 192.168.43.253 to 192.168.1.1 local any peer 178.x.x.x ikesa enc aes-256,aes-192,aes-128,3des prf hmac-sha2-256,hmac-sha1 auth hmac-sha2-256,hmac-sha1 group modp2048,modp1536,modp1024 childsa enc aes-256,aes-192,aes-128 auth hmac-sha2-256,hmac-sha1 lifetime 10800 bytes 536870912 psk key tag "VPN" /etc/iked.conf: loaded 1 configuration rules ca_privkey_serialize: type RSA_KEY length 1191 ca_pubkey_serialize: type RSA_KEY length 270 config_getpolicy: received policy ca_privkey_to_method: type RSA_KEY method RSA_SIG ca_getkey: received private key type RSA_KEY length 1191 ca_getkey: received public key type RSA_KEY length 270 ca_dispatch_parent: config reset config_getpfkey: received pfkey fd 3 config_getcompile: compilation done config_getsocket: received socket fd 4 config_getsocket: received socket fd 5 config_getsocket: received socket fd 6 config_getsocket: received socket fd 7 config_getmobike: mobike ca_reload: local cert type RSA_KEY config_getocsp: ocsp_url none ikev2_dispatch_cert: updated local CERTREQ type RSA_KEY length 0 ikev2_init_ike_sa: initiating "VPN HOME" ikev2_policy2id: srcid FQDN/x131e.void.net length 18 ikev2_add_proposals: length 108 ikev2_next_payload: length 112 nextpayload KE ikev2_next_payload: length 264 nextpayload NONCE ikev2_next_payload: length 36 nextpayload NOTIFY ikev2_nat_detection: local source 0x6fa80e0bb275c9db 0x0000000000000000 0.0.0.0:500 ikev2_next_payload: length 28 nextpayload NOTIFY ikev2_nat_detection: local destination 0x6fa80e0bb275c9db 0x0000000000000000 178.x.x.x:500 ikev2_next_payload: length 28 nextpayload NOTIFY ikev2_next_payload: length 14 nextpayload NONE ikev2_pld_parse: header ispi 0x6fa80e0bb275c9db rspi 0x0000000000000000 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x08 msgid 0 length 510 response 0 ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 112 ikev2_pld_sa: more 0 reserved 0 length 108 proposal #1 protoid IKE spisize 0 xforms 11 spi 0 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type ENCR id 3DES ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA1 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96 ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_2048 ikev2_pld_xform: more 3 reserved 0 length 8 type DH id MODP_1536 ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_1024 ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 ikev2_pld_ke: dh group MODP_2048 reserved 0 ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 14 ikev2_pld_notify: protoid NONE spisize 0 type SIGNATURE_HASH_ALGORITHMS ikev2_msg_send: IKE_SA_INIT request from 0.0.0.0:500 to 178.x.x.x:500 msgid 0, 510 bytes sa_state: INIT -> SA_INIT ikev2_recv: IKE_SA_INIT response from responder 178.x.x.x:500 to 192.168.43.253:500 policy 'VPN HOME' id 0, 446 bytes ikev2_recv: ispi 0x6fa80e0bb275c9db rspi 0x103d599e83dc26f7 ikev2_recv: updated SA to peer 178.x.x.x:500 local 192.168.43.253:500 ikev2_pld_parse: header ispi 0x6fa80e0bb275c9db rspi 0x103d599e83dc26f7 nextpayload SA version 0x20 exchange IKE_SA_INIT flags 0x20 msgid 0 length 446 response 1 ikev2_pld_payloads: payload SA nextpayload KE critical 0x00 length 48 ikev2_pld_sa: more 0 reserved 0 length 44 proposal #1 protoid IKE spisize 0 xforms 4 spi 0 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type PRF id HMAC_SHA2_256 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 0 reserved 0 length 8 type DH id MODP_2048 ikev2_pld_payloads: payload KE nextpayload NONCE critical 0x00 length 264 ikev2_pld_ke: dh group MODP_2048 reserved 0 ikev2_pld_payloads: payload NONCE nextpayload NOTIFY critical 0x00 length 36 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_SOURCE_IP ikev2_nat_detection: peer source 0x6fa80e0bb275c9db 0x103d599e83dc26f7 178.x.x.x:500 ikev2_pld_payloads: payload NOTIFY nextpayload NOTIFY critical 0x00 length 28 ikev2_pld_notify: protoid NONE spisize 0 type NAT_DETECTION_DESTINATION_IP ikev2_nat_detection: peer destination 0x6fa80e0bb275c9db 0x103d599e83dc26f7 192.168.43.253:500 ikev2_pld_notify: NAT_DETECTION_DESTINATION_IP detected NAT, enabling UDP encapsulation ikev2_pld_payloads: payload NOTIFY nextpayload NONE critical 0x00 length 14 ikev2_pld_notify: protoid NONE spisize 0 type SIGNATURE_HASH_ALGORITHMS ikev2_pld_notify: signature hash SHA2_256 (2) ikev2_pld_notify: signature hash SHA2_384 (3) ikev2_pld_notify: signature hash SHA2_512 (4) ikev2_init_recv: NAT detected, updated SA to peer 178.x.x.x:4500 local 192.168.43.253:4500 ikev2_sa_negotiate: score 4 sa_stateok: SA_INIT flags 0x0000, require 0x0008 auth ikev2_sa_keys: DHSECRET with 256 bytes ikev2_sa_keys: SKEYSEED with 32 bytes ikev2_sa_keys: S with 80 bytes ikev2_prfplus: T1 with 32 bytes ikev2_prfplus: T2 with 32 bytes ikev2_prfplus: T3 with 32 bytes ikev2_prfplus: T4 with 32 bytes ikev2_prfplus: T5 with 32 bytes ikev2_prfplus: T6 with 32 bytes ikev2_prfplus: T7 with 32 bytes ikev2_prfplus: Tn with 224 bytes ikev2_sa_keys: SK_d with 32 bytes ikev2_sa_keys: SK_ai with 32 bytes ikev2_sa_keys: SK_ar with 32 bytes ikev2_sa_keys: SK_ei with 32 bytes ikev2_sa_keys: SK_er with 32 bytes ikev2_sa_keys: SK_pi with 32 bytes ikev2_sa_keys: SK_pr with 32 bytes ikev2_msg_auth: initiator auth data length 574 sa_stateok: SA_INIT flags 0x0008, require 0x0008 auth ikev2_next_payload: length 22 nextpayload AUTH ikev2_next_payload: length 40 nextpayload SA pfkey_sa_getspi: spi 0x16998449 pfkey_sa_init: new spi 0x16998449 ikev2_add_proposals: length 80 ikev2_next_payload: length 84 nextpayload TSi ikev2_next_payload: length 24 nextpayload TSr ikev2_next_payload: length 24 nextpayload NONE ikev2_msg_encrypt: decrypted length 194 ikev2_msg_encrypt: padded length 208 ikev2_msg_encrypt: length 195, padding 13, output length 240 ikev2_next_payload: length 244 nextpayload IDi ikev2_msg_integr: message length 272 ikev2_msg_integr: integrity checksum length 16 ikev2_pld_parse: header ispi 0x6fa80e0bb275c9db rspi 0x103d599e83dc26f7 nextpayload SK version 0x20 exchange IKE_AUTH flags 0x08 msgid 1 length 272 response 0 ikev2_pld_payloads: payload SK nextpayload IDi critical 0x00 length 244 ikev2_msg_decrypt: IV length 16 ikev2_msg_decrypt: encrypted payload length 208 ikev2_msg_decrypt: integrity checksum length 16 ikev2_msg_decrypt: integrity check succeeded ikev2_msg_decrypt: decrypted payload length 208/208 padding 13 ikev2_pld_payloads: decrypted payload IDi nextpayload AUTH critical 0x00 length 22 ikev2_pld_id: id FQDN/x131e.void.net length 18 ikev2_pld_payloads: decrypted payload AUTH nextpayload SA critical 0x00 length 40 ikev2_pld_auth: method SHARED_KEY_MIC length 32 ikev2_pld_payloads: decrypted payload SA nextpayload TSi critical 0x00 length 84 ikev2_pld_sa: more 0 reserved 0 length 80 proposal #1 protoid ESP spisize 4 xforms 7 spi 0x16998449 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 256 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 192 total 4 ikev2_pld_xform: more 3 reserved 0 length 12 type ENCR id AES_CBC ikev2_pld_attr: attribute type KEY_LENGTH length 128 total 4 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA2_256_128 ikev2_pld_xform: more 3 reserved 0 length 8 type INTEGR id HMAC_SHA1_96 ikev2_pld_xform: more 3 reserved 0 length 8 type ESN id ESN ikev2_pld_xform: more 0 reserved 0 length 8 type ESN id NONE ikev2_pld_payloads: decrypted payload TSi nextpayload TSr critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.43.253 end 192.168.43.253 ikev2_pld_payloads: decrypted payload TSr nextpayload NONE critical 0x00 length 24 ikev2_pld_ts: count 1 length 16 ikev2_pld_ts: type IPV4_ADDR_RANGE protoid 0 length 16 startport 0 endport 65535 ikev2_pld_ts: start 192.168.1.1 end 192.168.1.1 ikev2_msg_send: IKE_AUTH request from 192.168.43.253:4500 to 178.x.x.x:4500 msgid 1, 272 bytes, NAT-T config_free_proposals: free 0x19f32f68ea00