06[NET] <5c5afb18-9f41-4e90-8a2b-2a7534266587|18> sending packet: from IP[4500] to IP[21501] (400 bytes)06[ENC] <5c5afb18-9f41-4e90-8a2b-2a7534266587|18> generating IKE_AUTH response 1 [ IDr AUTH EAP/REQ/ID ]06[IKE] <5c5afb18-9f41-4e90-8a2b-2a7534266587|18> authentication of 'location.MYHOST.com' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful06[IKE] <5c5afb18-9f41-4e90-8a2b-2a7534266587|18> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding06[IKE] <5c5afb18-9f41-4e90-8a2b-2a7534266587|18> peer supports MOBIKE06[IKE] <5c5afb18-9f41-4e90-8a2b-2a7534266587|18> initiating EAP_IDENTITY method (id 0x00)06[CFG] <5c5afb18-9f41-4e90-8a2b-2a7534266587|18> selected peer config '5c5afb18-9f41-4e90-8a2b-2a7534266587'06[CFG] <18> looking for peer configs matching IP[location.MYHOST.com]...IP[IP]06[ENC] <18> parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr CPRQ(ADDR MASK DHCP DNS ADDR6 DHCP6 DNS6 DOMAIN) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr N(MOBIKE_SUP) ]06[ENC] <18> unknown attribute type INTERNAL_DNS_DOMAIN06[NET] <18> received packet: from IP[21501] to IP[4500] (400 bytes)06[NET] <18> sending packet: from IP[500] to IP[500] (497 bytes)06[ENC] <18> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]06[IKE] <18> sending cert request for "C=DE, ST=MYHOST-opnsense, L=MYHOST-opnsense, O=MYHOST-opnsense, OU=MYHOST-opnsense, E=MYHOST-opnsense, CN=location.MYHOST.com"06[IKE] <18> remote host is behind NAT06[CFG] <18> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_204806[IKE] <18> IP is initiating an IKE_SA06[ENC] <18> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]06[NET] <18> received packet: from IP[500] to IP[500] (562 bytes)06[NET] <17> sending packet: from IP[500] to IP[500] (38 bytes)06[ENC] <17> generating IKE_SA_INIT response 0 [ N(INVAL_KE) ]06[IKE] <17> DH group ECP_256 unacceptable, requesting MODP_204806[IKE] <17> remote host is behind NAT06[CFG] <17> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_204806[IKE] <17> IP is initiating an IKE_SA06[ENC] <17> parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]06[NET] <17> received packet: from IP[500] to IP[500] (370 bytes)
NEIKEv2Provider(NetworkExtension)[1483] <Error>: [IKE_SA_INIT R resp0 FA8B49559B813784-0000000000000000] Initiator init received notify error Error Domain=NEIKEv2ProtocolErrorDomain Code=17 "InvalidKEPayload" UserInfo={NSDebugDescription=InvalidKEPayload}NEIKEv2Provider(NetworkExtension)[1483] <Error>: [IKE_AUTH R resp1 FA8B49559B813784-B1C5080634BCCCFD] No certificate payload receivedNEIKEv2Provider(NetworkExtension)[1483] <Notice>: IKEv2IKESA[1.1, FA8B49559B813784-B1C5080634BCCCFD] state Connecting -> Disconnected error (null) -> Error Domain=NEIKEv2ErrorDomain Code=8 "Authentication: No certificate payload received" UserInfo={NSLocalizedDescription=Authentication: No certificate payload received}
06[IKE] <5c5afb18-9f41-4e90-8a2b-2a7534266587|18> authentication of 'location.MYHOST.com' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"><plist version="1.0"><dict> <key>PayloadContent</key> <array> <dict> <key>IKEv2</key> <dict> <key>AuthName</key> <string>username</string> <key>AuthPassword</key> <string>verystrongpassword</string> <key>AuthenticationMethod</key> <string>None</string> <key>ChildSecurityAssociationParameters</key> <dict> <key>DiffieHellmanGroup</key> <integer>20</integer> <key>EncryptionAlgorithm</key> <string>AES-256-GCM</string> <key>IntegrityAlgorithm</key> <string>SHA2-384</string> </dict> <key>DeadPeerDetectionRate</key> <string>Low</string> <key>EnableFallback</key> <false/> <key>EnablePFS</key> <true/> <key>ExtendedAuthEnabled</key> <integer>1</integer> <key>IKESecurityAssociationParameters</key> <dict> <key>DiffieHellmanGroup</key> <integer>20</integer> <key>EncryptionAlgorithm</key> <string>AES-256-GCM</string> <key>IntegrityAlgorithm</key> <string>SHA2-384</string> </dict> <key>LocalIdentifier</key> <string>username</string> <key>NATKeepAliveOffloadEnable</key> <integer>1</integer> <key>OnDemandEnabled</key> <integer>1</integer> <key>OnDemandRules</key> <array> <dict> <key>Action</key> <string>Disconnect</string> <key>InterfaceTypeMatch</key> <string>WiFi</string> <key>SSIDMatch</key> <array> <string>SSID</string> <string>SSID_1</string> </array> </dict> <dict> <key>Action</key> <string>Connect</string> </dict> </array> <key>RemoteAddress</key> <string>vpn.example.net</string> <key>RemoteIdentifier</key> <string>vpn.example.net</string> <key>ServerCertificateCommonName</key> <string>vpn.example.net</string> <key>UseConfigurationAttributeInternalIPSubnet</key> <false/> </dict> <key>PayloadDisplayName</key> <string>ikev2.home</string> <key>PayloadIdentifier</key> <string>net.example.vpn.conf1</string> <key>PayloadType</key> <string>com.apple.vpn.managed</string> <key>PayloadUUID</key> <string>cf6e0c93-a7f4-485b-90ff-7904668e68cd</string> <key>PayloadVersion</key> <integer>1</integer> <key>UserDefinedName</key> <string>ikev2.home</string> <key>VPNType</key> <string>IKEv2</string> </dict> </array> <key>PayloadDisplayName</key> <string>ikev2.home</string> <key>PayloadIdentifier</key> <string>ikev2.home</string> <key>PayloadType</key> <string>Configuration</string> <key>PayloadUUID</key> <string>7aadc059-c7c4-4034-ac96-e1b6ccb69b81</string> <key>PayloadVersion</key> <integer>1</integer></dict></plist>