Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Nov 29 02:56:27 raspberrypi systemd-logind[346]: New seat seat0.
- Nov 29 02:56:37 raspberrypi login[445]: pam_unix(login:session): session opened for user pi by LOGIN(uid=0)
- Nov 29 02:56:37 raspberrypi systemd-logind[346]: New session c1 of user pi.
- Nov 29 02:56:37 raspberrypi systemd: pam_unix(systemd-user:session): session opened for user pi by (uid=0)
- Nov 29 02:57:17 raspberrypi lightdm: pam_unix(lightdm-autologin:session): session opened for user pi by (uid=0)
- Nov 29 02:57:17 raspberrypi systemd-logind[346]: New session c2 of user pi.
- Nov 29 02:57:20 raspberrypi polkitd(authority=local): Registered Authentication Agent for unix-session:c2 (system bus name :1.15 [lxpolkit], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_GB.UTF-8)
- Dec 19 19:50:20 raspberrypi sudo: pi : TTY=unknown ; PWD=/home/pi ; USER=root ; COMMAND=/usr/bin/rc_gui
- Dec 19 19:50:20 raspberrypi sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
- Dec 19 19:57:32 raspberrypi sudo: pam_unix(sudo:session): session closed for user root
- Dec 19 19:59:31 raspberrypi su[2896]: pam_unix(su:auth): authentication failure; logname= uid=1000 euid=0 tty=/dev/pts/0 ruser=pi rhost= user=root
- Dec 19 19:59:33 raspberrypi su[2896]: pam_authenticate: Authentication failure
- Dec 19 19:59:33 raspberrypi su[2896]: FAILED su for root by pi
- Dec 19 19:59:33 raspberrypi su[2896]: - /dev/pts/0 pi:root
- Dec 19 19:59:40 raspberrypi su[2900]: pam_unix(su:auth): authentication failure; logname= uid=1000 euid=0 tty=/dev/pts/0 ruser=pi rhost= user=root
- Dec 19 19:59:42 raspberrypi su[2900]: pam_authenticate: Authentication failure
- Dec 19 19:59:42 raspberrypi su[2900]: FAILED su for root by pi
- Dec 19 19:59:42 raspberrypi su[2900]: - /dev/pts/0 pi:root
- Dec 19 19:59:54 raspberrypi sudo: pi : TTY=pts/0 ; PWD=/home/pi ; USER=root ; COMMAND=/usr/bin/passwd
- Dec 19 19:59:54 raspberrypi sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
- Dec 19 20:00:12 raspberrypi passwd[2910]: pam_unix(passwd:chauthtok): password changed for root
- Dec 19 20:00:12 raspberrypi sudo: pam_unix(sudo:session): session closed for user root
- Dec 19 20:00:20 raspberrypi su[2916]: Successful su for root by pi
- Dec 19 20:00:20 raspberrypi su[2916]: + /dev/pts/0 pi:root
- Dec 19 20:00:20 raspberrypi su[2916]: pam_unix(su:session): session opened for user root by (uid=1000)
- Dec 19 20:00:20 raspberrypi su[2916]: pam_systemd(su:session): Cannot create session: Already running in a session
- Dec 19 20:03:35 raspberrypi ipsec__plutorun: Starting Pluto subsystem...
- Dec 19 20:03:36 raspberrypi pluto[4115]: Starting Pluto (Openswan Version 2.6.38; Vendor ID OEvy\134kgzWq\134s) pid:4115
- Dec 19 20:03:36 raspberrypi pluto[4115]: LEAK_DETECTIVE support [disabled]
- Dec 19 20:03:36 raspberrypi pluto[4115]: OCF support for IKE [disabled]
- Dec 19 20:03:36 raspberrypi pluto[4115]: SAref support [disabled]: Protocol not available
- Dec 19 20:03:36 raspberrypi pluto[4115]: SAbind support [disabled]: Protocol not available
- Dec 19 20:03:36 raspberrypi pluto[4115]: NSS support [disabled]
- Dec 19 20:03:36 raspberrypi pluto[4115]: HAVE_STATSD notification support not compiled in
- Dec 19 20:03:36 raspberrypi pluto[4115]: Setting NAT-Traversal port-4500 floating to on
- Dec 19 20:03:36 raspberrypi pluto[4115]: port floating activation criteria nat_t=1/port_float=1
- Dec 19 20:03:36 raspberrypi pluto[4115]: NAT-Traversal support [enabled]
- Dec 19 20:03:36 raspberrypi pluto[4115]: using /dev/urandom as source of random entropy
- Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
- Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
- Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
- Dec 19 20:03:36 raspberrypi pluto[4115]: starting up 3 cryptographic helpers
- Dec 19 20:03:36 raspberrypi pluto[4115]: started helper pid=4121 (fd:6)
- Dec 19 20:03:36 raspberrypi pluto[4115]: started helper pid=4122 (fd:7)
- Dec 19 20:03:36 raspberrypi pluto[4115]: started helper pid=4123 (fd:8)
- Dec 19 20:03:36 raspberrypi pluto[4121]: using /dev/urandom as source of random entropy
- Dec 19 20:03:36 raspberrypi pluto[4115]: Kernel interface auto-pick
- Dec 19 20:03:36 raspberrypi pluto[4115]: Using Linux 2.6 IPsec interface code on 4.9.59-v7+ (experimental code)
- Dec 19 20:03:36 raspberrypi pluto[4122]: using /dev/urandom as source of random entropy
- Dec 19 20:03:36 raspberrypi pluto[4123]: using /dev/urandom as source of random entropy
- Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_enc(): Activating aes_ccm_8: Ok (ret=0)
- Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
- Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_enc(): Activating aes_ccm_12: FAILED (ret=-17)
- Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
- Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_enc(): Activating aes_ccm_16: FAILED (ret=-17)
- Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
- Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_enc(): Activating aes_gcm_8: FAILED (ret=-17)
- Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
- Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_enc(): Activating aes_gcm_12: FAILED (ret=-17)
- Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
- Dec 19 20:03:36 raspberrypi pluto[4115]: ike_alg_register_enc(): Activating aes_gcm_16: FAILED (ret=-17)
- Dec 19 20:03:36 raspberrypi pluto[4115]: listening for IKE messages
- Dec 19 20:03:36 raspberrypi pluto[4115]: adding interface eth0/eth0 192.168.1.60:500
- Dec 19 20:03:36 raspberrypi pluto[4115]: adding interface eth0/eth0 192.168.1.60:4500
- Dec 19 20:03:36 raspberrypi pluto[4115]: adding interface lo/lo 127.0.0.1:500
- Dec 19 20:03:36 raspberrypi pluto[4115]: adding interface lo/lo 127.0.0.1:4500
- Dec 19 20:03:36 raspberrypi pluto[4115]: adding interface lo/lo ::1:500
- Dec 19 20:03:36 raspberrypi pluto[4115]: loading secrets from "/etc/ipsec.secrets"
- Dec 19 20:03:36 raspberrypi pluto[4115]: loading secrets from "/var/lib/openswan/ipsec.secrets.inc"
- Dec 19 20:03:36 raspberrypi pluto[4115]: loaded private key file '/etc/ipsec.d/private/raspberrypiKey.pem' (1708 bytes)
- Dec 19 20:03:36 raspberrypi pluto[4115]: error in PKCS#1 private key
- Dec 19 20:03:36 raspberrypi pluto[4115]: "/var/lib/openswan/ipsec.secrets.inc" line 1: error loading RSA private key file
- Dec 19 20:17:01 raspberrypi CRON[4496]: pam_unix(cron:session): session opened for user root by (uid=0)
- Dec 19 20:17:01 raspberrypi CRON[4496]: pam_unix(cron:session): session closed for user root
- Dec 19 20:22:02 raspberrypi pluto[4115]: shutting down
- Dec 19 20:22:02 raspberrypi pluto[4115]: shutting down interface lo/lo ::1:500
- Dec 19 20:22:02 raspberrypi pluto[4115]: shutting down interface lo/lo 127.0.0.1:4500
- Dec 19 20:22:02 raspberrypi pluto[4115]: shutting down interface lo/lo 127.0.0.1:500
- Dec 19 20:22:02 raspberrypi pluto[4115]: shutting down interface eth0/eth0 192.168.1.60:4500
- Dec 19 20:22:02 raspberrypi pluto[4115]: shutting down interface eth0/eth0 192.168.1.60:500
- Dec 19 20:22:02 raspberrypi pluto[4123]: pluto_crypto_helper: helper (2) is normal exiting
- Dec 19 20:22:02 raspberrypi pluto[4122]: pluto_crypto_helper: helper (1) is normal exiting
- Dec 19 20:22:02 raspberrypi pluto[4121]: pluto_crypto_helper: helper (0) is normal exiting
- Dec 19 20:22:05 raspberrypi ipsec__plutorun: Starting Pluto subsystem...
- Dec 19 20:22:05 raspberrypi pluto[4906]: Starting Pluto (Openswan Version 2.6.38; Vendor ID OEvy\134kgzWq\134s) pid:4906
- Dec 19 20:22:05 raspberrypi pluto[4906]: LEAK_DETECTIVE support [disabled]
- Dec 19 20:22:05 raspberrypi pluto[4906]: OCF support for IKE [disabled]
- Dec 19 20:22:05 raspberrypi pluto[4906]: SAref support [disabled]: Protocol not available
- Dec 19 20:22:05 raspberrypi pluto[4906]: SAbind support [disabled]: Protocol not available
- Dec 19 20:22:05 raspberrypi pluto[4906]: NSS support [disabled]
- Dec 19 20:22:05 raspberrypi pluto[4906]: HAVE_STATSD notification support not compiled in
- Dec 19 20:22:05 raspberrypi pluto[4906]: Setting NAT-Traversal port-4500 floating to on
- Dec 19 20:22:05 raspberrypi pluto[4906]: port floating activation criteria nat_t=1/port_float=1
- Dec 19 20:22:05 raspberrypi pluto[4906]: NAT-Traversal support [enabled]
- Dec 19 20:22:05 raspberrypi pluto[4906]: fail in ttosubnet ?
- Dec 19 20:22:05 raspberrypi pluto[4906]: 1 bad entries in virtual_private - none loaded
- Dec 19 20:22:05 raspberrypi pluto[4906]: using /dev/urandom as source of random entropy
- Dec 19 20:22:05 raspberrypi pluto[4906]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
- Dec 19 20:22:05 raspberrypi pluto[4906]: ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
- Dec 19 20:22:05 raspberrypi pluto[4906]: ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
- Dec 19 20:22:05 raspberrypi pluto[4906]: starting up 3 cryptographic helpers
- Dec 19 20:22:05 raspberrypi pluto[4906]: started helper pid=4910 (fd:6)
- Dec 19 20:22:05 raspberrypi pluto[4906]: started helper pid=4911 (fd:7)
- Dec 19 20:22:05 raspberrypi pluto[4906]: started helper pid=4912 (fd:8)
- Dec 19 20:22:05 raspberrypi pluto[4906]: Using Linux 2.6 IPsec interface code on 4.9.59-v7+ (experimental code)
- Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_register_enc(): Activating aes_ccm_8: Ok (ret=0)
- Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
- Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_register_enc(): Activating aes_ccm_12: FAILED (ret=-17)
- Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
- Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_register_enc(): Activating aes_ccm_16: FAILED (ret=-17)
- Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
- Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_register_enc(): Activating aes_gcm_8: FAILED (ret=-17)
- Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
- Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_register_enc(): Activating aes_gcm_12: FAILED (ret=-17)
- Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
- Dec 19 20:22:06 raspberrypi pluto[4906]: ike_alg_register_enc(): Activating aes_gcm_16: FAILED (ret=-17)
- Dec 19 20:22:06 raspberrypi pluto[4912]: using /dev/urandom as source of random entropy
- Dec 19 20:22:06 raspberrypi pluto[4910]: using /dev/urandom as source of random entropy
- Dec 19 20:22:06 raspberrypi pluto[4911]: using /dev/urandom as source of random entropy
- Dec 19 20:22:06 raspberrypi pluto[4906]: added connection description "L2TP-PSK-NAT"
- Dec 19 20:22:06 raspberrypi pluto[4906]: added connection description "L2TP-PSK-noNAT"
- Dec 19 20:22:06 raspberrypi pluto[4906]: added connection description "passthrough-for-non-l2tp"
- Dec 19 20:22:06 raspberrypi pluto[4906]: listening for IKE messages
- Dec 19 20:22:06 raspberrypi pluto[4906]: adding interface eth0/eth0 192.168.1.15:500
- Dec 19 20:22:06 raspberrypi pluto[4906]: adding interface eth0/eth0 192.168.1.15:4500
- Dec 19 20:22:06 raspberrypi pluto[4906]: adding interface eth0/eth0 192.168.1.60:500
- Dec 19 20:22:06 raspberrypi pluto[4906]: adding interface eth0/eth0 192.168.1.60:4500
- Dec 19 20:22:06 raspberrypi pluto[4906]: adding interface lo/lo 127.0.0.1:500
- Dec 19 20:22:06 raspberrypi pluto[4906]: adding interface lo/lo 127.0.0.1:4500
- Dec 19 20:22:06 raspberrypi pluto[4906]: adding interface lo/lo ::1:500
- Dec 19 20:22:06 raspberrypi pluto[4906]: loading secrets from "/etc/ipsec.secrets"
- Dec 19 20:22:06 raspberrypi pluto[4906]: loading secrets from "/var/lib/openswan/ipsec.secrets.inc"
- Dec 19 20:22:06 raspberrypi pluto[4906]: loaded private key file '/etc/ipsec.d/private/raspberrypiKey.pem' (1708 bytes)
- Dec 19 20:22:06 raspberrypi pluto[4906]: error in PKCS#1 private key
- Dec 19 20:22:06 raspberrypi pluto[4906]: "/var/lib/openswan/ipsec.secrets.inc" line 1: error loading RSA private key file
- Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [RFC 3947] method set to=115
- Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] meth=114, but already using method 115
- Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-08] meth=113, but already using method 115
- Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-07] meth=112, but already using method 115
- Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-06] meth=111, but already using method 115
- Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-05] meth=110, but already using method 115
- Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-04] meth=109, but already using method 115
- Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
- Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
- Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
- Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
- Dec 19 20:30:32 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [Dead Peer Detection]
- Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: responding to Main Mode from unknown peer 192.168.1.229
- Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: STATE_MAIN_R1: sent MR1, expecting MI2
- Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
- Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: STATE_MAIN_R2: sent MR2, expecting MI3
- Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: next payload type of ISAKMP Identification Payload has an unknown value: 61
- Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:30:32 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:30:32 raspberrypi pluto[4906]: | 6d da dd e6 b9 3d f3 5e 3c 08 39 06 ea 25 cf 52
- Dec 19 20:30:32 raspberrypi pluto[4906]: | 6c 87 0e eb 6e 34 88 11 8f a0 d2 28 9e 49 ee 21
- Dec 19 20:30:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:30:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: next payload type of ISAKMP Identification Payload has an unknown value: 61
- Dec 19 20:30:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:30:36 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:30:36 raspberrypi pluto[4906]: | 6d da dd e6 b9 3d f3 5e 3c 08 39 06 ea 25 cf 52
- Dec 19 20:30:36 raspberrypi pluto[4906]: | 6c 87 0e eb 6e 34 88 11 8f a0 d2 28 9e 49 ee 21
- Dec 19 20:30:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:30:39 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: next payload type of ISAKMP Identification Payload has an unknown value: 61
- Dec 19 20:30:39 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:30:39 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:30:39 raspberrypi pluto[4906]: | 6d da dd e6 b9 3d f3 5e 3c 08 39 06 ea 25 cf 52
- Dec 19 20:30:39 raspberrypi pluto[4906]: | 6c 87 0e eb 6e 34 88 11 8f a0 d2 28 9e 49 ee 21
- Dec 19 20:30:39 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:30:42 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: next payload type of ISAKMP Identification Payload has an unknown value: 61
- Dec 19 20:30:42 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:30:42 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:30:42 raspberrypi pluto[4906]: | 6d da dd e6 b9 3d f3 5e 3c 08 39 06 ea 25 cf 52
- Dec 19 20:30:42 raspberrypi pluto[4906]: | 6c 87 0e eb 6e 34 88 11 8f a0 d2 28 9e 49 ee 21
- Dec 19 20:30:42 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:30:42 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: next payload type of ISAKMP Identification Payload has an unknown value: 61
- Dec 19 20:30:42 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:30:54 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: next payload type of ISAKMP Identification Payload has an unknown value: 61
- Dec 19 20:30:54 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:30:54 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:30:54 raspberrypi pluto[4906]: | 6d da dd e6 b9 3d f3 5e 3c 08 39 06 ea 25 cf 52
- Dec 19 20:30:54 raspberrypi pluto[4906]: | 6c 87 0e eb 6e 34 88 11 8f a0 d2 28 9e 49 ee 21
- Dec 19 20:30:54 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:31:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: next payload type of ISAKMP Identification Payload has an unknown value: 61
- Dec 19 20:31:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:31:02 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:31:02 raspberrypi pluto[4906]: | 6d da dd e6 b9 3d f3 5e 3c 08 39 06 ea 25 cf 52
- Dec 19 20:31:02 raspberrypi pluto[4906]: | 6c 87 0e eb 6e 34 88 11 8f a0 d2 28 9e 49 ee 21
- Dec 19 20:31:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [RFC 3947] method set to=115
- Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] meth=114, but already using method 115
- Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-08] meth=113, but already using method 115
- Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-07] meth=112, but already using method 115
- Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-06] meth=111, but already using method 115
- Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-05] meth=110, but already using method 115
- Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-04] meth=109, but already using method 115
- Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
- Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
- Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
- Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
- Dec 19 20:31:37 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [Dead Peer Detection]
- Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: responding to Main Mode from unknown peer 192.168.1.229
- Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: STATE_MAIN_R1: sent MR1, expecting MI2
- Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
- Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: STATE_MAIN_R2: sent MR2, expecting MI3
- Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
- Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: Main mode peer ID is ID_IPV4_ADDR: '192.168.1.229'
- Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
- Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: new NAT mapping for #2, was 192.168.1.229:500, now 192.168.1.229:4500
- Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=OAKLEY_SHA2_256 group=modp2048}
- Dec 19 20:31:37 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: Dead Peer Detection (RFC 3706): enabled
- Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: the peer proposed: 192.168.1.15/32:17/1701 -> 192.168.1.229/32:17/0
- Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: peer proposal was reject in a virtual connection policy because:
- Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: a private network virtual IP was required, but the proposed IP did not match our list (virtual_private=)
- Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: NAT-Traversal: received 2 NAT-OA. using first, ignoring others
- Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-noNAT"[1] 192.168.1.229 #3: responding to Quick Mode proposal {msgid:b8b07ddb}
- Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-noNAT"[1] 192.168.1.229 #3: us: 192.168.1.15<192.168.1.15>:17/1701
- Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-noNAT"[1] 192.168.1.229 #3: them: 192.168.1.229:17/53417
- Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-noNAT"[1] 192.168.1.229 #3: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
- Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-noNAT"[1] 192.168.1.229 #3: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
- Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-noNAT"[1] 192.168.1.229 #3: Dead Peer Detection (RFC 3706): enabled
- Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-noNAT"[1] 192.168.1.229 #3: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
- Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-noNAT"[1] 192.168.1.229 #3: STATE_QUICK_R2: IPsec SA established transport mode {ESP/NAT=>0x005c13e6 <0xa55becf4 xfrm=AES_256-HMAC_SHA1 NATOA=192.168.1.229 NATD=192.168.1.229:4500 DPD=enable}
- Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: received Delete SA(0x005c13e6) payload: deleting IPSEC State #3
- Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: deleting connection "L2TP-PSK-noNAT" instance with peer 192.168.1.229 {isakmp=#0/ipsec=#0}
- Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: received and ignored informational message
- Dec 19 20:31:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #2: received Delete SA payload: deleting ISAKMP State #2
- Dec 19 20:31:38 raspberrypi pluto[4906]: packet from 192.168.1.229:4500: received and ignored informational message
- Dec 19 20:31:42 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229 #1: max number of retransmissions (2) reached STATE_MAIN_R2
- Dec 19 20:31:42 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[1] 192.168.1.229: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.1.229 {isakmp=#0/ipsec=#0}
- Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [RFC 3947] method set to=115
- Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] meth=114, but already using method 115
- Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-08] meth=113, but already using method 115
- Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-07] meth=112, but already using method 115
- Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-06] meth=111, but already using method 115
- Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-05] meth=110, but already using method 115
- Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-04] meth=109, but already using method 115
- Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
- Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
- Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
- Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
- Dec 19 20:32:08 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [Dead Peer Detection]
- Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: responding to Main Mode from unknown peer 192.168.1.229
- Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: STATE_MAIN_R1: sent MR1, expecting MI2
- Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
- Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: STATE_MAIN_R2: sent MR2, expecting MI3
- Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: next payload type of ISAKMP Identification Payload has an unknown value: 206
- Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:32:08 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:32:08 raspberrypi pluto[4906]: | f7 85 51 ad 68 fc 04 ff 8f f3 98 67 bd bc be c7
- Dec 19 20:32:08 raspberrypi pluto[4906]: | d9 c3 d1 95 26 b0 c3 6e 34 f9 04 5c 98 aa 45 29
- Dec 19 20:32:08 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:32:11 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: next payload type of ISAKMP Identification Payload has an unknown value: 206
- Dec 19 20:32:11 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:32:11 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:32:11 raspberrypi pluto[4906]: | f7 85 51 ad 68 fc 04 ff 8f f3 98 67 bd bc be c7
- Dec 19 20:32:11 raspberrypi pluto[4906]: | d9 c3 d1 95 26 b0 c3 6e 34 f9 04 5c 98 aa 45 29
- Dec 19 20:32:11 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:32:14 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: next payload type of ISAKMP Identification Payload has an unknown value: 206
- Dec 19 20:32:14 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:32:14 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:32:14 raspberrypi pluto[4906]: | f7 85 51 ad 68 fc 04 ff 8f f3 98 67 bd bc be c7
- Dec 19 20:32:14 raspberrypi pluto[4906]: | d9 c3 d1 95 26 b0 c3 6e 34 f9 04 5c 98 aa 45 29
- Dec 19 20:32:14 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:32:18 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: next payload type of ISAKMP Identification Payload has an unknown value: 206
- Dec 19 20:32:18 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:32:18 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:32:18 raspberrypi pluto[4906]: | f7 85 51 ad 68 fc 04 ff 8f f3 98 67 bd bc be c7
- Dec 19 20:32:18 raspberrypi pluto[4906]: | d9 c3 d1 95 26 b0 c3 6e 34 f9 04 5c 98 aa 45 29
- Dec 19 20:32:18 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:32:18 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: next payload type of ISAKMP Identification Payload has an unknown value: 206
- Dec 19 20:32:18 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:32:31 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: next payload type of ISAKMP Identification Payload has an unknown value: 206
- Dec 19 20:32:31 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:32:31 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:32:31 raspberrypi pluto[4906]: | f7 85 51 ad 68 fc 04 ff 8f f3 98 67 bd bc be c7
- Dec 19 20:32:31 raspberrypi pluto[4906]: | d9 c3 d1 95 26 b0 c3 6e 34 f9 04 5c 98 aa 45 29
- Dec 19 20:32:31 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:32:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: next payload type of ISAKMP Identification Payload has an unknown value: 206
- Dec 19 20:32:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:32:38 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:32:38 raspberrypi pluto[4906]: | f7 85 51 ad 68 fc 04 ff 8f f3 98 67 bd bc be c7
- Dec 19 20:32:38 raspberrypi pluto[4906]: | d9 c3 d1 95 26 b0 c3 6e 34 f9 04 5c 98 aa 45 29
- Dec 19 20:32:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:33:18 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229 #4: max number of retransmissions (2) reached STATE_MAIN_R2
- Dec 19 20:33:18 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[2] 192.168.1.229: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.1.229 {isakmp=#0/ipsec=#0}
- Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [RFC 3947] method set to=115
- Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] meth=114, but already using method 115
- Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-08] meth=113, but already using method 115
- Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-07] meth=112, but already using method 115
- Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-06] meth=111, but already using method 115
- Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-05] meth=110, but already using method 115
- Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-04] meth=109, but already using method 115
- Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
- Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
- Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
- Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
- Dec 19 20:44:33 raspberrypi pluto[4906]: packet from 192.168.1.229:500: received Vendor ID payload [Dead Peer Detection]
- Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: responding to Main Mode from unknown peer 192.168.1.229
- Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: STATE_MAIN_R1: sent MR1, expecting MI2
- Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
- Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: STATE_MAIN_R2: sent MR2, expecting MI3
- Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: next payload type of ISAKMP Identification Payload has an unknown value: 172
- Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:44:33 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:44:33 raspberrypi pluto[4906]: | ac 08 f3 a0 31 6d 5c c0 78 64 42 b3 15 ec 1e 3c
- Dec 19 20:44:33 raspberrypi pluto[4906]: | f3 65 03 24 1c a3 45 e5 1b ba 59 2f c1 09 a6 ec
- Dec 19 20:44:33 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:44:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: next payload type of ISAKMP Identification Payload has an unknown value: 172
- Dec 19 20:44:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:44:36 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:44:36 raspberrypi pluto[4906]: | ac 08 f3 a0 31 6d 5c c0 78 64 42 b3 15 ec 1e 3c
- Dec 19 20:44:36 raspberrypi pluto[4906]: | f3 65 03 24 1c a3 45 e5 1b ba 59 2f c1 09 a6 ec
- Dec 19 20:44:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:44:39 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: next payload type of ISAKMP Identification Payload has an unknown value: 172
- Dec 19 20:44:39 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:44:39 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:44:39 raspberrypi pluto[4906]: | ac 08 f3 a0 31 6d 5c c0 78 64 42 b3 15 ec 1e 3c
- Dec 19 20:44:39 raspberrypi pluto[4906]: | f3 65 03 24 1c a3 45 e5 1b ba 59 2f c1 09 a6 ec
- Dec 19 20:44:39 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:44:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: next payload type of ISAKMP Identification Payload has an unknown value: 172
- Dec 19 20:44:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:44:43 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:44:43 raspberrypi pluto[4906]: | ac 08 f3 a0 31 6d 5c c0 78 64 42 b3 15 ec 1e 3c
- Dec 19 20:44:43 raspberrypi pluto[4906]: | f3 65 03 24 1c a3 45 e5 1b ba 59 2f c1 09 a6 ec
- Dec 19 20:44:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:44:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: next payload type of ISAKMP Identification Payload has an unknown value: 172
- Dec 19 20:44:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:44:55 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: next payload type of ISAKMP Identification Payload has an unknown value: 172
- Dec 19 20:44:55 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:44:55 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:44:55 raspberrypi pluto[4906]: | ac 08 f3 a0 31 6d 5c c0 78 64 42 b3 15 ec 1e 3c
- Dec 19 20:44:55 raspberrypi pluto[4906]: | f3 65 03 24 1c a3 45 e5 1b ba 59 2f c1 09 a6 ec
- Dec 19 20:44:55 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: sending notification PAYLOAD_MALFORMED to 192.168.1.229:500
- Dec 19 20:45:04 raspberrypi pluto[4906]: ERROR: asynchronous network error report on eth0 (sport=500) for message to 192.168.1.229 port 500, complainant 192.168.1.229: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)]
- Dec 19 20:45:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229 #5: max number of retransmissions (2) reached STATE_MAIN_R2
- Dec 19 20:45:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[3] 192.168.1.229: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.1.229 {isakmp=#0/ipsec=#0}
- Dec 19 20:48:12 raspberrypi pluto[4906]: | no connection found
- Dec 19 20:48:12 raspberrypi pluto[4906]: packet from 192.168.1.106:500: sending notification v2N_NO_PROPOSAL_CHOSEN to 192.168.1.106:500
- Dec 19 20:48:15 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring unknown Vendor ID payload [01528bbbc00696121849ab9a1c5b2a5100000001]
- Dec 19 20:48:15 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000009]
- Dec 19 20:48:15 raspberrypi pluto[4906]: packet from 192.168.1.106:500: received Vendor ID payload [RFC 3947] method set to=115
- Dec 19 20:48:15 raspberrypi pluto[4906]: packet from 192.168.1.106:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
- Dec 19 20:48:15 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [FRAGMENTATION]
- Dec 19 20:48:15 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [MS-Negotiation Discovery Capable]
- Dec 19 20:48:15 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [Vid-Initial-Contact]
- Dec 19 20:48:15 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [IKE CGA version 1]
- Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: responding to Main Mode from unknown peer 192.168.1.106
- Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: OAKLEY_GROUP 20 not supported. Attribute OAKLEY_GROUP_DESCRIPTION
- Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: OAKLEY_GROUP 19 not supported. Attribute OAKLEY_GROUP_DESCRIPTION
- Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: STATE_MAIN_R1: sent MR1, expecting MI2
- Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
- Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: STATE_MAIN_R2: sent MR2, expecting MI3
- Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:15 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:48:15 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
- Dec 19 20:48:15 raspberrypi pluto[4906]: | d4 a3 ab 97
- Dec 19 20:48:15 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:48:16 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:16 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:16 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:48:16 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
- Dec 19 20:48:16 raspberrypi pluto[4906]: | d4 a3 ab 97
- Dec 19 20:48:16 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:48:17 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:17 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:17 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:48:17 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
- Dec 19 20:48:17 raspberrypi pluto[4906]: | d4 a3 ab 97
- Dec 19 20:48:17 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:48:20 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:20 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:20 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:48:20 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
- Dec 19 20:48:20 raspberrypi pluto[4906]: | d4 a3 ab 97
- Dec 19 20:48:20 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:48:23 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:23 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:23 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:48:23 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
- Dec 19 20:48:23 raspberrypi pluto[4906]: | d4 a3 ab 97
- Dec 19 20:48:23 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:48:26 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:26 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:26 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:48:26 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
- Dec 19 20:48:26 raspberrypi pluto[4906]: | d4 a3 ab 97
- Dec 19 20:48:26 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:48:29 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:29 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:29 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:48:29 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
- Dec 19 20:48:29 raspberrypi pluto[4906]: | d4 a3 ab 97
- Dec 19 20:48:29 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:48:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:32 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:48:32 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
- Dec 19 20:48:32 raspberrypi pluto[4906]: | d4 a3 ab 97
- Dec 19 20:48:32 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:48:35 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:35 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:35 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:48:35 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
- Dec 19 20:48:35 raspberrypi pluto[4906]: | d4 a3 ab 97
- Dec 19 20:48:35 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:48:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:38 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:48:38 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
- Dec 19 20:48:38 raspberrypi pluto[4906]: | d4 a3 ab 97
- Dec 19 20:48:38 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:48:41 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:41 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:41 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:48:41 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
- Dec 19 20:48:41 raspberrypi pluto[4906]: | d4 a3 ab 97
- Dec 19 20:48:41 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:48:44 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:44 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:44 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:48:44 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
- Dec 19 20:48:44 raspberrypi pluto[4906]: | d4 a3 ab 97
- Dec 19 20:48:44 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:48:47 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:47 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:47 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:48:47 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
- Dec 19 20:48:47 raspberrypi pluto[4906]: | d4 a3 ab 97
- Dec 19 20:48:47 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:48:50 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:50 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:50 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:48:50 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
- Dec 19 20:48:50 raspberrypi pluto[4906]: | d4 a3 ab 97
- Dec 19 20:48:50 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:48:53 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:53 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:53 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:48:53 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
- Dec 19 20:48:53 raspberrypi pluto[4906]: | d4 a3 ab 97
- Dec 19 20:48:53 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:48:56 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:56 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:56 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:48:56 raspberrypi pluto[4906]: | 5c 52 27 53 7a 86 70 b3 40 1d f9 82 bb da 42 85
- Dec 19 20:48:56 raspberrypi pluto[4906]: | d4 a3 ab 97
- Dec 19 20:48:56 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:48:59 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: next payload type of ISAKMP Identification Payload has an unknown value: 196
- Dec 19 20:48:59 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:48:59 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106 #6: too many (17) malformed payloads. Deleting state
- Dec 19 20:48:59 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[4] 192.168.1.106: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.1.106 {isakmp=#0/ipsec=#0}
- Dec 19 20:49:02 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring unknown Vendor ID payload [01528bbbc00696121849ab9a1c5b2a5100000001]
- Dec 19 20:49:02 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000009]
- Dec 19 20:49:02 raspberrypi pluto[4906]: packet from 192.168.1.106:500: received Vendor ID payload [RFC 3947] method set to=115
- Dec 19 20:49:02 raspberrypi pluto[4906]: packet from 192.168.1.106:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
- Dec 19 20:49:02 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [FRAGMENTATION]
- Dec 19 20:49:02 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [MS-Negotiation Discovery Capable]
- Dec 19 20:49:02 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [Vid-Initial-Contact]
- Dec 19 20:49:02 raspberrypi pluto[4906]: packet from 192.168.1.106:500: ignoring Vendor ID payload [IKE CGA version 1]
- Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: responding to Main Mode from unknown peer 192.168.1.106
- Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: OAKLEY_GROUP 20 not supported. Attribute OAKLEY_GROUP_DESCRIPTION
- Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: OAKLEY_GROUP 19 not supported. Attribute OAKLEY_GROUP_DESCRIPTION
- Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: STATE_MAIN_R1: sent MR1, expecting MI2
- Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
- Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: STATE_MAIN_R2: sent MR2, expecting MI3
- Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: next payload type of ISAKMP Identification Payload has an unknown value: 71
- Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:49:02 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:49:02 raspberrypi pluto[4906]: | b0 de 74 79 13 1f b4 b3 b6 f3 9d f1 3b ec 71 ff
- Dec 19 20:49:02 raspberrypi pluto[4906]: | d5 dd ed 09
- Dec 19 20:49:02 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:49:03 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: next payload type of ISAKMP Identification Payload has an unknown value: 71
- Dec 19 20:49:03 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:49:03 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:49:03 raspberrypi pluto[4906]: | b0 de 74 79 13 1f b4 b3 b6 f3 9d f1 3b ec 71 ff
- Dec 19 20:49:03 raspberrypi pluto[4906]: | d5 dd ed 09
- Dec 19 20:49:03 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:49:04 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: next payload type of ISAKMP Identification Payload has an unknown value: 71
- Dec 19 20:49:04 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:49:04 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:49:04 raspberrypi pluto[4906]: | b0 de 74 79 13 1f b4 b3 b6 f3 9d f1 3b ec 71 ff
- Dec 19 20:49:04 raspberrypi pluto[4906]: | d5 dd ed 09
- Dec 19 20:49:04 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:49:07 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: next payload type of ISAKMP Identification Payload has an unknown value: 71
- Dec 19 20:49:07 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:49:07 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:49:07 raspberrypi pluto[4906]: | b0 de 74 79 13 1f b4 b3 b6 f3 9d f1 3b ec 71 ff
- Dec 19 20:49:07 raspberrypi pluto[4906]: | d5 dd ed 09
- Dec 19 20:49:07 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:49:10 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: next payload type of ISAKMP Identification Payload has an unknown value: 71
- Dec 19 20:49:10 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:49:10 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:49:10 raspberrypi pluto[4906]: | b0 de 74 79 13 1f b4 b3 b6 f3 9d f1 3b ec 71 ff
- Dec 19 20:49:10 raspberrypi pluto[4906]: | d5 dd ed 09
- Dec 19 20:49:10 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:49:13 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: next payload type of ISAKMP Identification Payload has an unknown value: 71
- Dec 19 20:49:13 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:49:13 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:49:13 raspberrypi pluto[4906]: | b0 de 74 79 13 1f b4 b3 b6 f3 9d f1 3b ec 71 ff
- Dec 19 20:49:13 raspberrypi pluto[4906]: | d5 dd ed 09
- Dec 19 20:49:13 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:49:16 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: next payload type of ISAKMP Identification Payload has an unknown value: 71
- Dec 19 20:49:16 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:49:16 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:49:16 raspberrypi pluto[4906]: | b0 de 74 79 13 1f b4 b3 b6 f3 9d f1 3b ec 71 ff
- Dec 19 20:49:16 raspberrypi pluto[4906]: | d5 dd ed 09
- Dec 19 20:49:16 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:49:19 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: next payload type of ISAKMP Identification Payload has an unknown value: 71
- Dec 19 20:49:19 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:49:19 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:49:19 raspberrypi pluto[4906]: | b0 de 74 79 13 1f b4 b3 b6 f3 9d f1 3b ec 71 ff
- Dec 19 20:49:19 raspberrypi pluto[4906]: | d5 dd ed 09
- Dec 19 20:49:19 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: sending notification PAYLOAD_MALFORMED to 192.168.1.106:500
- Dec 19 20:50:12 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106 #7: max number of retransmissions (2) reached STATE_MAIN_R2
- Dec 19 20:50:12 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[5] 192.168.1.106: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.1.106 {isakmp=#0/ipsec=#0}
- Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [RFC 3947] method set to=115
- Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] meth=114, but already using method 115
- Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-08] meth=113, but already using method 115
- Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-07] meth=112, but already using method 115
- Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-06] meth=111, but already using method 115
- Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-05] meth=110, but already using method 115
- Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-04] meth=109, but already using method 115
- Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 115
- Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 115
- Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 115
- Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
- Dec 19 20:50:36 raspberrypi pluto[4906]: packet from 192.168.1.1:500: received Vendor ID payload [Dead Peer Detection]
- Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: responding to Main Mode from unknown peer 192.168.1.1
- Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
- Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: STATE_MAIN_R1: sent MR1, expecting MI2
- Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
- Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
- Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: STATE_MAIN_R2: sent MR2, expecting MI3
- Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: next payload type of ISAKMP Identification Payload has an unknown value: 165
- Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:50:36 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:50:36 raspberrypi pluto[4906]: | 70 0b 59 d2 9f b4 5e e7 37 74 dd cd 22 64 a3 ee
- Dec 19 20:50:36 raspberrypi pluto[4906]: | 81 73 1c 28 c6 41 7c ec e2 ee da c9 39 07 4f 75
- Dec 19 20:50:36 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: sending notification PAYLOAD_MALFORMED to 192.168.1.1:500
- Dec 19 20:50:40 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: next payload type of ISAKMP Identification Payload has an unknown value: 165
- Dec 19 20:50:40 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:50:40 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:50:40 raspberrypi pluto[4906]: | 70 0b 59 d2 9f b4 5e e7 37 74 dd cd 22 64 a3 ee
- Dec 19 20:50:40 raspberrypi pluto[4906]: | 81 73 1c 28 c6 41 7c ec e2 ee da c9 39 07 4f 75
- Dec 19 20:50:40 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: sending notification PAYLOAD_MALFORMED to 192.168.1.1:500
- Dec 19 20:50:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: next payload type of ISAKMP Identification Payload has an unknown value: 165
- Dec 19 20:50:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:50:43 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:50:43 raspberrypi pluto[4906]: | 70 0b 59 d2 9f b4 5e e7 37 74 dd cd 22 64 a3 ee
- Dec 19 20:50:43 raspberrypi pluto[4906]: | 81 73 1c 28 c6 41 7c ec e2 ee da c9 39 07 4f 75
- Dec 19 20:50:43 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: sending notification PAYLOAD_MALFORMED to 192.168.1.1:500
- Dec 19 20:50:46 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: next payload type of ISAKMP Identification Payload has an unknown value: 165
- Dec 19 20:50:46 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:50:46 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:50:46 raspberrypi pluto[4906]: | 70 0b 59 d2 9f b4 5e e7 37 74 dd cd 22 64 a3 ee
- Dec 19 20:50:46 raspberrypi pluto[4906]: | 81 73 1c 28 c6 41 7c ec e2 ee da c9 39 07 4f 75
- Dec 19 20:50:46 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: sending notification PAYLOAD_MALFORMED to 192.168.1.1:500
- Dec 19 20:50:46 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: next payload type of ISAKMP Identification Payload has an unknown value: 165
- Dec 19 20:50:46 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:50:58 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: next payload type of ISAKMP Identification Payload has an unknown value: 165
- Dec 19 20:50:58 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: probable authentication failure (mismatch of preshared secrets?): malformed payload in packet
- Dec 19 20:50:58 raspberrypi pluto[4906]: | payload malformed after IV
- Dec 19 20:50:58 raspberrypi pluto[4906]: | 70 0b 59 d2 9f b4 5e e7 37 74 dd cd 22 64 a3 ee
- Dec 19 20:50:58 raspberrypi pluto[4906]: | 81 73 1c 28 c6 41 7c ec e2 ee da c9 39 07 4f 75
- Dec 19 20:50:58 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: sending notification PAYLOAD_MALFORMED to 192.168.1.1:500
- Dec 19 20:51:46 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1 #8: max number of retransmissions (2) reached STATE_MAIN_R2
- Dec 19 20:51:46 raspberrypi pluto[4906]: "L2TP-PSK-NAT"[6] 192.168.1.1: deleting connection "L2TP-PSK-NAT" instance with peer 192.168.1.1 {isakmp=#0/ipsec=#0}
- Dec 19 21:08:06 raspberrypi su[2916]: pam_unix(su:session): session closed for user root
- Dec 19 21:08:13 raspberrypi systemd-logind[346]: System is powering down.
- Dec 19 21:08:25 raspberrypi systemd-logind[386]: New seat seat0.
- Dec 19 21:08:26 raspberrypi ipsec__plutorun: Starting Pluto subsystem...
- Dec 19 21:08:26 raspberrypi pluto[593]: Starting Pluto (Openswan Version 2.6.38; Vendor ID OEvy\134kgzWq\134s) pid:593
- Dec 19 21:08:26 raspberrypi pluto[593]: LEAK_DETECTIVE support [disabled]
- Dec 19 21:08:26 raspberrypi pluto[593]: OCF support for IKE [disabled]
- Dec 19 21:08:26 raspberrypi pluto[593]: SAref support [disabled]: Protocol not available
- Dec 19 21:08:26 raspberrypi pluto[593]: SAbind support [disabled]: Protocol not available
- Dec 19 21:08:26 raspberrypi pluto[593]: NSS support [disabled]
- Dec 19 21:08:26 raspberrypi pluto[593]: HAVE_STATSD notification support not compiled in
- Dec 19 21:08:26 raspberrypi pluto[593]: Setting NAT-Traversal port-4500 floating to on
- Dec 19 21:08:26 raspberrypi pluto[593]: port floating activation criteria nat_t=1/port_float=1
- Dec 19 21:08:26 raspberrypi pluto[593]: NAT-Traversal support [enabled]
- Dec 19 21:08:26 raspberrypi pluto[593]: fail in ttosubnet ?
- Dec 19 21:08:26 raspberrypi pluto[593]: 1 bad entries in virtual_private - none loaded
- Dec 19 21:08:26 raspberrypi pluto[593]: using /dev/urandom as source of random entropy
- Dec 19 21:08:26 raspberrypi pluto[593]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
- Dec 19 21:08:26 raspberrypi pluto[593]: ike_alg_register_hash(): Activating OAKLEY_SHA2_512: Ok (ret=0)
- Dec 19 21:08:26 raspberrypi pluto[593]: ike_alg_register_hash(): Activating OAKLEY_SHA2_256: Ok (ret=0)
- Dec 19 21:08:26 raspberrypi pluto[593]: starting up 3 cryptographic helpers
- Dec 19 21:08:26 raspberrypi pluto[593]: started helper pid=614 (fd:6)
- Dec 19 21:08:26 raspberrypi pluto[593]: started helper pid=615 (fd:7)
- Dec 19 21:08:26 raspberrypi pluto[614]: using /dev/urandom as source of random entropy
- Dec 19 21:08:26 raspberrypi pluto[593]: started helper pid=616 (fd:8)
- Dec 19 21:08:26 raspberrypi pluto[615]: using /dev/urandom as source of random entropy
- Dec 19 21:08:26 raspberrypi pluto[616]: using /dev/urandom as source of random entropy
- Dec 19 21:08:26 raspberrypi pluto[593]: Using Linux 2.6 IPsec interface code on 4.9.59-v7+ (experimental code)
- Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_register_enc(): Activating aes_ccm_8: Ok (ret=0)
- Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
- Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_register_enc(): Activating aes_ccm_12: FAILED (ret=-17)
- Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
- Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_register_enc(): Activating aes_ccm_16: FAILED (ret=-17)
- Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
- Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_register_enc(): Activating aes_gcm_8: FAILED (ret=-17)
- Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
- Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_register_enc(): Activating aes_gcm_12: FAILED (ret=-17)
- Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_add(): ERROR: algo_type '0', algo_id '0', Algorithm type already exists
- Dec 19 21:08:27 raspberrypi pluto[593]: ike_alg_register_enc(): Activating aes_gcm_16: FAILED (ret=-17)
- Dec 19 21:08:27 raspberrypi pluto[593]: myid malformed: empty string ""
- Dec 19 21:08:27 raspberrypi pluto[593]: added connection description "L2TP-PSK-NAT"
- Dec 19 21:08:27 raspberrypi pluto[593]: added connection description "L2TP-PSK-noNAT"
- Dec 19 21:08:27 raspberrypi pluto[593]: added connection description "passthrough-for-non-l2tp"
- Dec 19 21:08:27 raspberrypi pluto[593]: listening for IKE messages
- Dec 19 21:08:27 raspberrypi pluto[593]: adding interface lo/lo 127.0.0.1:500
- Dec 19 21:08:27 raspberrypi pluto[593]: adding interface lo/lo 127.0.0.1:4500
- Dec 19 21:08:27 raspberrypi pluto[593]: adding interface lo/lo ::1:500
- Dec 19 21:08:27 raspberrypi pluto[593]: loading secrets from "/etc/ipsec.secrets"
- Dec 19 21:08:27 raspberrypi pluto[593]: loading secrets from "/var/lib/openswan/ipsec.secrets.inc"
- Dec 19 21:08:27 raspberrypi pluto[593]: loaded private key file '/etc/ipsec.d/private/raspberrypiKey.pem' (1708 bytes)
- Dec 19 21:08:27 raspberrypi pluto[593]: error in PKCS#1 private key
- Dec 19 21:08:27 raspberrypi pluto[593]: "/var/lib/openswan/ipsec.secrets.inc" line 1: error loading RSA private key file
- Dec 19 21:08:28 raspberrypi lightdm: pam_unix(lightdm-autologin:session): session opened for user pi by (uid=0)
- Dec 19 21:08:28 raspberrypi systemd-logind[386]: New session c1 of user pi.
- Dec 19 21:08:28 raspberrypi systemd: pam_unix(systemd-user:session): session opened for user pi by (uid=0)
- Dec 19 21:08:33 raspberrypi login[446]: pam_unix(login:session): session opened for user pi by LOGIN(uid=0)
- Dec 19 21:08:33 raspberrypi systemd-logind[386]: New session c2 of user pi.
- Dec 19 21:08:40 raspberrypi polkitd(authority=local): Registered Authentication Agent for unix-session:c1 (system bus name :1.13 [lxpolkit], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_GB.UTF-8)
- Dec 20 15:07:41 raspberrypi su[1272]: Successful su for root by pi
- Dec 20 15:07:41 raspberrypi su[1272]: + /dev/pts/0 pi:root
- Dec 20 15:07:41 raspberrypi su[1272]: pam_unix(su:session): session opened for user root by (uid=1000)
- Dec 20 15:07:41 raspberrypi su[1272]: pam_systemd(su:session): Cannot create session: Already running in a session
- Dec 20 15:17:01 raspberrypi CRON[1309]: pam_unix(cron:session): session opened for user root by (uid=0)
- Dec 20 15:17:01 raspberrypi CRON[1309]: pam_unix(cron:session): session closed for user root
Advertisement
Add Comment
Please, Sign In to add comment