Guest User

Untitled

a guest
Dec 20th, 2017
133
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 74.53 KB | None | 0 0
  1. Nov 29 02:56:27 raspberrypi systemd-logind[346]: New seat seat0.
  2. Nov 29 02:56:37 raspberrypi login[445]: pam_unix(login:session): session opened for user pi by LOGIN(uid=0)
  3. Nov 29 02:56:37 raspberrypi systemd-logind[346]: New session c1 of user pi.
  4. Nov 29 02:56:37 raspberrypi systemd: pam_unix(systemd-user:session): session opened for user pi by (uid=0)
  5. Nov 29 02:57:17 raspberrypi lightdm: pam_unix(lightdm-autologin:session): session opened for user pi by (uid=0)
  6. Nov 29 02:57:17 raspberrypi systemd-logind[346]: New session c2 of user pi.
  7. Nov 29 02:57:20 raspberrypi polkitd(authority=local): Registered Authentication Agent for unix-session:c2 (system bus name :1.15 [lxpolkit], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_GB.UTF-8)
  8. Dec 19 19:50:20 raspberrypi sudo: pi : TTY=unknown ; PWD=/home/pi ; USER=root ; COMMAND=/usr/bin/rc_gui
  9. Dec 19 19:50:20 raspberrypi sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
  10. Dec 19 19:57:32 raspberrypi sudo: pam_unix(sudo:session): session closed for user root
  11. Dec 19 19:59:31 raspberrypi su[2896]: pam_unix(su:auth): authentication failure; logname= uid=1000 euid=0 tty=/dev/pts/0 ruser=pi rhost= user=root
  12. Dec 19 19:59:33 raspberrypi su[2896]: pam_authenticate: Authentication failure
  13. Dec 19 19:59:33 raspberrypi su[2896]: FAILED su for root by pi
  14. Dec 19 19:59:33 raspberrypi su[2896]: - /dev/pts/0 pi:root
  15. Dec 19 19:59:40 raspberrypi su[2900]: pam_unix(su:auth): authentication failure; logname= uid=1000 euid=0 tty=/dev/pts/0 ruser=pi rhost= user=root
  16. Dec 19 19:59:42 raspberrypi su[2900]: pam_authenticate: Authentication failure
  17. Dec 19 19:59:42 raspberrypi su[2900]: FAILED su for root by pi
  18. Dec 19 19:59:42 raspberrypi su[2900]: - /dev/pts/0 pi:root
  19. Dec 19 19:59:54 raspberrypi sudo: pi : TTY=pts/0 ; PWD=/home/pi ; USER=root ; COMMAND=/usr/bin/passwd
  20. Dec 19 19:59:54 raspberrypi sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
  21. Dec 19 20:00:12 raspberrypi passwd[2910]: pam_unix(passwd:chauthtok): password changed for root
  22. Dec 19 20:00:12 raspberrypi sudo: pam_unix(sudo:session): session closed for user root
  23. Dec 19 20:00:20 raspberrypi su[2916]: Successful su for root by pi
  24. Dec 19 20:00:20 raspberrypi su[2916]: + /dev/pts/0 pi:root
  25. Dec 19 20:00:20 raspberrypi su[2916]: pam_unix(su:session): session opened for user root by (uid=1000)
  26. Dec 19 20:00:20 raspberrypi su[2916]: pam_systemd(su:session): Cannot create session: Already running in a session
  27. Dec 19 20:03:35 raspberrypi ipsec__plutorun: Starting Pluto subsystem...
  28. Dec 19 20:03:36 raspberrypi pluto[4115]: Starting Pluto (Openswan Version 2.6.38; Vendor ID OEvy\134kgzWq\134s) pid:4115
  29. Dec 19 20:03:36 raspberrypi pluto[4115]: LEAK_DETECTIVE support [disabled]
  30. Dec 19 20:03:36 raspberrypi pluto[4115]: OCF support for IKE [disabled]
  31. Dec 19 20:03:36 raspberrypi pluto[4115]: SAref support [disabled]: Protocol not available
  32. Dec 19 20:03:36 raspberrypi pluto[4115]: SAbind support [disabled]: Protocol not available
  33. Dec 19 20:03:36 raspberrypi pluto[4115]: NSS support [disabled]
  34. Dec 19 20:03:36 raspberrypi pluto[4115]: HAVE_STATSD notification support not compiled in
  35. Dec 19 20:03:36 raspberrypi pluto[4115]: Setting NAT-Traversal port-4500 floating to on
  36. Dec 19 20:03:36 raspberrypi pluto[4115]: port floating activation criteria nat_t=1/port_float=1
  37. Dec 19 20:03:36 raspberrypi pluto[4115]: NAT-Traversal support [enabled]
  38. Dec 19 20:03:36 raspberrypi pluto[4115]: using /dev/urandom as source of random entropy
  39. Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
  40. Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
  41. Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
  42. Dec 19 20:03:36 raspberrypi pluto[4115]: starting up 3 cryptographic helpers
  43. Dec 19 20:03:36 raspberrypi pluto[4115]: started helper pid=4121 (fd:6)
  44. Dec 19 20:03:36 raspberrypi pluto[4115]: started helper pid=4122 (fd:7)
  45. Dec 19 20:03:36 raspberrypi pluto[4115]: started helper pid=4123 (fd:8)
  46. Dec 19 20:03:36 raspberrypi pluto[4121]: using /dev/urandom as source of random entropy
  47. Dec 19 20:03:36 raspberrypi pluto[4115]: Kernel interface auto-pick
  48. Dec 19 20:03:36 raspberrypi pluto[4115]: Using Linux 2.6 IPsec interface code on 4.9.59-v7+ (experimental code)
  49. Dec 19 20:03:36 raspberrypi pluto[4122]: using /dev/urandom as source of random entropy
  50. Dec 19 20:03:36 raspberrypi pluto[4123]: using /dev/urandom as source of random entropy
  51. Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_enc(): Activating aes_ccm_8: Ok (ret=0)
  52. Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
  53. Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_enc(): Activating aes_ccm_12: FAILED (ret=-17)
  54. Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
  55. Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_enc(): Activating aes_ccm_16: FAILED (ret=-17)
  56. Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
  57. Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_enc(): Activating aes_gcm_8: FAILED (ret=-17)
  58. Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
  59. Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_enc(): Activating aes_gcm_12: FAILED (ret=-17)
  60. Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
  61. Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_enc(): Activating aes_gcm_16: FAILED (ret=-17)
  62. Dec 19 20:03:36 raspberrypi pluto[4115]: listening for IKE messages
  63. Dec 19 20:03:36 raspberrypi pluto[4115]: adding interface eth0/eth0 192.168.1.60:500
  64. Dec 19 20:03:36 raspberrypi pluto[4115]: adding interface eth0/eth0 192.168.1.60:4500
  65. Dec 19 20:03:36 raspberrypi pluto[4115]: adding interface lo/lo 127.0.0.1:500
  66. Dec 19 20:03:36 raspberrypi pluto[4115]: adding interface lo/lo 127.0.0.1:4500
  67. Dec 19 20:03:36 raspberrypi pluto[4115]: adding interface lo/lo ::1:500
  68. Dec 19 20:03:36 raspberrypi pluto[4115]: loading secrets from "/etc/ipsec.secrets"
  69. Dec 19 20:03:36 raspberrypi pluto[4115]: loading secrets from "/var/lib/openswan/ipsec.secrets.inc"
  70. Dec 19 20:03:36 raspberrypi pluto[4115]: loaded private key file '/etc/ipsec.d/private/raspberrypiKey.pem' (1708 bytes)
  71. Dec 19 20:03:36 raspberrypi pluto[4115]: error in PKCS#1 private key
  72. Dec 19 20:03:36 raspberrypi pluto[4115]: "/var/lib/openswan/ipsec.secrets.inc" line 1: error loading RSA private key file
  73. Dec 19 20:17:01 raspberrypi CRON[4496]: pam_unix(cron:session): session opened for user root by (uid=0)
  74. Dec 19 20:17:01 raspberrypi CRON[4496]: pam_unix(cron:session): session closed for user root
  75. Dec 19 20:22:02 raspberrypi pluto[4115]: shutting down
  76. Dec 19 20:22:02 raspberrypi pluto[4115]: shutting down interface lo/lo ::1:500
  77. Dec 19 20:22:02 raspberrypi pluto[4115]: shutting down interface lo/lo 127.0.0.1:4500
  78. Dec 19 20:22:02 raspberrypi pluto[4115]: shutting down interface lo/lo 127.0.0.1:500
  79. Dec 19 20:22:02 raspberrypi pluto[4115]: shutting down interface eth0/eth0 192.168.1.60:4500
  80. Dec 19 20:22:02 raspberrypi pluto[4115]: shutting down interface eth0/eth0 192.168.1.60:500
  81. Dec 19 20:22:02 raspberrypi pluto[4123]: pluto_crypto_helper: helper (2) is normal exiting
  82. Dec 19 20:22:02 raspberrypi pluto[4122]: pluto_crypto_helper: helper (1) is normal exiting
  83. Dec 19 20:22:02 raspberrypi pluto[4121]: pluto_crypto_helper: helper (0) is normal exiting
  84. Dec 19 20:22:05 raspberrypi ipsec__plutorun: Starting Pluto subsystem...
  85. Dec 19 20:22:05 raspberrypi pluto[4906]: Starting Pluto (Openswan Version 2.6.38; Vendor ID OEvy\134kgzWq\134s) pid:4906
  86. Dec 19 20:22:05 raspberrypi pluto[4906]: LEAK_DETECTIVE support [disabled]
  87. Dec 19 20:22:05 raspberrypi pluto[4906]: OCF support for IKE [disabled]
  88. Dec 19 20:22:05 raspberrypi pluto[4906]: SAref support [disabled]: Protocol not available
  89. Dec 19 20:22:05 raspberrypi pluto[4906]: SAbind support [disabled]: Protocol not available
  90. Dec 19 20:22:05 raspberrypi pluto[4906]: NSS support [disabled]
  91. Dec 19 20:22:05 raspberrypi pluto[4906]: HAVE_STATSD notification support not compiled in
  92. Dec 19 20:22:05 raspberrypi pluto[4906]: Setting NAT-Traversal port-4500 floating to on
  93. Dec 19 20:22:05 raspberrypi pluto[4906]: port floating activation criteria nat_t=1/port_float=1
  94. Dec 19 20:22:05 raspberrypi pluto[4906]: NAT-Traversal support [enabled]
  95. Dec 19 20:22:05 raspberrypi pluto[4906]: fail in ttosubnet ?
  96. Dec 19 20:22:05 raspberrypi pluto[4906]: 1 bad entries in virtual_private - none loaded
  97. Dec 19 20:22:05 raspberrypi pluto[4906]: using /dev/urandom as source of random entropy
  98. Dec 19 20:22:05 raspberrypi pluto[4906]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
  99. Dec 19 20:22:05 raspberrypi pluto[4906]: ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
  100. Dec 19 20:22:05 raspberrypi pluto[4906]: ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
  101. Dec 19 20:22:05 raspberrypi pluto[4906]: starting up 3 cryptographic helpers
  102. Dec 19 20:22:05 raspberrypi pluto[4906]: started helper pid=4910 (fd:6)
  103. Dec 19 20:22:05 raspberrypi pluto[4906]: started helper pid=4911 (fd:7)
  104. Dec 19 20:22:05 raspberrypi pluto[4906]: started helper pid=4912 (fd:8)
  105. Dec 19 20:22:05 raspberrypi pluto[4906]: Using Linux 2.6 IPsec interface code on 4.9.59-v7+ (experimental code)
  106. Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_register_enc(): Activating aes_ccm_8: Ok (ret=0)
  107. Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
  108. Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_register_enc(): Activating aes_ccm_12: FAILED (ret=-17)
  109. Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
  110. Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_register_enc(): Activating aes_ccm_16: FAILED (ret=-17)
  111. Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
  112. Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_register_enc(): Activating aes_gcm_8: FAILED (ret=-17)
  113. Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
  114. Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_register_enc(): Activating aes_gcm_12: FAILED (ret=-17)
  115. Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
  116. Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_register_enc(): Activating aes_gcm_16: FAILED (ret=-17)
  117. Dec 19 20:22:06 raspberrypi pluto[4912]: using /dev/urandom as source of random entropy
  118. Dec 19 20:22:06 raspberrypi pluto[4910]: using /dev/urandom as source of random entropy
  119. Dec 19 20:22:06 raspberrypi pluto[4911]: using /dev/urandom as source of random entropy
  120. Dec 19 20:22:06 raspberrypi pluto[4906]: added connection description "L2TP-PSK-NAT"
  121. Dec 19 20:22:06 raspberrypi pluto[4906]: added connection description "L2TP-PSK-noNAT"
  122. Dec 19 20:22:06 raspberrypi pluto[4906]: added connection description "passthrough-for-non-l2tp"
  123. Dec 19 20:22:06 raspberrypi pluto[4906]: listening for IKE messages
  124. Dec 19 20:22:06 raspberrypi pluto[4906]: adding interface eth0/eth0 192.168.1.15:500
  125. Dec 19 20:22:06 raspberrypi pluto[4906]: adding interface eth0/eth0 192.168.1.15:4500
  126. Dec 19 20:22:06 raspberrypi pluto[4906]: adding interface eth0/eth0 192.168.1.60:500
  127. Dec 19 20:22:06 raspberrypi pluto[4906]: adding interface eth0/eth0 192.168.1.60:4500
  128. Dec 19 20:22:06 raspberrypi pluto[4906]: adding interface lo/lo 127.0.0.1:500
  129. Dec 19 20:22:06 raspberrypi pluto[4906]: adding interface lo/lo 127.0.0.1:4500
  130. Dec 19 20:22:06 raspberrypi pluto[4906]: adding interface lo/lo ::1:500
  131. Dec 19 20:22:06 raspberrypi pluto[4906]: loading secrets from "/etc/ipsec.secrets"
  132. Dec 19 20:22:06 raspberrypi pluto[4906]: loading secrets from "/var/lib/openswan/ipsec.secrets.inc"
  133. Dec 19 20:22:06 raspberrypi pluto[4906]: loaded private key file '/etc/ipsec.d/private/raspberrypiKey.pem' (1708 bytes)
  134. Dec 19 20:22:06 raspberrypi pluto[4906]: error in PKCS#1 private key
  135. Dec 19 20:22:06 raspberrypi pluto[4906]: "/var/lib/openswan/ipsec.secrets.inc" line 1: error loading RSA private key file
  136. Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [RFC 3947] method set to=115
  137. Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] meth=114, but already using method 115
  138. Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-08] meth=113, but already using method 115
  139. Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-07] meth=112, but already using method 115
  140. Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-06] meth=111, but already using method 115
  141. Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-05] meth=110, but already using method 115
  142. Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-04] meth=109, but already using method 115
  143. Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
  144. Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
  145. Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
  146. Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
  147. Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [Dead Peer Detection]
  148. Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: responding to Main Mode from unknown peer 192.168.1.229
  149. Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
  150. Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: STATE_MAIN_R1: sent MR1, expecting MI2
  151. Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
  152. Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
  153. Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: STATE_MAIN_R2: sent MR2, expecting MI3
  154. Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: next payload type of ISAKMP Identification Payload has an unknown value: 61
  155. Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  156. Dec 19 20:30:32 raspberrypi pluto[4906]: | payload malformed after IV
  157. Dec 19 20:30:32 raspberrypi pluto[4906]: | 6d da dd e6 b9 3d f3 5e 3c 08 39 06 ea 25 cf 52
  158. Dec 19 20:30:32 raspberrypi pluto[4906]: | 6c 87 0e eb 6e 34 88 11 8f a0 d2 28 9e 49 ee 21
  159. Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  160. Dec 19 20:30:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: next payload type of ISAKMP Identification Payload has an unknown value: 61
  161. Dec 19 20:30:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  162. Dec 19 20:30:36 raspberrypi pluto[4906]: | payload malformed after IV
  163. Dec 19 20:30:36 raspberrypi pluto[4906]: | 6d da dd e6 b9 3d f3 5e 3c 08 39 06 ea 25 cf 52
  164. Dec 19 20:30:36 raspberrypi pluto[4906]: | 6c 87 0e eb 6e 34 88 11 8f a0 d2 28 9e 49 ee 21
  165. Dec 19 20:30:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  166. Dec 19 20:30:39 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: next payload type of ISAKMP Identification Payload has an unknown value: 61
  167. Dec 19 20:30:39 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  168. Dec 19 20:30:39 raspberrypi pluto[4906]: | payload malformed after IV
  169. Dec 19 20:30:39 raspberrypi pluto[4906]: | 6d da dd e6 b9 3d f3 5e 3c 08 39 06 ea 25 cf 52
  170. Dec 19 20:30:39 raspberrypi pluto[4906]: | 6c 87 0e eb 6e 34 88 11 8f a0 d2 28 9e 49 ee 21
  171. Dec 19 20:30:39 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  172. Dec 19 20:30:42 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: next payload type of ISAKMP Identification Payload has an unknown value: 61
  173. Dec 19 20:30:42 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  174. Dec 19 20:30:42 raspberrypi pluto[4906]: | payload malformed after IV
  175. Dec 19 20:30:42 raspberrypi pluto[4906]: | 6d da dd e6 b9 3d f3 5e 3c 08 39 06 ea 25 cf 52
  176. Dec 19 20:30:42 raspberrypi pluto[4906]: | 6c 87 0e eb 6e 34 88 11 8f a0 d2 28 9e 49 ee 21
  177. Dec 19 20:30:42 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  178. Dec 19 20:30:42 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: next payload type of ISAKMP Identification Payload has an unknown value: 61
  179. Dec 19 20:30:42 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  180. Dec 19 20:30:54 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: next payload type of ISAKMP Identification Payload has an unknown value: 61
  181. Dec 19 20:30:54 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  182. Dec 19 20:30:54 raspberrypi pluto[4906]: | payload malformed after IV
  183. Dec 19 20:30:54 raspberrypi pluto[4906]: | 6d da dd e6 b9 3d f3 5e 3c 08 39 06 ea 25 cf 52
  184. Dec 19 20:30:54 raspberrypi pluto[4906]: | 6c 87 0e eb 6e 34 88 11 8f a0 d2 28 9e 49 ee 21
  185. Dec 19 20:30:54 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  186. Dec 19 20:31:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: next payload type of ISAKMP Identification Payload has an unknown value: 61
  187. Dec 19 20:31:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  188. Dec 19 20:31:02 raspberrypi pluto[4906]: | payload malformed after IV
  189. Dec 19 20:31:02 raspberrypi pluto[4906]: | 6d da dd e6 b9 3d f3 5e 3c 08 39 06 ea 25 cf 52
  190. Dec 19 20:31:02 raspberrypi pluto[4906]: | 6c 87 0e eb 6e 34 88 11 8f a0 d2 28 9e 49 ee 21
  191. Dec 19 20:31:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  192. Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [RFC 3947] method set to=115
  193. Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] meth=114, but already using method 115
  194. Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-08] meth=113, but already using method 115
  195. Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-07] meth=112, but already using method 115
  196. Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-06] meth=111, but already using method 115
  197. Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-05] meth=110, but already using method 115
  198. Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-04] meth=109, but already using method 115
  199. Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
  200. Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
  201. Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
  202. Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
  203. Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [Dead Peer Detection]
  204. Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: responding to Main Mode from unknown peer 192.168.1.229
  205. Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
  206. Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: STATE_MAIN_R1: sent MR1, expecting MI2
  207. Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
  208. Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
  209. Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: STATE_MAIN_R2: sent MR2, expecting MI3
  210. Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
  211. Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: Main mode peer ID is ID_IPV4_ADDR: '192.168.1.229'
  212. Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
  213. Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: new NAT mapping for #2, was 192.168.1.229:500, now 192.168.1.229:4500
  214. Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=OAKLEY_SHA2_256 group=modp2048}
  215. Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: Dead Peer Detection (RFC 3706): enabled
  216. Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: the peer proposed: 192.168.1.15/32:17/1701 -> 192.168.1.229/32:17/0
  217. Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: peer proposal was reject in a virtual connection policy because:
  218. Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: a private network virtual IP was required, but the proposed IP did not match our list (virtual_private=)
  219. Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: NAT-Traversal: received 2 NAT-OA. using first, ignoring others
  220. Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-noNAT"[1] 192.168.1.229 #3: responding to Quick Mode proposal {msgid:b8b07ddb}
  221. Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-noNAT"[1] 192.168.1.229 #3: us: 192.168.1.15<192.168.1.15>:17/1701
  222. Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-noNAT"[1] 192.168.1.229 #3: them: 192.168.1.229:17/53417
  223. Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-noNAT"[1] 192.168.1.229 #3: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
  224. Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-noNAT"[1] 192.168.1.229 #3: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
  225. Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-noNAT"[1] 192.168.1.229 #3: Dead Peer Detection (RFC 3706): enabled
  226. Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-noNAT"[1] 192.168.1.229 #3: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
  227. Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-noNAT"[1] 192.168.1.229 #3: STATE_QUICK_R2: IPsec SA established transport mode {ESP/NAT=>0x005c13e6 <0xa55becf4 xfrm=AES_256-HMAC_SHA1 NATOA=192.168.1.229 NATD=192.168.1.229:4500 DPD=enable}
  228. Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: received Delete SA(0x005c13e6) payload: deleting IPSEC State #3
  229. Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: deleting connection "L2TP-PSK-noNAT" instance with peer 192.168.1.229 {isakmp=#0/ipsec=#0}
  230. Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: received and ignored informational message
  231. Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: received Delete SA payload: deleting ISAKMP State #2
  232. Dec 19 20:31:38 raspberrypi pluto[4906]: packet from 192.168.1.229:4500: received and ignored informational message
  233. Dec 19 20:31:42 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: max number of retransmissions (2) reached STATE_MAIN_R2
  234. Dec 19 20:31:42 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.1.229 {isakmp=#0/ipsec=#0}
  235. Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [RFC 3947] method set to=115
  236. Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] meth=114, but already using method 115
  237. Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-08] meth=113, but already using method 115
  238. Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-07] meth=112, but already using method 115
  239. Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-06] meth=111, but already using method 115
  240. Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-05] meth=110, but already using method 115
  241. Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-04] meth=109, but already using method 115
  242. Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
  243. Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
  244. Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
  245. Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
  246. Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [Dead Peer Detection]
  247. Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: responding to Main Mode from unknown peer 192.168.1.229
  248. Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
  249. Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: STATE_MAIN_R1: sent MR1, expecting MI2
  250. Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
  251. Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
  252. Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: STATE_MAIN_R2: sent MR2, expecting MI3
  253. Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: next payload type of ISAKMP Identification Payload has an unknown value: 206
  254. Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  255. Dec 19 20:32:08 raspberrypi pluto[4906]: | payload malformed after IV
  256. Dec 19 20:32:08 raspberrypi pluto[4906]: | f7 85 51 ad 68 fc 04 ff 8f f3 98 67 bd bc be c7
  257. Dec 19 20:32:08 raspberrypi pluto[4906]: | d9 c3 d1 95 26 b0 c3 6e 34 f9 04 5c 98 aa 45 29
  258. Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  259. Dec 19 20:32:11 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: next payload type of ISAKMP Identification Payload has an unknown value: 206
  260. Dec 19 20:32:11 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  261. Dec 19 20:32:11 raspberrypi pluto[4906]: | payload malformed after IV
  262. Dec 19 20:32:11 raspberrypi pluto[4906]: | f7 85 51 ad 68 fc 04 ff 8f f3 98 67 bd bc be c7
  263. Dec 19 20:32:11 raspberrypi pluto[4906]: | d9 c3 d1 95 26 b0 c3 6e 34 f9 04 5c 98 aa 45 29
  264. Dec 19 20:32:11 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  265. Dec 19 20:32:14 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: next payload type of ISAKMP Identification Payload has an unknown value: 206
  266. Dec 19 20:32:14 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  267. Dec 19 20:32:14 raspberrypi pluto[4906]: | payload malformed after IV
  268. Dec 19 20:32:14 raspberrypi pluto[4906]: | f7 85 51 ad 68 fc 04 ff 8f f3 98 67 bd bc be c7
  269. Dec 19 20:32:14 raspberrypi pluto[4906]: | d9 c3 d1 95 26 b0 c3 6e 34 f9 04 5c 98 aa 45 29
  270. Dec 19 20:32:14 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  271. Dec 19 20:32:18 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: next payload type of ISAKMP Identification Payload has an unknown value: 206
  272. Dec 19 20:32:18 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  273. Dec 19 20:32:18 raspberrypi pluto[4906]: | payload malformed after IV
  274. Dec 19 20:32:18 raspberrypi pluto[4906]: | f7 85 51 ad 68 fc 04 ff 8f f3 98 67 bd bc be c7
  275. Dec 19 20:32:18 raspberrypi pluto[4906]: | d9 c3 d1 95 26 b0 c3 6e 34 f9 04 5c 98 aa 45 29
  276. Dec 19 20:32:18 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  277. Dec 19 20:32:18 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: next payload type of ISAKMP Identification Payload has an unknown value: 206
  278. Dec 19 20:32:18 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  279. Dec 19 20:32:31 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: next payload type of ISAKMP Identification Payload has an unknown value: 206
  280. Dec 19 20:32:31 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  281. Dec 19 20:32:31 raspberrypi pluto[4906]: | payload malformed after IV
  282. Dec 19 20:32:31 raspberrypi pluto[4906]: | f7 85 51 ad 68 fc 04 ff 8f f3 98 67 bd bc be c7
  283. Dec 19 20:32:31 raspberrypi pluto[4906]: | d9 c3 d1 95 26 b0 c3 6e 34 f9 04 5c 98 aa 45 29
  284. Dec 19 20:32:31 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  285. Dec 19 20:32:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: next payload type of ISAKMP Identification Payload has an unknown value: 206
  286. Dec 19 20:32:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  287. Dec 19 20:32:38 raspberrypi pluto[4906]: | payload malformed after IV
  288. Dec 19 20:32:38 raspberrypi pluto[4906]: | f7 85 51 ad 68 fc 04 ff 8f f3 98 67 bd bc be c7
  289. Dec 19 20:32:38 raspberrypi pluto[4906]: | d9 c3 d1 95 26 b0 c3 6e 34 f9 04 5c 98 aa 45 29
  290. Dec 19 20:32:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  291. Dec 19 20:33:18 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: max number of retransmissions (2) reached STATE_MAIN_R2
  292. Dec 19 20:33:18 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.1.229 {isakmp=#0/ipsec=#0}
  293. Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [RFC 3947] method set to=115
  294. Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] meth=114, but already using method 115
  295. Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-08] meth=113, but already using method 115
  296. Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-07] meth=112, but already using method 115
  297. Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-06] meth=111, but already using method 115
  298. Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-05] meth=110, but already using method 115
  299. Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-04] meth=109, but already using method 115
  300. Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
  301. Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
  302. Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
  303. Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
  304. Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [Dead Peer Detection]
  305. Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: responding to Main Mode from unknown peer 192.168.1.229
  306. Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
  307. Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: STATE_MAIN_R1: sent MR1, expecting MI2
  308. Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
  309. Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
  310. Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: STATE_MAIN_R2: sent MR2, expecting MI3
  311. Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: next payload type of ISAKMP Identification Payload has an unknown value: 172
  312. Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  313. Dec 19 20:44:33 raspberrypi pluto[4906]: | payload malformed after IV
  314. Dec 19 20:44:33 raspberrypi pluto[4906]: | ac 08 f3 a0 31 6d 5c c0 78 64 42 b3 15 ec 1e 3c
  315. Dec 19 20:44:33 raspberrypi pluto[4906]: | f3 65 03 24 1c a3 45 e5 1b ba 59 2f c1 09 a6 ec
  316. Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  317. Dec 19 20:44:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: next payload type of ISAKMP Identification Payload has an unknown value: 172
  318. Dec 19 20:44:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  319. Dec 19 20:44:36 raspberrypi pluto[4906]: | payload malformed after IV
  320. Dec 19 20:44:36 raspberrypi pluto[4906]: | ac 08 f3 a0 31 6d 5c c0 78 64 42 b3 15 ec 1e 3c
  321. Dec 19 20:44:36 raspberrypi pluto[4906]: | f3 65 03 24 1c a3 45 e5 1b ba 59 2f c1 09 a6 ec
  322. Dec 19 20:44:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  323. Dec 19 20:44:39 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: next payload type of ISAKMP Identification Payload has an unknown value: 172
  324. Dec 19 20:44:39 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  325. Dec 19 20:44:39 raspberrypi pluto[4906]: | payload malformed after IV
  326. Dec 19 20:44:39 raspberrypi pluto[4906]: | ac 08 f3 a0 31 6d 5c c0 78 64 42 b3 15 ec 1e 3c
  327. Dec 19 20:44:39 raspberrypi pluto[4906]: | f3 65 03 24 1c a3 45 e5 1b ba 59 2f c1 09 a6 ec
  328. Dec 19 20:44:39 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  329. Dec 19 20:44:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: next payload type of ISAKMP Identification Payload has an unknown value: 172
  330. Dec 19 20:44:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  331. Dec 19 20:44:43 raspberrypi pluto[4906]: | payload malformed after IV
  332. Dec 19 20:44:43 raspberrypi pluto[4906]: | ac 08 f3 a0 31 6d 5c c0 78 64 42 b3 15 ec 1e 3c
  333. Dec 19 20:44:43 raspberrypi pluto[4906]: | f3 65 03 24 1c a3 45 e5 1b ba 59 2f c1 09 a6 ec
  334. Dec 19 20:44:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  335. Dec 19 20:44:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: next payload type of ISAKMP Identification Payload has an unknown value: 172
  336. Dec 19 20:44:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  337. Dec 19 20:44:55 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: next payload type of ISAKMP Identification Payload has an unknown value: 172
  338. Dec 19 20:44:55 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  339. Dec 19 20:44:55 raspberrypi pluto[4906]: | payload malformed after IV
  340. Dec 19 20:44:55 raspberrypi pluto[4906]: | ac 08 f3 a0 31 6d 5c c0 78 64 42 b3 15 ec 1e 3c
  341. Dec 19 20:44:55 raspberrypi pluto[4906]: | f3 65 03 24 1c a3 45 e5 1b ba 59 2f c1 09 a6 ec
  342. Dec 19 20:44:55 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
  343. Dec 19 20:45:04 raspberrypi pluto[4906]: ERROR: asynchronous network error report on eth0 (sport=500) for message to 192.168.1.229 port 500, complainant 192.168.1.229: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)]
  344. Dec 19 20:45:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: max number of retransmissions (2) reached STATE_MAIN_R2
  345. Dec 19 20:45:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.1.229 {isakmp=#0/ipsec=#0}
  346. Dec 19 20:48:12 raspberrypi pluto[4906]: | no connection found
  347. Dec 19 20:48:12 raspberrypi pluto[4906]: packet from 192.168.1.106:500: sending notification v2N_NO_PROPOSAL_CHOSEN to 192.168.1.106:500
  348. Dec 19 20:48:15 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring unknown Vendor ID payload [01528bbbc00696121849ab9a1c5b2a5100000001]
  349. Dec 19 20:48:15 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000009]
  350. Dec 19 20:48:15 raspberrypi pluto[4906]: packet from 192.168.1.106:500: received Vendor ID payload [RFC 3947] method set to=115
  351. Dec 19 20:48:15 raspberrypi pluto[4906]: packet from 192.168.1.106:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
  352. Dec 19 20:48:15 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [FRAGMENTATION]
  353. Dec 19 20:48:15 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [MS-Negotiation Discovery Capable]
  354. Dec 19 20:48:15 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [Vid-Initial-Contact]
  355. Dec 19 20:48:15 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [IKE CGA version 1]
  356. Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: responding to Main Mode from unknown peer 192.168.1.106
  357. Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: OAKLEY_GROUP 20 not supported. Attribute OAKLEY_GROUP_DESCRIPTION
  358. Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: OAKLEY_GROUP 19 not supported. Attribute OAKLEY_GROUP_DESCRIPTION
  359. Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
  360. Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: STATE_MAIN_R1: sent MR1, expecting MI2
  361. Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
  362. Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
  363. Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: STATE_MAIN_R2: sent MR2, expecting MI3
  364. Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  365. Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  366. Dec 19 20:48:15 raspberrypi pluto[4906]: | payload malformed after IV
  367. Dec 19 20:48:15 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
  368. Dec 19 20:48:15 raspberrypi pluto[4906]: | d4 a3 ab 97
  369. Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  370. Dec 19 20:48:16 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  371. Dec 19 20:48:16 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  372. Dec 19 20:48:16 raspberrypi pluto[4906]: | payload malformed after IV
  373. Dec 19 20:48:16 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
  374. Dec 19 20:48:16 raspberrypi pluto[4906]: | d4 a3 ab 97
  375. Dec 19 20:48:16 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  376. Dec 19 20:48:17 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  377. Dec 19 20:48:17 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  378. Dec 19 20:48:17 raspberrypi pluto[4906]: | payload malformed after IV
  379. Dec 19 20:48:17 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
  380. Dec 19 20:48:17 raspberrypi pluto[4906]: | d4 a3 ab 97
  381. Dec 19 20:48:17 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  382. Dec 19 20:48:20 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  383. Dec 19 20:48:20 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  384. Dec 19 20:48:20 raspberrypi pluto[4906]: | payload malformed after IV
  385. Dec 19 20:48:20 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
  386. Dec 19 20:48:20 raspberrypi pluto[4906]: | d4 a3 ab 97
  387. Dec 19 20:48:20 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  388. Dec 19 20:48:23 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  389. Dec 19 20:48:23 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  390. Dec 19 20:48:23 raspberrypi pluto[4906]: | payload malformed after IV
  391. Dec 19 20:48:23 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
  392. Dec 19 20:48:23 raspberrypi pluto[4906]: | d4 a3 ab 97
  393. Dec 19 20:48:23 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  394. Dec 19 20:48:26 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  395. Dec 19 20:48:26 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  396. Dec 19 20:48:26 raspberrypi pluto[4906]: | payload malformed after IV
  397. Dec 19 20:48:26 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
  398. Dec 19 20:48:26 raspberrypi pluto[4906]: | d4 a3 ab 97
  399. Dec 19 20:48:26 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  400. Dec 19 20:48:29 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  401. Dec 19 20:48:29 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  402. Dec 19 20:48:29 raspberrypi pluto[4906]: | payload malformed after IV
  403. Dec 19 20:48:29 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
  404. Dec 19 20:48:29 raspberrypi pluto[4906]: | d4 a3 ab 97
  405. Dec 19 20:48:29 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  406. Dec 19 20:48:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  407. Dec 19 20:48:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  408. Dec 19 20:48:32 raspberrypi pluto[4906]: | payload malformed after IV
  409. Dec 19 20:48:32 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
  410. Dec 19 20:48:32 raspberrypi pluto[4906]: | d4 a3 ab 97
  411. Dec 19 20:48:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  412. Dec 19 20:48:35 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  413. Dec 19 20:48:35 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  414. Dec 19 20:48:35 raspberrypi pluto[4906]: | payload malformed after IV
  415. Dec 19 20:48:35 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
  416. Dec 19 20:48:35 raspberrypi pluto[4906]: | d4 a3 ab 97
  417. Dec 19 20:48:35 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  418. Dec 19 20:48:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  419. Dec 19 20:48:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  420. Dec 19 20:48:38 raspberrypi pluto[4906]: | payload malformed after IV
  421. Dec 19 20:48:38 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
  422. Dec 19 20:48:38 raspberrypi pluto[4906]: | d4 a3 ab 97
  423. Dec 19 20:48:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  424. Dec 19 20:48:41 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  425. Dec 19 20:48:41 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  426. Dec 19 20:48:41 raspberrypi pluto[4906]: | payload malformed after IV
  427. Dec 19 20:48:41 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
  428. Dec 19 20:48:41 raspberrypi pluto[4906]: | d4 a3 ab 97
  429. Dec 19 20:48:41 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  430. Dec 19 20:48:44 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  431. Dec 19 20:48:44 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  432. Dec 19 20:48:44 raspberrypi pluto[4906]: | payload malformed after IV
  433. Dec 19 20:48:44 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
  434. Dec 19 20:48:44 raspberrypi pluto[4906]: | d4 a3 ab 97
  435. Dec 19 20:48:44 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  436. Dec 19 20:48:47 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  437. Dec 19 20:48:47 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  438. Dec 19 20:48:47 raspberrypi pluto[4906]: | payload malformed after IV
  439. Dec 19 20:48:47 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
  440. Dec 19 20:48:47 raspberrypi pluto[4906]: | d4 a3 ab 97
  441. Dec 19 20:48:47 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  442. Dec 19 20:48:50 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  443. Dec 19 20:48:50 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  444. Dec 19 20:48:50 raspberrypi pluto[4906]: | payload malformed after IV
  445. Dec 19 20:48:50 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
  446. Dec 19 20:48:50 raspberrypi pluto[4906]: | d4 a3 ab 97
  447. Dec 19 20:48:50 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  448. Dec 19 20:48:53 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  449. Dec 19 20:48:53 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  450. Dec 19 20:48:53 raspberrypi pluto[4906]: | payload malformed after IV
  451. Dec 19 20:48:53 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
  452. Dec 19 20:48:53 raspberrypi pluto[4906]: | d4 a3 ab 97
  453. Dec 19 20:48:53 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  454. Dec 19 20:48:56 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  455. Dec 19 20:48:56 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  456. Dec 19 20:48:56 raspberrypi pluto[4906]: | payload malformed after IV
  457. Dec 19 20:48:56 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
  458. Dec 19 20:48:56 raspberrypi pluto[4906]: | d4 a3 ab 97
  459. Dec 19 20:48:56 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  460. Dec 19 20:48:59 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
  461. Dec 19 20:48:59 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  462. Dec 19 20:48:59 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: too many (17) malformed payloads. Deleting state
  463. Dec 19 20:48:59 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.1.106 {isakmp=#0/ipsec=#0}
  464. Dec 19 20:49:02 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring unknown Vendor ID payload [01528bbbc00696121849ab9a1c5b2a5100000001]
  465. Dec 19 20:49:02 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000009]
  466. Dec 19 20:49:02 raspberrypi pluto[4906]: packet from 192.168.1.106:500: received Vendor ID payload [RFC 3947] method set to=115
  467. Dec 19 20:49:02 raspberrypi pluto[4906]: packet from 192.168.1.106:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
  468. Dec 19 20:49:02 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [FRAGMENTATION]
  469. Dec 19 20:49:02 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [MS-Negotiation Discovery Capable]
  470. Dec 19 20:49:02 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [Vid-Initial-Contact]
  471. Dec 19 20:49:02 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [IKE CGA version 1]
  472. Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: responding to Main Mode from unknown peer 192.168.1.106
  473. Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: OAKLEY_GROUP 20 not supported. Attribute OAKLEY_GROUP_DESCRIPTION
  474. Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: OAKLEY_GROUP 19 not supported. Attribute OAKLEY_GROUP_DESCRIPTION
  475. Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
  476. Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: STATE_MAIN_R1: sent MR1, expecting MI2
  477. Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
  478. Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
  479. Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: STATE_MAIN_R2: sent MR2, expecting MI3
  480. Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: next payload type of ISAKMP Identification Payload has an unknown value: 71
  481. Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  482. Dec 19 20:49:02 raspberrypi pluto[4906]: | payload malformed after IV
  483. Dec 19 20:49:02 raspberrypi pluto[4906]: | b0 de 74 79 13 1f b4 b3 b6 f3 9d f1 3b ec 71 ff
  484. Dec 19 20:49:02 raspberrypi pluto[4906]: | d5 dd ed 09
  485. Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  486. Dec 19 20:49:03 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: next payload type of ISAKMP Identification Payload has an unknown value: 71
  487. Dec 19 20:49:03 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  488. Dec 19 20:49:03 raspberrypi pluto[4906]: | payload malformed after IV
  489. Dec 19 20:49:03 raspberrypi pluto[4906]: | b0 de 74 79 13 1f b4 b3 b6 f3 9d f1 3b ec 71 ff
  490. Dec 19 20:49:03 raspberrypi pluto[4906]: | d5 dd ed 09
  491. Dec 19 20:49:03 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  492. Dec 19 20:49:04 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: next payload type of ISAKMP Identification Payload has an unknown value: 71
  493. Dec 19 20:49:04 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  494. Dec 19 20:49:04 raspberrypi pluto[4906]: | payload malformed after IV
  495. Dec 19 20:49:04 raspberrypi pluto[4906]: | b0 de 74 79 13 1f b4 b3 b6 f3 9d f1 3b ec 71 ff
  496. Dec 19 20:49:04 raspberrypi pluto[4906]: | d5 dd ed 09
  497. Dec 19 20:49:04 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  498. Dec 19 20:49:07 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: next payload type of ISAKMP Identification Payload has an unknown value: 71
  499. Dec 19 20:49:07 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  500. Dec 19 20:49:07 raspberrypi pluto[4906]: | payload malformed after IV
  501. Dec 19 20:49:07 raspberrypi pluto[4906]: | b0 de 74 79 13 1f b4 b3 b6 f3 9d f1 3b ec 71 ff
  502. Dec 19 20:49:07 raspberrypi pluto[4906]: | d5 dd ed 09
  503. Dec 19 20:49:07 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  504. Dec 19 20:49:10 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: next payload type of ISAKMP Identification Payload has an unknown value: 71
  505. Dec 19 20:49:10 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  506. Dec 19 20:49:10 raspberrypi pluto[4906]: | payload malformed after IV
  507. Dec 19 20:49:10 raspberrypi pluto[4906]: | b0 de 74 79 13 1f b4 b3 b6 f3 9d f1 3b ec 71 ff
  508. Dec 19 20:49:10 raspberrypi pluto[4906]: | d5 dd ed 09
  509. Dec 19 20:49:10 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  510. Dec 19 20:49:13 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: next payload type of ISAKMP Identification Payload has an unknown value: 71
  511. Dec 19 20:49:13 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  512. Dec 19 20:49:13 raspberrypi pluto[4906]: | payload malformed after IV
  513. Dec 19 20:49:13 raspberrypi pluto[4906]: | b0 de 74 79 13 1f b4 b3 b6 f3 9d f1 3b ec 71 ff
  514. Dec 19 20:49:13 raspberrypi pluto[4906]: | d5 dd ed 09
  515. Dec 19 20:49:13 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  516. Dec 19 20:49:16 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: next payload type of ISAKMP Identification Payload has an unknown value: 71
  517. Dec 19 20:49:16 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  518. Dec 19 20:49:16 raspberrypi pluto[4906]: | payload malformed after IV
  519. Dec 19 20:49:16 raspberrypi pluto[4906]: | b0 de 74 79 13 1f b4 b3 b6 f3 9d f1 3b ec 71 ff
  520. Dec 19 20:49:16 raspberrypi pluto[4906]: | d5 dd ed 09
  521. Dec 19 20:49:16 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  522. Dec 19 20:49:19 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: next payload type of ISAKMP Identification Payload has an unknown value: 71
  523. Dec 19 20:49:19 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  524. Dec 19 20:49:19 raspberrypi pluto[4906]: | payload malformed after IV
  525. Dec 19 20:49:19 raspberrypi pluto[4906]: | b0 de 74 79 13 1f b4 b3 b6 f3 9d f1 3b ec 71 ff
  526. Dec 19 20:49:19 raspberrypi pluto[4906]: | d5 dd ed 09
  527. Dec 19 20:49:19 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
  528. Dec 19 20:50:12 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: max number of retransmissions (2) reached STATE_MAIN_R2
  529. Dec 19 20:50:12 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.1.106 {isakmp=#0/ipsec=#0}
  530. Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [RFC 3947] method set to=115
  531. Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] meth=114, but already using method 115
  532. Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-08] meth=113, but already using method 115
  533. Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-07] meth=112, but already using method 115
  534. Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-06] meth=111, but already using method 115
  535. Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-05] meth=110, but already using method 115
  536. Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-04] meth=109, but already using method 115
  537. Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
  538. Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
  539. Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
  540. Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
  541. Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [Dead Peer Detection]
  542. Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: responding to Main Mode from unknown peer 192.168.1.1
  543. Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
  544. Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: STATE_MAIN_R1: sent MR1, expecting MI2
  545. Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
  546. Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
  547. Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: STATE_MAIN_R2: sent MR2, expecting MI3
  548. Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: next payload type of ISAKMP Identification Payload has an unknown value: 165
  549. Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  550. Dec 19 20:50:36 raspberrypi pluto[4906]: | payload malformed after IV
  551. Dec 19 20:50:36 raspberrypi pluto[4906]: | 70 0b 59 d2 9f b4 5e e7 37 74 dd cd 22 64 a3 ee
  552. Dec 19 20:50:36 raspberrypi pluto[4906]: | 81 73 1c 28 c6 41 7c ec e2 ee da c9 39 07 4f 75
  553. Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: sending notification PAYLOAD_MALFORMED to 192.168.1.1:500
  554. Dec 19 20:50:40 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: next payload type of ISAKMP Identification Payload has an unknown value: 165
  555. Dec 19 20:50:40 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  556. Dec 19 20:50:40 raspberrypi pluto[4906]: | payload malformed after IV
  557. Dec 19 20:50:40 raspberrypi pluto[4906]: | 70 0b 59 d2 9f b4 5e e7 37 74 dd cd 22 64 a3 ee
  558. Dec 19 20:50:40 raspberrypi pluto[4906]: | 81 73 1c 28 c6 41 7c ec e2 ee da c9 39 07 4f 75
  559. Dec 19 20:50:40 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: sending notification PAYLOAD_MALFORMED to 192.168.1.1:500
  560. Dec 19 20:50:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: next payload type of ISAKMP Identification Payload has an unknown value: 165
  561. Dec 19 20:50:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  562. Dec 19 20:50:43 raspberrypi pluto[4906]: | payload malformed after IV
  563. Dec 19 20:50:43 raspberrypi pluto[4906]: | 70 0b 59 d2 9f b4 5e e7 37 74 dd cd 22 64 a3 ee
  564. Dec 19 20:50:43 raspberrypi pluto[4906]: | 81 73 1c 28 c6 41 7c ec e2 ee da c9 39 07 4f 75
  565. Dec 19 20:50:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: sending notification PAYLOAD_MALFORMED to 192.168.1.1:500
  566. Dec 19 20:50:46 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: next payload type of ISAKMP Identification Payload has an unknown value: 165
  567. Dec 19 20:50:46 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  568. Dec 19 20:50:46 raspberrypi pluto[4906]: | payload malformed after IV
  569. Dec 19 20:50:46 raspberrypi pluto[4906]: | 70 0b 59 d2 9f b4 5e e7 37 74 dd cd 22 64 a3 ee
  570. Dec 19 20:50:46 raspberrypi pluto[4906]: | 81 73 1c 28 c6 41 7c ec e2 ee da c9 39 07 4f 75
  571. Dec 19 20:50:46 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: sending notification PAYLOAD_MALFORMED to 192.168.1.1:500
  572. Dec 19 20:50:46 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: next payload type of ISAKMP Identification Payload has an unknown value: 165
  573. Dec 19 20:50:46 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  574. Dec 19 20:50:58 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: next payload type of ISAKMP Identification Payload has an unknown value: 165
  575. Dec 19 20:50:58 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
  576. Dec 19 20:50:58 raspberrypi pluto[4906]: | payload malformed after IV
  577. Dec 19 20:50:58 raspberrypi pluto[4906]: | 70 0b 59 d2 9f b4 5e e7 37 74 dd cd 22 64 a3 ee
  578. Dec 19 20:50:58 raspberrypi pluto[4906]: | 81 73 1c 28 c6 41 7c ec e2 ee da c9 39 07 4f 75
  579. Dec 19 20:50:58 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: sending notification PAYLOAD_MALFORMED to 192.168.1.1:500
  580. Dec 19 20:51:46 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: max number of retransmissions (2) reached STATE_MAIN_R2
  581. Dec 19 20:51:46 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.1.1 {isakmp=#0/ipsec=#0}
  582. Dec 19 21:08:06 raspberrypi su[2916]: pam_unix(su:session): session closed for user root
  583. Dec 19 21:08:13 raspberrypi systemd-logind[346]: System is powering down.
  584. Dec 19 21:08:25 raspberrypi systemd-logind[386]: New seat seat0.
  585. Dec 19 21:08:26 raspberrypi ipsec__plutorun: Starting Pluto subsystem...
  586. Dec 19 21:08:26 raspberrypi pluto[593]: Starting Pluto (Openswan Version 2.6.38; Vendor ID OEvy\134kgzWq\134s) pid:593
  587. Dec 19 21:08:26 raspberrypi pluto[593]: LEAK_DETECTIVE support [disabled]
  588. Dec 19 21:08:26 raspberrypi pluto[593]: OCF support for IKE [disabled]
  589. Dec 19 21:08:26 raspberrypi pluto[593]: SAref support [disabled]: Protocol not available
  590. Dec 19 21:08:26 raspberrypi pluto[593]: SAbind support [disabled]: Protocol not available
  591. Dec 19 21:08:26 raspberrypi pluto[593]: NSS support [disabled]
  592. Dec 19 21:08:26 raspberrypi pluto[593]: HAVE_STATSD notification support not compiled in
  593. Dec 19 21:08:26 raspberrypi pluto[593]: Setting NAT-Traversal port-4500 floating to on
  594. Dec 19 21:08:26 raspberrypi pluto[593]: port floating activation criteria nat_t=1/port_float=1
  595. Dec 19 21:08:26 raspberrypi pluto[593]: NAT-Traversal support [enabled]
  596. Dec 19 21:08:26 raspberrypi pluto[593]: fail in ttosubnet ?
  597. Dec 19 21:08:26 raspberrypi pluto[593]: 1 bad entries in virtual_private - none loaded
  598. Dec 19 21:08:26 raspberrypi pluto[593]: using /dev/urandom as source of random entropy
  599. Dec 19 21:08:26 raspberrypi pluto[593]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
  600. Dec 19 21:08:26 raspberrypi pluto[593]: ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
  601. Dec 19 21:08:26 raspberrypi pluto[593]: ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
  602. Dec 19 21:08:26 raspberrypi pluto[593]: starting up 3 cryptographic helpers
  603. Dec 19 21:08:26 raspberrypi pluto[593]: started helper pid=614 (fd:6)
  604. Dec 19 21:08:26 raspberrypi pluto[593]: started helper pid=615 (fd:7)
  605. Dec 19 21:08:26 raspberrypi pluto[614]: using /dev/urandom as source of random entropy
  606. Dec 19 21:08:26 raspberrypi pluto[593]: started helper pid=616 (fd:8)
  607. Dec 19 21:08:26 raspberrypi pluto[615]: using /dev/urandom as source of random entropy
  608. Dec 19 21:08:26 raspberrypi pluto[616]: using /dev/urandom as source of random entropy
  609. Dec 19 21:08:26 raspberrypi pluto[593]: Using Linux 2.6 IPsec interface code on 4.9.59-v7+ (experimental code)
  610. Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_register_enc(): Activating aes_ccm_8: Ok (ret=0)
  611. Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
  612. Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_register_enc(): Activating aes_ccm_12: FAILED (ret=-17)
  613. Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
  614. Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_register_enc(): Activating aes_ccm_16: FAILED (ret=-17)
  615. Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
  616. Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_register_enc(): Activating aes_gcm_8: FAILED (ret=-17)
  617. Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
  618. Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_register_enc(): Activating aes_gcm_12: FAILED (ret=-17)
  619. Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
  620. Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_register_enc(): Activating aes_gcm_16: FAILED (ret=-17)
  621. Dec 19 21:08:27 raspberrypi pluto[593]: myid malformed: empty string ""
  622. Dec 19 21:08:27 raspberrypi pluto[593]: added connection description "L2TP-PSK-NAT"
  623. Dec 19 21:08:27 raspberrypi pluto[593]: added connection description "L2TP-PSK-noNAT"
  624. Dec 19 21:08:27 raspberrypi pluto[593]: added connection description "passthrough-for-non-l2tp"
  625. Dec 19 21:08:27 raspberrypi pluto[593]: listening for IKE messages
  626. Dec 19 21:08:27 raspberrypi pluto[593]: adding interface lo/lo 127.0.0.1:500
  627. Dec 19 21:08:27 raspberrypi pluto[593]: adding interface lo/lo 127.0.0.1:4500
  628. Dec 19 21:08:27 raspberrypi pluto[593]: adding interface lo/lo ::1:500
  629. Dec 19 21:08:27 raspberrypi pluto[593]: loading secrets from "/etc/ipsec.secrets"
  630. Dec 19 21:08:27 raspberrypi pluto[593]: loading secrets from "/var/lib/openswan/ipsec.secrets.inc"
  631. Dec 19 21:08:27 raspberrypi pluto[593]: loaded private key file '/etc/ipsec.d/private/raspberrypiKey.pem' (1708 bytes)
  632. Dec 19 21:08:27 raspberrypi pluto[593]: error in PKCS#1 private key
  633. Dec 19 21:08:27 raspberrypi pluto[593]: "/var/lib/openswan/ipsec.secrets.inc" line 1: error loading RSA private key file
  634. Dec 19 21:08:28 raspberrypi lightdm: pam_unix(lightdm-autologin:session): session opened for user pi by (uid=0)
  635. Dec 19 21:08:28 raspberrypi systemd-logind[386]: New session c1 of user pi.
  636. Dec 19 21:08:28 raspberrypi systemd: pam_unix(systemd-user:session): session opened for user pi by (uid=0)
  637. Dec 19 21:08:33 raspberrypi login[446]: pam_unix(login:session): session opened for user pi by LOGIN(uid=0)
  638. Dec 19 21:08:33 raspberrypi systemd-logind[386]: New session c2 of user pi.
  639. Dec 19 21:08:40 raspberrypi polkitd(authority=local): Registered Authentication Agent for unix-session:c1 (system bus name :1.13 [lxpolkit], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_GB.UTF-8)
  640. Dec 20 15:07:41 raspberrypi su[1272]: Successful su for root by pi
  641. Dec 20 15:07:41 raspberrypi su[1272]: + /dev/pts/0 pi:root
  642. Dec 20 15:07:41 raspberrypi su[1272]: pam_unix(su:session): session opened for user root by (uid=1000)
  643. Dec 20 15:07:41 raspberrypi su[1272]: pam_systemd(su:session): Cannot create session: Already running in a session
  644. Dec 20 15:17:01 raspberrypi CRON[1309]: pam_unix(cron:session): session opened for user root by (uid=0)
  645. Dec 20 15:17:01 raspberrypi CRON[1309]: pam_unix(cron:session): session closed for user root
Advertisement
Add Comment
Please, Sign In to add comment