initiator cookie:01 d6 0b 09 e4 37 be 33responder cookie:00 00 00 00 00 00 00 00next payload type: ISAKMP_NEXT_SAISAKMP version: ISAKMP Version 1.0exchange type: ISAKMP_XCHG_IDPROTflags: nonemessage ID: 00 00 00 00***emit ISAKMP Security Association Payload:next payload type: ISAKMP_NEXT_VIDDOI: ISAKMP_DOI_IPSEC****emit IPsec DOI SIT:IPsec DOI SIT: SIT_IDENTITY_ONLY****emit ISAKMP Proposal Payload:next payload type: ISAKMP_NEXT_NONEproposal number: 0protocol ID: PROTO_ISAKMPSPI size: 0number of transforms: 1*****emit ISAKMP Transform Payload (ISAKMP):next payload type: ISAKMP_NEXT_NONEtransform number: 0transform ID: KEY_IKE******emit ISAKMP Oakley attribute:af+type: OAKLEY_LIFE_TYPElength/value: 1[1 is OAKLEY_LIFE_SECONDS]******emit ISAKMP Oakley attribute:af+type: OAKLEY_LIFE_DURATIONlength/value: 7800******emit ISAKMP Oakley attribute:af+type: OAKLEY_ENCRYPTION_ALGORITHMlength/value: 7[7 is AES_CBC]******emit ISAKMP Oakley attribute:af+type: OAKLEY_HASH_ALGORITHMlength/value: 1[1 is HMAC_MD5]******emit ISAKMP Oakley attribute:af+type: OAKLEY_KEY_LENGTHlength/value: 256******emit ISAKMP Oakley attribute:af+type: OAKLEY_AUTHENTICATION_METHODlength/value: 1[1 is pre-shared key]******emit ISAKMP Oakley attribute:af+type: OAKLEY_GROUP_DESCRIPTIONlength/value: 5[5 is MODP_1536]emitting length of ISAKMP Transform Payload (ISAKMP): 36emitting length of ISAKMP Proposal Payload: 44emitting length of ISAKMP Security Association Payload: 56out_vendorid(): sending [strongSwan]***emit ISAKMP Vendor ID Payload:next payload type: ISAKMP_NEXT_VIDemitting 16 raw bytes of V_ID into ISAKMP Vendor ID PayloadV_ID 88 2f e5 6d 6f d2 0d bc 22 51 61 3b 2e be 5b ebemitting length of ISAKMP Vendor ID Payload: 20out_vendorid(): sending [Cisco-Unity]***emit ISAKMP Vendor ID Payload:next payload type: ISAKMP_NEXT_VIDemitting 16 raw bytes of V_ID into ISAKMP Vendor ID PayloadV_ID 12 f5 f2 8c 45 71 68 a9 70 2d 9f e2 74 cc 01 00emitting length of ISAKMP Vendor ID Payload: 20out_vendorid(): sending [XAUTH]***emit ISAKMP Vendor ID Payload:next payload type: ISAKMP_NEXT_VIDemitting 8 raw bytes of V_ID into ISAKMP Vendor ID PayloadV_ID 09 00 26 89 df d6 b7 12emitting length of ISAKMP Vendor ID Payload: 12out_vendorid(): sending [Dead Peer Detection]***emit ISAKMP Vendor ID Payload:next payload type: ISAKMP_NEXT_VIDemitting 16 raw bytes of V_ID into ISAKMP Vendor ID PayloadV_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00emitting length of ISAKMP Vendor ID Payload: 20out_vendorid(): sending [RFC 3947]***emit ISAKMP Vendor ID Payload:next payload type: ISAKMP_NEXT_VIDemitting 16 raw bytes of V_ID into ISAKMP Vendor ID PayloadV_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2femitting length of ISAKMP Vendor ID Payload: 20out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-03]***emit ISAKMP Vendor ID Payload:next payload type: ISAKMP_NEXT_VIDemitting 16 raw bytes of V_ID into ISAKMP Vendor ID PayloadV_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56emitting length of ISAKMP Vendor ID Payload: 20out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-02]***emit ISAKMP Vendor ID Payload:next payload type: ISAKMP_NEXT_VIDemitting 16 raw bytes of V_ID into ISAKMP Vendor ID PayloadV_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48emitting length of ISAKMP Vendor ID Payload: 20out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-02_n]***emit ISAKMP Vendor ID Payload:next payload type: ISAKMP_NEXT_VIDemitting 16 raw bytes of V_ID into ISAKMP Vendor ID PayloadV_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1femitting length of ISAKMP Vendor ID Payload: 20out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-00]***emit ISAKMP Vendor ID Payload:next payload type: ISAKMP_NEXT_NONEemitting 16 raw bytes of V_ID into ISAKMP Vendor ID PayloadV_ID 44 85 15 2d 18 b6 bb cd 0b e8 a8 46 95 79 dd ccemitting length of ISAKMP Vendor ID Payload: 20emitting length of ISAKMP Message: 256HA System: can not delete ha_state #102023:09:02-16:42:26 fw01 pluto[12839]: |*received 40 bytes from 185.x.x.2:500 on eth4**parse ISAKMP Message:initiator cookie:01 d6 0b 09 e4 37 be 33responder cookie:b0 25 be f0 20 51 d5 15next payload type: ISAKMP_NEXT_NISAKMP version: ISAKMP Version 1.0exchange type: ISAKMP_XCHG_INFOflags: nonemessage ID: c3 c7 7c b7length: 40***parse ISAKMP Notification Payload:next payload type: ISAKMP_NEXT_NONElength: 12DOI: ISAKMP_DOI_IPSECprotocol ID: 1SPI size: 0Notify Message Type: NO_PROPOSAL_CHOSENpacket from 185.x.x.2:500: ignoring informational payload, type NO_PROPOSAL_CHOSENinfo:
# This file is automatically generated. Do not editconnections { 7cc9a15f-b7e6-411f-ad32-89b748b67332 { proposals = aes256-sha256-modp2048 unique = replace aggressive = no version = 1 mobike = no local_addrs = 185.32.xxx.2 remote_addrs = 212.144.xxx.34 encap = no rekey_time = 28800 send_certreq = no keyingtries = 0 local-dc55fd10-ae2f-4528-abbe-xxxxxxxxxxxx { round = 0 auth = psk id = 185.32.xxx.2 } remote-a701c8e0-8a2f-4301-9bb6-xxxxxxxxxxxx { round = 0 auth = psk id = 212.144.xxx.34 } children { 212f8e76-5c22-4df2-a0e1-xxxxxxxxxxxx { reqid = 130 esp_proposals = aes256-sha256-modp2048 sha256_96 = no start_action = start close_action = none dpd_action = clear mode = tunnel policies = yes local_ts = 192.168.30.0/24,192.168.60.0/24,172.16.3.0/24,192.168.88.0/24 remote_ts = 192.168.10.0/24,192.168.20.0/24,192.168.111.0/24 rekey_time = 3600 updown = /usr/local/opnsense/scripts/ipsec/updown_event.py --connection_child 212f8e76-5c22-4df2-a0e1-e32bc299f6ef } } }}pools {}secrets { ike-1eb47195-1c2f-4b1c-a528-942b4504cf38 { id-0 = 185.32.xxx.2 id-1 = 212.144.xxx.34 secret = xxxxxxxxxxxx }}
[meta sequenceId="2729"] 08[ENC] <7cc9a15f-b7e6-411f-ad32-89b748b67332|1> generating ID_PROT request 0 [ SA V V V V V ][meta sequenceId="2730"] 08[NET] <7cc9a15f-b7e6-411f-ad32-89b748b67332|1> sending packet: from 185.32.xxx.2[500] to 212.144.xxx.34[500] (180 bytes)[meta sequenceId="2731"] 04[NET] error writing to socket: Can't assign requested address[meta sequenceId="2732"] 08[IKE] <7cc9a15f-b7e6-411f-ad32-89b748b67332|1> sending retransmit 1 of request message ID 0, seq 1[meta sequenceId="2733"] 08[NET] <7cc9a15f-b7e6-411f-ad32-89b748b67332|1> sending packet: from 185.32.xxx.2[500] to 212.144.xxx.34[500] (180 bytes)[meta sequenceId="2734"] 04[NET] error writing to socket: Can't assign requested address[meta sequenceId="2735"] 08[IKE] <7cc9a15f-b7e6-411f-ad32-89b748b67332|1> sending retransmit 2 of request message ID 0, seq 1[meta sequenceId="2736"] 08[NET] <7cc9a15f-b7e6-411f-ad32-89b748b67332|1> sending packet: from 185.32.xxx.2[500] to 212.144.xxx.34[500] (180 bytes)[meta sequenceId="2737"] 04[NET] error writing to socket: Can't assign requested address[meta sequenceId="2738"] 08[NET] <125> received packet: from 212.144.xxx.34[500] to 192.168.88.253[500] (256 bytes)[meta sequenceId="2739"] 08[ENC] <125> parsed ID_PROT request 0 [ SA V V V V V V V V V ][meta sequenceId="2740"] 08[IKE] <125> no IKE config found for 192.168.88.253...212.144.xxx.34, sending NO_PROPOSAL_CHOSEN[meta sequenceId="2741"] 08[ENC] <125> generating INFORMATIONAL_V1 request 1957370062 [ N(NO_PROP) ][meta sequenceId="2742"] 08[NET] <125> sending packet: from 192.168.88.253[500] to 212.144.xxx.34[500] (40 bytes)
2023:09:03-14:20:14 fw01 pluto[30529]: |af+type: OAKLEY_AUTHENTICATION_METHOD2023:09:03-14:20:14 fw01 pluto[30529]: | length/value: 12023:09:03-14:20:14 fw01 pluto[30529]: | ******parse ISAKMP Oakley attribute:2023:09:03-14:20:14 fw01 pluto[30529]: | af+type: OAKLEY_LIFE_TYPE2023:09:03-14:20:14 fw01 pluto[30529]: | length/value: 12023:09:03-14:20:14 fw01 pluto[30529]: | ******parse ISAKMP Oakley attribute:2023:09:03-14:20:14 fw01 pluto[30529]: | af+type: OAKLEY_LIFE_DURATION2023:09:03-14:20:14 fw01 pluto[30529]: | length/value: 316802023:09:03-14:20:14 fw01 pluto[30529]: | preparse_isakmp_policy: peer requests PSK authentication2023:09:03-14:20:14 fw01 pluto[30529]: packet from 185.32.xxx.2:263: initial Main Mode message received on 212.144.xxx.34:500 but no connection has been authorized with policy=PSK2023:09:03-14:20:35 fw01 pluto[30529]: |2023:09:03-14:20:35 fw01 pluto[30529]: | *received 40 bytes from 185.32.xxx.2:500 on eth42023:09:03-14:20:35 fw01 pluto[30529]: | **parse ISAKMP Message:2023:09:03-14:20:35 fw01 pluto[30529]: | initiator cookie:2023:09:03-14:20:35 fw01 pluto[30529]: | 3b c5 b5 fc d6 1b 00 f52023:09:03-14:20:35 fw01 pluto[30529]: | responder cookie:2023:09:03-14:20:35 fw01 pluto[30529]: | cc 39 11 b9 d1 3a 21 b82023:09:03-14:20:35 fw01 pluto[30529]: | next payload type: ISAKMP_NEXT_N2023:09:03-14:20:35 fw01 pluto[30529]: | ISAKMP version: ISAKMP Version 1.02023:09:03-14:20:35 fw01 pluto[30529]: | exchange type: ISAKMP_XCHG_INFO2023:09:03-14:20:35 fw01 pluto[30529]: | flags: none2023:09:03-14:20:35 fw01 pluto[30529]: | message ID: eb e0 75 f22023:09:03-14:20:35 fw01 pluto[30529]: | length: 402023:09:03-14:20:35 fw01 pluto[30529]: | ***parse ISAKMP Notification Payload:2023:09:03-14:20:35 fw01 pluto[30529]: | next payload type: ISAKMP_NEXT_NONE2023:09:03-14:20:35 fw01 pluto[30529]: | length: 122023:09:03-14:20:35 fw01 pluto[30529]: | DOI: ISAKMP_DOI_IPSEC2023:09:03-14:20:35 fw01 pluto[30529]: | protocol ID: 12023:09:03-14:20:35 fw01 pluto[30529]: | SPI size: 02023:09:03-14:20:35 fw01 pluto[30529]: | Notify Message Type: NO_PROPOSAL_CHOSEN2023:09:03-14:20:35 fw01 pluto[30529]: packet from 185.32.xxx.2:500: ignoring informational payload, type NO_PROPOSAL_CHOSEN2023:09:03-14:20:35 fw01 pluto[30529]: | info: