L2TP over IPSEC not working from ONE device on ONE network

Hi All,


this is really odd. I have a MBP (mine, actually) with a L2TP over IPSec VPN configured to connect to a remote gateway (Sophos UTM320). When I'm in one particular remote location (another office, no point-to-point vpn between them), I get a "The L2TP-VPN server did not respond" when connecting; it doesn't even get to the "authenticating" step.


From another machine at the same location with the same credentials, I can connect.

From the same machine in a different location (on a different network), I can connect.

If I change the machine's local IP address, I still cannot connect.

Basically, a particular machine cannot connect but only when trying to connect from a particular location.


I have dumped my system configuration folder, wiped out and re-entered all settings, powered off then on.

I am officially dumbfounded.

Anyone else ever have this happen?


The only strange thing I see (maybe it's not strange) is the raccoon.log node in the console is dimmed. Is this normal? I see raccoon entries; there's a lot but maybe someone who know more about this stuff than I can decipher it (hopefully I removed all the security concerns and addresses):


Thanks,


Jeff


7/16/15 11:43:20.614 AM pppd[1129]: publish_entry SCDSet() failed: Success!

7/16/15 11:43:20.614 AM pppd[1129]: publish_entry SCDSet() failed: Success!

7/16/15 11:43:20.614 AM pppd[1129]: pppd 2.4.2 (Apple version 727.90.1) started by jcooper, uid 502

7/16/15 11:43:20.622 AM pppd[1129]: L2TP connecting to server 'yolo.kingarch.com' (xxx.xxx.xxx.xxx)...

7/16/15 11:43:20.622 AM pppd[1129]: IPSec connection started

7/16/15 11:43:20.629 AM racoon[1130]: lifetime = 3600

7/16/15 11:43:20.629 AM racoon[1130]: lifebyte = 0

7/16/15 11:43:20.629 AM racoon[1130]: encklen=256

7/16/15 11:43:20.629 AM racoon[1130]: p:1 t:1

7/16/15 11:43:20.629 AM racoon[1130]: AES-CBC(7)

7/16/15 11:43:20.629 AM racoon[1130]: SHA(2)

7/16/15 11:43:20.629 AM racoon[1130]: 1024-bit MODP group(2)

7/16/15 11:43:20.629 AM racoon[1130]: pre-shared key(1)

7/16/15 11:43:20.629 AM racoon[1130]: 0

7/16/15 11:43:20.629 AM racoon[1130]: 0

7/16/15 11:43:20.630 AM racoon[1130]: lifetime = 3600

7/16/15 11:43:20.630 AM racoon[1130]: lifebyte = 0

7/16/15 11:43:20.630 AM racoon[1130]: encklen=256

7/16/15 11:43:20.630 AM racoon[1130]: p:1 t:2

7/16/15 11:43:20.630 AM racoon[1130]: AES-CBC(7)

7/16/15 11:43:20.630 AM racoon[1130]: MD5(1)

7/16/15 11:43:20.630 AM racoon[1130]: 1024-bit MODP group(2)

7/16/15 11:43:20.630 AM racoon[1130]: pre-shared key(1)

7/16/15 11:43:20.630 AM racoon[1130]: 0

7/16/15 11:43:20.630 AM racoon[1130]: 0

7/16/15 11:43:20.631 AM racoon[1130]: lifetime = 3600

7/16/15 11:43:20.631 AM racoon[1130]: lifebyte = 0

7/16/15 11:43:20.631 AM racoon[1130]: encklen=128

7/16/15 11:43:20.631 AM racoon[1130]: p:1 t:3

7/16/15 11:43:20.631 AM racoon[1130]: AES-CBC(7)

7/16/15 11:43:20.631 AM racoon[1130]: SHA(2)

7/16/15 11:43:20.631 AM racoon[1130]: 1024-bit MODP group(2)

7/16/15 11:43:20.631 AM racoon[1130]: pre-shared key(1)

7/16/15 11:43:20.631 AM racoon[1130]: 0

7/16/15 11:43:20.631 AM racoon[1130]: 0

7/16/15 11:43:20.632 AM racoon[1130]: lifetime = 3600

7/16/15 11:43:20.632 AM racoon[1130]: lifebyte = 0

7/16/15 11:43:20.632 AM racoon[1130]: encklen=128

7/16/15 11:43:20.632 AM racoon[1130]: p:1 t:4

7/16/15 11:43:20.632 AM racoon[1130]: AES-CBC(7)

7/16/15 11:43:20.632 AM racoon[1130]: MD5(1)

7/16/15 11:43:20.632 AM racoon[1130]: 1024-bit MODP group(2)

7/16/15 11:43:20.632 AM racoon[1130]: pre-shared key(1)

7/16/15 11:43:20.632 AM racoon[1130]: 0

7/16/15 11:43:20.632 AM racoon[1130]: 0

7/16/15 11:43:20.632 AM racoon[1130]: lifetime = 3600

7/16/15 11:43:20.633 AM racoon[1130]: lifebyte = 0

7/16/15 11:43:20.633 AM racoon[1130]: encklen=0

7/16/15 11:43:20.633 AM racoon[1130]: p:1 t:5

7/16/15 11:43:20.633 AM racoon[1130]: 3DES-CBC(5)

7/16/15 11:43:20.633 AM racoon[1130]: SHA(2)

7/16/15 11:43:20.633 AM racoon[1130]: 1024-bit MODP group(2)

7/16/15 11:43:20.633 AM racoon[1130]: pre-shared key(1)

7/16/15 11:43:20.633 AM racoon[1130]: 0

7/16/15 11:43:20.633 AM racoon[1130]: 0

7/16/15 11:43:20.633 AM racoon[1130]: lifetime = 3600

7/16/15 11:43:20.634 AM racoon[1130]: lifebyte = 0

7/16/15 11:43:20.634 AM racoon[1130]: encklen=0

7/16/15 11:43:20.634 AM racoon[1130]: p:1 t:6

7/16/15 11:43:20.634 AM racoon[1130]: 3DES-CBC(5)

7/16/15 11:43:20.634 AM racoon[1130]: MD5(1)

7/16/15 11:43:20.634 AM racoon[1130]: 1024-bit MODP group(2)

7/16/15 11:43:20.634 AM racoon[1130]: pre-shared key(1)

7/16/15 11:43:20.634 AM racoon[1130]: 0

7/16/15 11:43:20.634 AM racoon[1130]: 0

7/16/15 11:43:20.635 AM racoon[1130]: parse succeeded.

7/16/15 11:43:20.635 AM racoon[1130]: plogsetfile: about to add racoon log file: /var/log/racoon.log

7/16/15 11:43:20.635 AM racoon[1130]: racoon launched by launchd.

7/16/15 11:43:20.641 AM racoon[1130]: my interface: ::1 (lo0)

7/16/15 11:43:20.641 AM racoon[1130]: my interface: 127.0.0.1 (lo0)

7/16/15 11:43:20.641 AM racoon[1130]: my interface: fe80::1%lo0 (lo0)

7/16/15 11:43:20.641 AM racoon[1130]: my interface: fe80::2acf:daff:fedc:defc%en1 (en1)

7/16/15 11:43:20.642 AM racoon[1130]: my interface: xxx.xxx.xx.xx (en1)

7/16/15 11:43:20.642 AM racoon[1130]: configuring default isakmp port.

7/16/15 11:43:20.642 AM racoon[1130]: 10 addrs are configured successfully

7/16/15 11:43:20.642 AM racoon[1130]: xxx.xxx.xx.xx[500] used as isakmp port (fd=7)

7/16/15 11:43:20.642 AM racoon[1130]: xxx.xxx.xx.xx[4500] used as isakmp port (fd=8)

7/16/15 11:43:20.642 AM racoon[1130]: fe80::2acf:daff:fedc:defc%en1[500] used as isakmp port (fd=9)

7/16/15 11:43:20.643 AM racoon[1130]: fe80::2acf:daff:fedc:defc%en1[4500] used as isakmp port (fd=10)

7/16/15 11:43:20.643 AM racoon[1130]: fe80::1%lo0[500] used as isakmp port (fd=11)

7/16/15 11:43:20.643 AM racoon[1130]: fe80::1%lo0[4500] used as isakmp port (fd=12)

7/16/15 11:43:20.643 AM racoon[1130]: 127.0.0.1[500] used as isakmp port (fd=13)

7/16/15 11:43:20.643 AM racoon[1130]: 127.0.0.1[4500] used as isakmp port (fd=14)

7/16/15 11:43:20.643 AM racoon[1130]: ::1[500] used as isakmp port (fd=15)

7/16/15 11:43:20.644 AM racoon[1130]: ::1[4500] used as isakmp port (fd=16)

7/16/15 11:43:20.644 AM racoon[1130]: found launchd socket.

7/16/15 11:43:20.649 AM racoon[1130]: accepted connection on vpn control socket.

7/16/15 11:43:20.649 AM racoon[1130]: received bind command on vpn control socket.

7/16/15 11:43:20.649 AM racoon[1130]: checking listen addrs: xxx.xxx.xx.xx[500]

7/16/15 11:43:20.649 AM racoon[1130]: suitable outbound SP found: xxx.xxx.xx.xx/32[57041] xxx.xxx.xxx.xxx/32[1701] proto=udp dir=out.

7/16/15 11:43:20.649 AM racoon[1130]: Suitable inbound SP found: xxx.xxx.xxx.xxx/32[1701] xxx.xxx.xx.xx/32[57041] proto=udp dir=in.

7/16/15 11:43:20.650 AM racoon[1130]: configuration found for xxx.xxx.xxx.xxx.

7/16/15 11:43:20.650 AM racoon[1130]: *** New Phase 2

7/16/15 11:43:20.650 AM racoon[1130]: Got new Phase 2 version 16

7/16/15 11:43:20.650 AM racoon[1130]: ****** state changed to: IKEv1 quick I start

7/16/15 11:43:20.650 AM racoon[1130]: new acquire xxx.xxx.xx.xx/32[57041] xxx.xxx.xxx.xxx/32[1701] proto=udp dir=out

7/16/15 11:43:20.650 AM racoon[1130]: (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Transport reqid=0:0)

7/16/15 11:43:20.650 AM racoon[1130]: (trns_id=AES encklen=256 authtype=hmac-sha)

7/16/15 11:43:20.651 AM racoon[1130]: (trns_id=AES encklen=256 authtype=hmac-md5)

7/16/15 11:43:20.651 AM racoon[1130]: (trns_id=AES encklen=128 authtype=hmac-sha)

7/16/15 11:43:20.651 AM racoon[1130]: (trns_id=AES encklen=128 authtype=hmac-md5)

7/16/15 11:43:20.651 AM racoon[1130]: (trns_id=3DES encklen=0 authtype=hmac-sha)

7/16/15 11:43:20.651 AM racoon[1130]: (trns_id=3DES encklen=0 authtype=hmac-md5)

7/16/15 11:43:20.651 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[0].

7/16/15 11:43:20.651 AM racoon[1130]: New IKE-Session to xxx.xxx.xxx.xxx[0].

7/16/15 11:43:20.651 AM racoon[1130]: Connecting.

7/16/15 11:43:20.652 AM racoon[1130]: In post_acquire

7/16/15 11:43:20.652 AM racoon[1130]: configuration found for xxx.xxx.xxx.xxx.

7/16/15 11:43:20.652 AM racoon[1130]: ike_session_has_other_negoing_ph2: ph2 sub spid 13, db spid 13

7/16/15 11:43:20.652 AM racoon[1130]: IPsec-SA request for xxx.xxx.xxx.xxx queued due to no Phase 1 found.

7/16/15 11:43:20.652 AM racoon[1130]: *** New Phase 1

7/16/15 11:43:20.652 AM racoon[1130]: ****** state changed to: IKEv1 ident I start

7/16/15 11:43:20.652 AM racoon[1130]: ===

7/16/15 11:43:20.652 AM racoon[1130]: initiate new phase 1 negotiation: xxx.xxx.xx.xx[500]<=>xxx.xxx.xxx.xxx[500]

7/16/15 11:43:20.653 AM racoon[1130]: begin Identity Protection mode.

7/16/15 11:43:20.653 AM racoon[1130]: IPSec Phase 1 started (Initiated by me).

7/16/15 11:43:20.653 AM racoon[1130]: new cookie:

a7a8dc5aee482312

7/16/15 11:43:20.653 AM racoon[1130]: add payload of len 224, next type 13

7/16/15 11:43:20.653 AM racoon[1130]: add payload of len 16, next type 13

7/16/15 11:43:20.653 AM racoon[1130]: add payload of len 16, next type 13

7/16/15 11:43:20.653 AM racoon[1130]: add payload of len 16, next type 13

7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 16, next type 13

7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 16, next type 13

7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 16, next type 13

7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 16, next type 13

7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 16, next type 13

7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 16, next type 13

7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 16, next type 13

7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 20, next type 13

7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 16, next type 0

7/16/15 11:43:20.654 AM racoon[1130]: 500 bytes from xxx.xxx.xx.xx[500] to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:20.655 AM racoon[1130]: sockname xxx.xxx.xx.xx[500]

7/16/15 11:43:20.655 AM racoon[1130]: send packet from xxx.xxx.xx.xx[500]

7/16/15 11:43:20.655 AM racoon[1130]: send packet to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:20.655 AM racoon[1130]: @@@@@@ data being sent:




<<<omitted>>>





7/16/15 11:43:20.656 AM racoon[1130]: 1 times of 500 bytes message will be sent to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:20.656 AM racoon[1130]: Resend Phase 1 packet a7a8dc5aee482312:0000000000000000

7/16/15 11:43:20.656 AM racoon[1130]: ****** state changed to: IKEv1 ident I msg1 sent

7/16/15 11:43:20.656 AM racoon[1130]: IKE Packet: transmit success. (Initiator, Main-Mode message 1).

7/16/15 11:43:20.656 AM racoon[1130]: >>>>> phase change status = Phase 1 started by us

7/16/15 11:43:20.656 AM racoon[1130]: vpn control writing 20 bytes

7/16/15 11:43:20.657 AM racoon[1130]: @@@@@@ data from readmsg:


<<<omitted>>>



7/16/15 11:43:20.658 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:20.658 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].

7/16/15 11:43:20.658 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:20.658 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].

7/16/15 11:43:20.658 AM racoon[1130]: Best-match IKE-Session to xxx.xxx.xxx.xxx[0].

7/16/15 11:43:20.658 AM racoon[1130]: 176 bytes message received from xxx.xxx.xxx.xxx[500] to xxx.xxx.xx.xx[500]

7/16/15 11:43:20.658 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:20.658 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].

7/16/15 11:43:20.658 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:20.658 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].

7/16/15 11:43:20.658 AM racoon[1130]: Best-match IKE-Session to xxx.xxx.xxx.xxx[0].

7/16/15 11:43:20.659 AM racoon[1130]: begin.

7/16/15 11:43:20.659 AM racoon[1130]: seen nptype=1(sa)

7/16/15 11:43:20.659 AM racoon[1130]: seen nptype=13(vid)

7/16/15 11:43:20.659 AM racoon[1130]: seen nptype=13(vid)

7/16/15 11:43:20.659 AM racoon[1130]: seen nptype=13(vid)

7/16/15 11:43:20.659 AM racoon[1130]: seen nptype=13(vid)

7/16/15 11:43:20.659 AM racoon[1130]: seen nptype=13(vid)

7/16/15 11:43:20.659 AM racoon[1130]: succeed.

7/16/15 11:43:20.659 AM racoon[1130]: received unknown Vendor ID:


882fe56d 6fd20dbc 2251613b 2ebe5beb

7/16/15 11:43:20.659 AM racoon[1130]: received Vendor ID: CISCO-UNITY

7/16/15 11:43:20.659 AM racoon[1130]: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt

7/16/15 11:43:20.659 AM racoon[1130]: received Vendor ID: DPD

7/16/15 11:43:20.659 AM racoon[1130]: received Vendor ID: RFC 3947

7/16/15 11:43:20.659 AM racoon[1130]: Selected NAT-T version: RFC 3947

7/16/15 11:43:20.659 AM racoon[1130]: begin.

7/16/15 11:43:20.660 AM racoon[1130]: seen nptype=2(prop)

7/16/15 11:43:20.660 AM racoon[1130]: succeed.

7/16/15 11:43:20.660 AM racoon[1130]: proposal #1 len=44

7/16/15 11:43:20.660 AM racoon[1130]: begin.

7/16/15 11:43:20.660 AM racoon[1130]: seen nptype=3(trns)

7/16/15 11:43:20.660 AM racoon[1130]: succeed.

7/16/15 11:43:20.660 AM racoon[1130]: transform #1 len=36

7/16/15 11:43:20.660 AM racoon[1130]: type=Life Type, flag=0x8000, lorv=seconds

7/16/15 11:43:20.660 AM racoon[1130]: type=Life Duration, flag=0x8000, lorv=3600

7/16/15 11:43:20.660 AM racoon[1130]: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC

7/16/15 11:43:20.660 AM racoon[1130]: encryption(aes)

7/16/15 11:43:20.660 AM racoon[1130]: type=Key Length, flag=0x8000, lorv=256

7/16/15 11:43:20.660 AM racoon[1130]: type=Authentication Method, flag=0x8000, lorv=pre-shared key

7/16/15 11:43:20.660 AM racoon[1130]: type=Hash Algorithm, flag=0x8000, lorv=SHA

7/16/15 11:43:20.660 AM racoon[1130]: hash(sha1)

7/16/15 11:43:20.660 AM racoon[1130]: type=Group Description, flag=0x8000, lorv=1024-bit MODP group

7/16/15 11:43:20.661 AM racoon[1130]: hmac(modp1024)

7/16/15 11:43:20.661 AM racoon[1130]: pair 1:

7/16/15 11:43:20.661 AM racoon[1130]: 0x7fd9420007d0: next=0x0 tnext=0x0

7/16/15 11:43:20.661 AM racoon[1130]: proposal #1: 1 transform

7/16/15 11:43:20.661 AM racoon[1130]: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1

7/16/15 11:43:20.661 AM racoon[1130]: trns#=1, trns-id=IKE

7/16/15 11:43:20.661 AM racoon[1130]: type=Life Type, flag=0x8000, lorv=seconds

7/16/15 11:43:20.661 AM racoon[1130]: type=Life Duration, flag=0x8000, lorv=3600

7/16/15 11:43:20.661 AM racoon[1130]: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC

7/16/15 11:43:20.661 AM racoon[1130]: type=Key Length, flag=0x8000, lorv=256

7/16/15 11:43:20.661 AM racoon[1130]: type=Authentication Method, flag=0x8000, lorv=pre-shared key

7/16/15 11:43:20.661 AM racoon[1130]: type=Hash Algorithm, flag=0x8000, lorv=SHA

7/16/15 11:43:20.661 AM racoon[1130]: type=Group Description, flag=0x8000, lorv=1024-bit MODP group

7/16/15 11:43:20.661 AM racoon[1130]: Compared: DB:Peer

7/16/15 11:43:20.661 AM racoon[1130]: (version = 0:0)

7/16/15 11:43:20.662 AM racoon[1130]: (lifetime = 3600:3600)

7/16/15 11:43:20.662 AM racoon[1130]: (lifebyte = 0:0)

7/16/15 11:43:20.662 AM racoon[1130]: enctype = AES-CBC:AES-CBC

7/16/15 11:43:20.662 AM racoon[1130]: (encklen = 256:256)

7/16/15 11:43:20.662 AM racoon[1130]: hashtype = SHA:SHA

7/16/15 11:43:20.662 AM racoon[1130]: authmethod = pre-shared key:pre-shared key

7/16/15 11:43:20.662 AM racoon[1130]: dh_group = 1024-bit MODP group:1024-bit MODP group

7/16/15 11:43:20.662 AM racoon[1130]: an acceptable proposal found.

7/16/15 11:43:20.662 AM racoon[1130]: hmac(modp1024)

7/16/15 11:43:20.662 AM racoon[1130]: agreed on pre-shared key auth.

7/16/15 11:43:20.662 AM racoon[1130]: ****** state changed to: IKEv1 ident I msg2 rcvd

7/16/15 11:43:20.662 AM racoon[1130]: >>>>> phase change status = Phase 1 started by peer

7/16/15 11:43:20.662 AM racoon[1130]: vpn control writing 20 bytes

7/16/15 11:43:20.662 AM racoon[1130]: IKE Packet: receive success. (Initiator, Main-Mode message 2).

7/16/15 11:43:20.662 AM racoon[1130]: ===

7/16/15 11:43:20.664 AM racoon[1130]: compute DH's private.

7/16/15 11:43:20.664 AM racoon[1130]: compute DH's public.

7/16/15 11:43:20.664 AM racoon[1130]: Hashing xxx.xxx.xxx.xxx[500] with algo #2

7/16/15 11:43:20.664 AM racoon[1130]: hash(sha1)

7/16/15 11:43:20.664 AM racoon[1130]: Hashing xxx.xxx.xx.xx[500] with algo #2

7/16/15 11:43:20.664 AM racoon[1130]: hash(sha1)

7/16/15 11:43:20.665 AM racoon[1130]: Adding remote and local NAT-D payloads.

7/16/15 11:43:20.665 AM racoon[1130]: add payload of len 128, next type 10

7/16/15 11:43:20.665 AM racoon[1130]: add payload of len 16, next type 20

7/16/15 11:43:20.665 AM racoon[1130]: add payload of len 20, next type 20

7/16/15 11:43:20.665 AM racoon[1130]: add payload of len 20, next type 0

7/16/15 11:43:20.665 AM racoon[1130]: 228 bytes from xxx.xxx.xx.xx[500] to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:20.665 AM racoon[1130]: sockname xxx.xxx.xx.xx[500]

7/16/15 11:43:20.665 AM racoon[1130]: send packet from xxx.xxx.xx.xx[500]

7/16/15 11:43:20.665 AM racoon[1130]: send packet to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:20.665 AM racoon[1130]: @@@@@@ data being sent:


<<<omitted>>>





7/16/15 11:43:20.665 AM racoon[1130]: 1 times of 228 bytes message will be sent to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:20.666 AM racoon[1130]: Resend Phase 1 packet a7a8dc5aee482312:f67ae2fd137051eb

7/16/15 11:43:20.666 AM racoon[1130]: ****** state changed to: IKEv1 ident I msg3 sent

7/16/15 11:43:20.666 AM racoon[1130]: IKE Packet: transmit success. (Initiator, Main-Mode message 3).

7/16/15 11:43:20.676 AM racoon[1130]: @@@@@@ data from readmsg:


<<<omitted>>>





7/16/15 11:43:20.676 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:20.677 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].

7/16/15 11:43:20.677 AM racoon[1130]: Best-match IKE-Session to xxx.xxx.xxx.xxx[0].

7/16/15 11:43:20.677 AM racoon[1130]: 228 bytes message received from xxx.xxx.xxx.xxx[500] to xxx.xxx.xx.xx[500]

7/16/15 11:43:20.677 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:20.677 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].

7/16/15 11:43:20.677 AM racoon[1130]: Best-match IKE-Session to xxx.xxx.xxx.xxx[0].

7/16/15 11:43:20.677 AM racoon[1130]: begin.

7/16/15 11:43:20.677 AM racoon[1130]: seen nptype=4(ke)

7/16/15 11:43:20.677 AM racoon[1130]: seen nptype=10(nonce)

7/16/15 11:43:20.677 AM racoon[1130]: seen nptype=20(nat-d)

7/16/15 11:43:20.677 AM racoon[1130]: seen nptype=20(nat-d)

7/16/15 11:43:20.677 AM racoon[1130]: succeed.

7/16/15 11:43:20.677 AM racoon[1130]: Hashing xxx.xxx.xx.xx[500] with algo #2

7/16/15 11:43:20.677 AM racoon[1130]: hash(sha1)

7/16/15 11:43:20.677 AM racoon[1130]: NAT-D payload #0 verified

7/16/15 11:43:20.678 AM racoon[1130]: Hashing xxx.xxx.xxx.xxx[500] with algo #2

7/16/15 11:43:20.678 AM racoon[1130]: hash(sha1)

7/16/15 11:43:20.678 AM racoon[1130]: NAT-D payload #1 verified

7/16/15 11:43:20.678 AM racoon[1130]: NAT not detected

7/16/15 11:43:20.678 AM racoon[1130]: ****** state changed to: IKEv1 ident I msg4 rcvd

7/16/15 11:43:20.678 AM racoon[1130]: IKE Packet: receive success. (Initiator, Main-Mode message 4).

7/16/15 11:43:20.678 AM racoon[1130]: ===

7/16/15 11:43:20.680 AM racoon[1130]: compute DH's shared.

7/16/15 11:43:20.680 AM racoon[1130]: Getting pre-shared key from keychain.

7/16/15 11:43:20.696 AM racoon[1130]: the psk found.

7/16/15 11:43:20.696 AM racoon[1130]: psk:

4b327650 6e403335 61746577 6a313836 38

7/16/15 11:43:20.696 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:20.696 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:20.696 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:20.696 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:20.696 AM racoon[1130]: encryption(aes)

7/16/15 11:43:20.696 AM racoon[1130]: hash(sha1)

7/16/15 11:43:20.697 AM racoon[1130]: len(SKEYID_e) < len(Ka) (20 < 32), generating long key (Ka = K1 | K2 | ...)

7/16/15 11:43:20.697 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:20.697 AM racoon[1130]: compute intermediate encryption key K1

7/16/15 11:43:20.697 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:20.697 AM racoon[1130]: compute intermediate encryption key K2

7/16/15 11:43:20.697 AM racoon[1130]: hash(sha1)

7/16/15 11:43:20.697 AM racoon[1130]: encryption(aes)

7/16/15 11:43:20.697 AM racoon[1130]: use ID type of IPv4_address


011101f4 0a14000b

7/16/15 11:43:20.697 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:20.697 AM racoon[1130]: added initial-contact payload.

7/16/15 11:43:20.697 AM racoon[1130]: add payload of len 8, next type 8

7/16/15 11:43:20.698 AM racoon[1130]: add payload of len 20, next type 11

7/16/15 11:43:20.698 AM racoon[1130]: add payload of len 24, next type 0

7/16/15 11:43:20.698 AM racoon[1130]: Begin encryption.

7/16/15 11:43:20.698 AM racoon[1130]: encryption(aes)

7/16/15 11:43:20.698 AM racoon[1130]: pad length = 16

7/16/15 11:43:20.698 AM racoon[1130]: About to encrypt 80 bytes

0800000c 011101f4 0a14000b 0b000018 742a9d49 093159fb a5784094 8192d086

6afe0b15 0000001c 00000001 01106002 a7a8dc5a ee482312 f67ae2fd 137051eb

00000000 00000000 00000000 00000010

7/16/15 11:43:20.698 AM racoon[1130]: encryption(aes)

7/16/15 11:43:20.698 AM racoon[1130]: Encrypted.

7/16/15 11:43:20.698 AM racoon[1130]: 108 bytes from xxx.xxx.xx.xx[500] to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:20.698 AM racoon[1130]: sockname xxx.xxx.xx.xx[500]

7/16/15 11:43:20.698 AM racoon[1130]: send packet from xxx.xxx.xx.xx[500]

7/16/15 11:43:20.698 AM racoon[1130]: send packet to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:20.698 AM racoon[1130]: @@@@@@ data being sent:


<<<omitted>>>



7/16/15 11:43:20.699 AM racoon[1130]: 1 times of 108 bytes message will be sent to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:20.699 AM racoon[1130]: Resend Phase 1 packet a7a8dc5aee482312:f67ae2fd137051eb

7/16/15 11:43:20.699 AM racoon[1130]: ****** state changed to: IKEv1 ident I msg5 sent

7/16/15 11:43:20.699 AM racoon[1130]: IKE Packet: transmit success. (Initiator, Main-Mode message 5).

7/16/15 11:43:20.702 AM racoon[1130]: @@@@@@ data from readmsg:


<<<omitted>>>





7/16/15 11:43:20.702 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:20.702 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].

7/16/15 11:43:20.702 AM racoon[1130]: Best-match IKE-Session to xxx.xxx.xxx.xxx[0].

7/16/15 11:43:20.702 AM racoon[1130]: 76 bytes message received from xxx.xxx.xxx.xxx[500] to xxx.xxx.xx.xx[500]

7/16/15 11:43:20.702 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:20.702 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].

7/16/15 11:43:20.702 AM racoon[1130]: Best-match IKE-Session to xxx.xxx.xxx.xxx[0].

7/16/15 11:43:20.702 AM racoon[1130]: Begin decryption.

7/16/15 11:43:20.703 AM racoon[1130]: encryption(aes)

7/16/15 11:43:20.703 AM racoon[1130]: IV was saved for next processing:


43410d22 8a4b0dbe 0ce5ca62 d20880dc

7/16/15 11:43:20.703 AM racoon[1130]: encryption(aes)

7/16/15 11:43:20.703 AM racoon[1130]: decrypted payload by IV:

7/16/15 11:43:20.703 AM racoon[1130]: padding len=0

7/16/15 11:43:20.703 AM racoon[1130]: skip to trim padding.

7/16/15 11:43:20.703 AM racoon[1130]: decrypted.

7/16/15 11:43:20.703 AM racoon[1130]: begin.

7/16/15 11:43:20.703 AM racoon[1130]: seen nptype=5(id)

7/16/15 11:43:20.703 AM racoon[1130]: seen nptype=8(hash)

7/16/15 11:43:20.703 AM racoon[1130]: succeed.

7/16/15 11:43:20.703 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:20.703 AM racoon[1130]: HASH for PSK validated.

7/16/15 11:43:20.703 AM racoon[1130]: IKEv1 Phase 1 AUTH: success. (Initiator, Main-Mode Message 6).

7/16/15 11:43:20.703 AM racoon[1130]: peer's ID:

01000000 d8abb57a

7/16/15 11:43:20.704 AM racoon[1130]: ****** state changed to: IKEv1 ident I msg6 rcvd

7/16/15 11:43:20.704 AM racoon[1130]: IKE Packet: receive success. (Initiator, Main-Mode message 6).

7/16/15 11:43:20.704 AM racoon[1130]: ===

7/16/15 11:43:20.704 AM racoon[1130]: ****** state changed to: Phase 1 Established

7/16/15 11:43:20.704 AM racoon[1130]: IKEv1 Phase 1 Initiator: success. (Initiator, Main-Mode).

7/16/15 11:43:20.704 AM racoon[1130]: ISAKMP-SA established xxx.xxx.xx.xx[500]-xxx.xxx.xxx.xxx[500] spi:a7a8dc5aee482312:f67ae2fd137051eb

7/16/15 11:43:20.704 AM racoon[1130]: IPSec Phase 1 established (Initiated by me).

7/16/15 11:43:20.704 AM racoon[1130]: ===

7/16/15 11:43:21.750 AM racoon[1130]: CHKPH1THERE: got a ph1 handler, setting ports.

7/16/15 11:43:21.751 AM racoon[1130]: iph1->local: xxx.xxx.xx.xx[500]

7/16/15 11:43:21.751 AM racoon[1130]: iph1->remote: xxx.xxx.xxx.xxx[500]

7/16/15 11:43:21.751 AM racoon[1130]: before:

7/16/15 11:43:21.751 AM racoon[1130]: src: xxx.xxx.xx.xx[0]

7/16/15 11:43:21.751 AM racoon[1130]: dst: xxx.xxx.xxx.xxx[0]

7/16/15 11:43:21.752 AM racoon[1130]: After:

7/16/15 11:43:21.752 AM racoon[1130]: src: xxx.xxx.xx.xx[500]

7/16/15 11:43:21.752 AM racoon[1130]: dst: xxx.xxx.xxx.xxx[500]

7/16/15 11:43:21.752 AM racoon[1130]: ===

7/16/15 11:43:21.752 AM racoon[1130]: begin QUICK mode.

7/16/15 11:43:21.752 AM racoon[1130]: initiate new phase 2 negotiation: xxx.xxx.xx.xx[500]<=>xxx.xxx.xxx.xxx[500]

7/16/15 11:43:21.752 AM racoon[1130]: ****** state changed to: IKEv1 quick I start

7/16/15 11:43:21.752 AM racoon[1130]: IPSec Phase 2 started (Initiated by me).

7/16/15 11:43:21.753 AM racoon[1130]: Compute IV for Phase 2

7/16/15 11:43:21.753 AM racoon[1130]: hash(sha1)

7/16/15 11:43:21.753 AM racoon[1130]: encryption(aes)

7/16/15 11:43:21.753 AM racoon[1130]: ****** state changed to: IKEv1 quick I getspi sent

7/16/15 11:43:21.753 AM racoon[1130]: call pfkey_send_getspi

7/16/15 11:43:21.753 AM racoon[1130]: pfkey GETSPI sent: ESP/Transport xxx.xxx.xxx.xxx[500]->xxx.xxx.xx.xx[500]

7/16/15 11:43:21.753 AM racoon[1130]: pfkey getspi sent.

7/16/15 11:43:21.754 AM racoon[1130]: >>>>> phase change status = Phase 2 started

7/16/15 11:43:21.754 AM racoon[1130]: vpn control writing 20 bytes

7/16/15 11:43:21.754 AM racoon[1130]: pfkey GETSPI succeeded: ESP/Transport xxx.xxx.xxx.xxx[500]->xxx.xxx.xx.xx[500] spi=259806009(0xf7c5339)

7/16/15 11:43:21.754 AM racoon[1130]: ****** state changed to: IKEv1 quick I getspi done

7/16/15 11:43:21.754 AM racoon[1130]: use local ID type IPv4_address


0111ded1 0a14000b

7/16/15 11:43:21.754 AM racoon[1130]: use remote ID type IPv4_address


0111ded1 0a14000b

7/16/15 11:43:21.754 AM racoon[1130]: IDci:


0111ded1 0a14000b

7/16/15 11:43:21.755 AM racoon[1130]: IDcr:


011106a5 d8abb57a

7/16/15 11:43:21.755 AM racoon[1130]: add payload of len 180, next type 10

7/16/15 11:43:21.755 AM racoon[1130]: add payload of len 16, next type 5

7/16/15 11:43:21.755 AM racoon[1130]: add payload of len 8, next type 5

7/16/15 11:43:21.755 AM racoon[1130]: add payload of len 8, next type 0

7/16/15 11:43:21.755 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:21.755 AM racoon[1130]: add payload of len 20, next type 1

7/16/15 11:43:21.755 AM racoon[1130]: Begin encryption.

7/16/15 11:43:21.755 AM racoon[1130]: encryption(aes)

7/16/15 11:43:21.756 AM racoon[1130]: pad length = 4

7/16/15 11:43:21.756 AM racoon[1130]: About to encrypt 256 bytes

<<<omitted>>>


7/16/15 11:43:21.756 AM racoon[1130]: encryption(aes)

7/16/15 11:43:21.756 AM racoon[1130]: Encrypted.

7/16/15 11:43:21.756 AM racoon[1130]: 284 bytes from xxx.xxx.xx.xx[500] to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:21.756 AM racoon[1130]: sockname xxx.xxx.xx.xx[500]

7/16/15 11:43:21.756 AM racoon[1130]: send packet from xxx.xxx.xx.xx[500]

7/16/15 11:43:21.756 AM racoon[1130]: send packet to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:21.757 AM racoon[1130]: @@@@@@ data being sent:


<<<omitted>>>


7/16/15 11:43:21.757 AM racoon[1130]: 1 times of 284 bytes message will be sent to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:21.757 AM racoon[1130]: Resend Phase 2 packet a7a8dc5aee482312:f67ae2fd137051eb:0000baab

7/16/15 11:43:21.757 AM racoon[1130]: ****** state changed to: IKEv1 quick I msg1 sent

7/16/15 11:43:21.757 AM racoon[1130]: IKE Packet: transmit success. (Initiator, Quick-Mode message 1).

7/16/15 11:43:21.760 AM racoon[1130]: @@@@@@ data from readmsg:

<<<omitted>>>


7/16/15 11:43:21.760 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:21.761 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].

7/16/15 11:43:21.761 AM racoon[1130]: Best-match IKE-Session to xxx.xxx.xxx.xxx[0].

7/16/15 11:43:21.761 AM racoon[1130]: 156 bytes message received from xxx.xxx.xxx.xxx[500] to xxx.xxx.xx.xx[500]

7/16/15 11:43:21.761 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:21.761 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].

7/16/15 11:43:21.761 AM racoon[1130]: Best-match IKE-Session to xxx.xxx.xxx.xxx[0].

7/16/15 11:43:21.761 AM racoon[1130]: Begin decryption.

7/16/15 11:43:21.761 AM racoon[1130]: encryption(aes)

7/16/15 11:43:21.762 AM racoon[1130]: IV was saved for next processing:


d629dc0b c35a030f c9b3c159 f2a43770

7/16/15 11:43:21.762 AM racoon[1130]: encryption(aes)

7/16/15 11:43:21.762 AM racoon[1130]: decrypted payload by IV:

7/16/15 11:43:21.762 AM racoon[1130]: padding len=0

7/16/15 11:43:21.762 AM racoon[1130]: skip to trim padding.

7/16/15 11:43:21.762 AM racoon[1130]: decrypted.

7/16/15 11:43:21.762 AM racoon[1130]: begin.

7/16/15 11:43:21.762 AM racoon[1130]: seen nptype=8(hash)

7/16/15 11:43:21.762 AM racoon[1130]: seen nptype=1(sa)

7/16/15 11:43:21.762 AM racoon[1130]: seen nptype=10(nonce)

7/16/15 11:43:21.762 AM racoon[1130]: seen nptype=5(id)

7/16/15 11:43:21.763 AM racoon[1130]: seen nptype=5(id)

7/16/15 11:43:21.763 AM racoon[1130]: succeed.

7/16/15 11:43:21.763 AM racoon[1130]: HASH allocated:hbuf->l=144 actual:tlen=112

7/16/15 11:43:21.763 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:21.763 AM racoon[1130]: begin.

7/16/15 11:43:21.763 AM racoon[1130]: seen nptype=2(prop)

7/16/15 11:43:21.763 AM racoon[1130]: succeed.

7/16/15 11:43:21.763 AM racoon[1130]: proposal #1 len=172

7/16/15 11:43:21.763 AM racoon[1130]: begin.

7/16/15 11:43:21.763 AM racoon[1130]: seen nptype=3(trns)

7/16/15 11:43:21.763 AM racoon[1130]: seen nptype=3(trns)

7/16/15 11:43:21.763 AM racoon[1130]: seen nptype=3(trns)

7/16/15 11:43:21.764 AM racoon[1130]: seen nptype=3(trns)

7/16/15 11:43:21.764 AM racoon[1130]: seen nptype=3(trns)

7/16/15 11:43:21.764 AM racoon[1130]: seen nptype=3(trns)

7/16/15 11:43:21.764 AM racoon[1130]: succeed.

7/16/15 11:43:21.764 AM racoon[1130]: transform #1 len=28

7/16/15 11:43:21.764 AM racoon[1130]: type=SA Life Type, flag=0x8000, lorv=seconds

7/16/15 11:43:21.764 AM racoon[1130]: type=SA Life Duration, flag=0x8000, lorv=3600

7/16/15 11:43:21.764 AM racoon[1130]: life duration was in TLV.

7/16/15 11:43:21.764 AM racoon[1130]: type=Encryption Mode, flag=0x8000, lorv=Transport

7/16/15 11:43:21.764 AM racoon[1130]: type=Key Length, flag=0x8000, lorv=256

7/16/15 11:43:21.764 AM racoon[1130]: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha

7/16/15 11:43:21.764 AM racoon[1130]: transform #2 len=28

7/16/15 11:43:21.765 AM racoon[1130]: type=SA Life Type, flag=0x8000, lorv=seconds

7/16/15 11:43:21.765 AM racoon[1130]: type=SA Life Duration, flag=0x8000, lorv=3600

7/16/15 11:43:21.765 AM racoon[1130]: life duration was in TLV.

7/16/15 11:43:21.765 AM racoon[1130]: type=Encryption Mode, flag=0x8000, lorv=Transport

7/16/15 11:43:21.765 AM racoon[1130]: type=Key Length, flag=0x8000, lorv=256

7/16/15 11:43:21.765 AM racoon[1130]: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5

7/16/15 11:43:21.765 AM racoon[1130]: transform #3 len=28

7/16/15 11:43:21.765 AM racoon[1130]: type=SA Life Type, flag=0x8000, lorv=seconds

7/16/15 11:43:21.765 AM racoon[1130]: type=SA Life Duration, flag=0x8000, lorv=3600

7/16/15 11:43:21.765 AM racoon[1130]: life duration was in TLV.

7/16/15 11:43:21.765 AM racoon[1130]: type=Encryption Mode, flag=0x8000, lorv=Transport

7/16/15 11:43:21.765 AM racoon[1130]: type=Key Length, flag=0x8000, lorv=128

7/16/15 11:43:21.765 AM racoon[1130]: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha

7/16/15 11:43:21.765 AM racoon[1130]: transform #4 len=28

7/16/15 11:43:21.765 AM racoon[1130]: type=SA Life Type, flag=0x8000, lorv=seconds

7/16/15 11:43:21.766 AM racoon[1130]: type=SA Life Duration, flag=0x8000, lorv=3600

7/16/15 11:43:21.766 AM racoon[1130]: life duration was in TLV.

7/16/15 11:43:21.766 AM racoon[1130]: type=Encryption Mode, flag=0x8000, lorv=Transport

7/16/15 11:43:21.766 AM racoon[1130]: type=Key Length, flag=0x8000, lorv=128

7/16/15 11:43:21.766 AM racoon[1130]: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5

7/16/15 11:43:21.766 AM racoon[1130]: transform #5 len=24

7/16/15 11:43:21.766 AM racoon[1130]: type=SA Life Type, flag=0x8000, lorv=seconds

7/16/15 11:43:21.766 AM racoon[1130]: type=SA Life Duration, flag=0x8000, lorv=3600

7/16/15 11:43:21.766 AM racoon[1130]: life duration was in TLV.

7/16/15 11:43:21.766 AM racoon[1130]: type=Encryption Mode, flag=0x8000, lorv=Transport

7/16/15 11:43:21.766 AM racoon[1130]: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha

7/16/15 11:43:21.766 AM racoon[1130]: transform #6 len=24

7/16/15 11:43:21.766 AM racoon[1130]: type=SA Life Type, flag=0x8000, lorv=seconds

7/16/15 11:43:21.766 AM racoon[1130]: type=SA Life Duration, flag=0x8000, lorv=3600

7/16/15 11:43:21.766 AM racoon[1130]: life duration was in TLV.

7/16/15 11:43:21.766 AM racoon[1130]: type=Encryption Mode, flag=0x8000, lorv=Transport

7/16/15 11:43:21.767 AM racoon[1130]: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5

7/16/15 11:43:21.767 AM racoon[1130]: pair 1:

7/16/15 11:43:21.767 AM racoon[1130]: 0x7fd940513390: next=0x0 tnext=0x7fd940512d20

7/16/15 11:43:21.767 AM racoon[1130]: 0x7fd940512d20: next=0x0 tnext=0x7fd940512d40

7/16/15 11:43:21.767 AM racoon[1130]: 0x7fd940512d40: next=0x0 tnext=0x7fd940512d60

7/16/15 11:43:21.767 AM racoon[1130]: 0x7fd940512d60: next=0x0 tnext=0x7fd940512d80

7/16/15 11:43:21.767 AM racoon[1130]: 0x7fd940512d80: next=0x0 tnext=0x7fd940512da0

7/16/15 11:43:21.767 AM racoon[1130]: 0x7fd940512da0: next=0x0 tnext=0x0

7/16/15 11:43:21.767 AM racoon[1130]: proposal #1: 6 transform

7/16/15 11:43:21.767 AM racoon[1130]: begin.

7/16/15 11:43:21.767 AM racoon[1130]: seen nptype=2(prop)

7/16/15 11:43:21.767 AM racoon[1130]: succeed.

7/16/15 11:43:21.767 AM racoon[1130]: proposal #1 len=40

7/16/15 11:43:21.767 AM racoon[1130]: begin.

7/16/15 11:43:21.767 AM racoon[1130]: seen nptype=3(trns)

7/16/15 11:43:21.768 AM racoon[1130]: succeed.

7/16/15 11:43:21.768 AM racoon[1130]: transform #1 len=28

7/16/15 11:43:21.768 AM racoon[1130]: type=SA Life Type, flag=0x8000, lorv=seconds

7/16/15 11:43:21.768 AM racoon[1130]: type=SA Life Duration, flag=0x8000, lorv=3600

7/16/15 11:43:21.768 AM racoon[1130]: life duration was in TLV.

7/16/15 11:43:21.768 AM racoon[1130]: type=Encryption Mode, flag=0x8000, lorv=Transport

7/16/15 11:43:21.768 AM racoon[1130]: type=Key Length, flag=0x8000, lorv=256

7/16/15 11:43:21.768 AM racoon[1130]: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha

7/16/15 11:43:21.768 AM racoon[1130]: pair 1:

7/16/15 11:43:21.768 AM racoon[1130]: 0x7fd940512cd0: next=0x0 tnext=0x0

7/16/15 11:43:21.768 AM racoon[1130]: proposal #1: 1 transform

7/16/15 11:43:21.768 AM racoon[1130]: begin compare proposals.

7/16/15 11:43:21.768 AM racoon[1130]: pair[1]: 0x7fd940512cd0

7/16/15 11:43:21.768 AM racoon[1130]: 0x7fd940512cd0: next=0x0 tnext=0x0

7/16/15 11:43:21.768 AM racoon[1130]: prop#=1 prot-id=ESP spi-size=4 #trns=1 trns#=1 trns-id=AES

7/16/15 11:43:21.768 AM racoon[1130]: type=SA Life Type, flag=0x8000, lorv=seconds

7/16/15 11:43:21.769 AM racoon[1130]: type=SA Life Duration, flag=0x8000, lorv=3600

7/16/15 11:43:21.769 AM racoon[1130]: type=Encryption Mode, flag=0x8000, lorv=Transport

7/16/15 11:43:21.769 AM racoon[1130]: type=Key Length, flag=0x8000, lorv=256

7/16/15 11:43:21.769 AM racoon[1130]: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha

7/16/15 11:43:21.769 AM racoon[1130]: peer's single bundle:

7/16/15 11:43:21.769 AM racoon[1130]: (proto_id=ESP spisize=4 spi=97ad5907 spi_p=00000000 encmode=Transport reqid=0:0)

7/16/15 11:43:21.769 AM racoon[1130]: (trns_id=AES encklen=256 authtype=hmac-sha)

7/16/15 11:43:21.769 AM racoon[1130]: my single bundle:

7/16/15 11:43:21.769 AM racoon[1130]: (proto_id=ESP spisize=4 spi=0f7c5339 spi_p=00000000 encmode=Transport reqid=0:0)

7/16/15 11:43:21.769 AM racoon[1130]: (trns_id=AES encklen=256 authtype=hmac-sha)

7/16/15 11:43:21.769 AM racoon[1130]: (trns_id=AES encklen=256 authtype=hmac-md5)

7/16/15 11:43:21.769 AM racoon[1130]: (trns_id=AES encklen=128 authtype=hmac-sha)

7/16/15 11:43:21.769 AM racoon[1130]: (trns_id=AES encklen=128 authtype=hmac-md5)

7/16/15 11:43:21.769 AM racoon[1130]: (trns_id=3DES encklen=0 authtype=hmac-sha)

7/16/15 11:43:21.769 AM racoon[1130]: (trns_id=3DES encklen=0 authtype=hmac-md5)

7/16/15 11:43:21.770 AM racoon[1130]: matched

7/16/15 11:43:21.770 AM racoon[1130]: ****** state changed to: IKEv1 quick I msg2 rcvd

7/16/15 11:43:21.770 AM racoon[1130]: IKE Packet: receive success. (Initiator, Quick-Mode message 2).

7/16/15 11:43:21.770 AM racoon[1130]: HASH(3) generate

7/16/15 11:43:21.770 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:21.770 AM racoon[1130]: add payload of len 20, next type 0

7/16/15 11:43:21.770 AM racoon[1130]: Begin encryption.

7/16/15 11:43:21.770 AM racoon[1130]: encryption(aes)

7/16/15 11:43:21.770 AM racoon[1130]: pad length = 8

7/16/15 11:43:21.770 AM racoon[1130]: About to encrypt 32 bytes

00000018 3d7e6113 d37cec08 fac96413 84e0a4fd a3226a96 00000000 00000008

7/16/15 11:43:21.770 AM racoon[1130]: encryption(aes)

7/16/15 11:43:21.770 AM racoon[1130]: Encrypted.

7/16/15 11:43:21.770 AM racoon[1130]: 60 bytes from xxx.xxx.xx.xx[500] to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:21.770 AM racoon[1130]: sockname xxx.xxx.xx.xx[500]

7/16/15 11:43:21.771 AM racoon[1130]: send packet from xxx.xxx.xx.xx[500]

7/16/15 11:43:21.771 AM racoon[1130]: send packet to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:21.771 AM racoon[1130]: @@@@@@ data being sent:


a7a8dc5a ee482312 f67ae2fd 137051eb 08102001 baab357b 0000003c a25ef5b4

bfd350fa f580cfa8 37472b5c c35f66cc fe819336 850331cd 847f7314

7/16/15 11:43:21.771 AM racoon[1130]: 1 times of 60 bytes message will be sent to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:21.771 AM racoon[1130]: IKE Packet: transmit success. (Initiator, Quick-Mode message 3).

7/16/15 11:43:21.771 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:21.771 AM racoon[1130]: encryption(aes)

7/16/15 11:43:21.771 AM racoon[1130]: hmac(sha1)

7/16/15 11:43:21.771 AM racoon[1130]: encklen=256 authklen=160

7/16/15 11:43:21.771 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:21.771 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:21.771 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:21.771 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:21.771 AM racoon[1130]: encryption(aes)

7/16/15 11:43:21.772 AM racoon[1130]: hmac(sha1)

7/16/15 11:43:21.772 AM racoon[1130]: encklen=256 authklen=160

7/16/15 11:43:21.772 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:21.772 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:21.772 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:21.772 AM racoon[1130]: KEYMAT computed.

7/16/15 11:43:21.772 AM racoon[1130]: ****** state changed to: IKEv1 quick I addsa

7/16/15 11:43:21.772 AM racoon[1130]: call pk_sendupdate

7/16/15 11:43:21.772 AM racoon[1130]: encryption(aes)

7/16/15 11:43:21.772 AM racoon[1130]: hmac(sha1)

7/16/15 11:43:21.772 AM racoon[1130]: call pfkey_send_update: e_type 12, e_klen 32, a_type 2, a_klen 20

7/16/15 11:43:21.772 AM racoon[1130]: pfkey update sent.

7/16/15 11:43:21.772 AM racoon[1130]: encryption(aes)

7/16/15 11:43:21.772 AM racoon[1130]: hmac(sha1)

7/16/15 11:43:21.772 AM racoon[1130]: call pfkey_send_add: e_type 12, e_klen 32, a_type 2, a_klen 20

7/16/15 11:43:21.773 AM racoon[1130]: pfkey add sent.

7/16/15 11:43:21.773 AM racoon[1130]: pfkey UPDATE succeeded: ESP/Transport xxx.xxx.xxx.xxx[500]->xxx.xxx.xx.xx[500] spi=259806009(0xf7c5339)

7/16/15 11:43:21.773 AM racoon[1130]: IPsec-SA established: ESP/Transport xxx.xxx.xxx.xxx[500]->xxx.xxx.xx.xx[500] spi=259806009(0xf7c5339)

7/16/15 11:43:21.773 AM racoon[1130]: ****** state changed to: Phase 2 established

7/16/15 11:43:21.773 AM racoon[1130]: IKEv1 Phase 2 Initiator: success. (Initiator, Quick-Mode).

7/16/15 11:43:21.773 AM racoon[1130]: Connected.

com.apple.message.domain: com.apple.Networking.ipsec.connect.l2tpipsec

com.apple.message.result: success

com.apple.message.signature: success

Sender_Mach_UUID: 980C9AF3-2CF8-38E8-9159-FBDBDC39C538



7/16/15 11:43:21.773 AM racoon[1130]: ike_session_ph2_established: ph2 established, spid 13

7/16/15 11:43:21.774 AM racoon[1130]: IPSec Phase 2 established (Initiated by me).

7/16/15 11:43:21.774 AM racoon[1130]: ===

7/16/15 11:43:21.774 AM racoon[1130]: IPsec-SA established: ESP/Transport xxx.xxx.xx.xx[500]->xxx.xxx.xxx.xxx[500] spi=2544720135(0x97ad5907)

7/16/15 11:43:21.774 AM racoon[1130]: >>>>> phase change status = Phase 2 established

7/16/15 11:43:21.774 AM racoon[1130]: vpn control writing 20 bytes

7/16/15 11:43:21.774 AM racoon[1130]: ===

7/16/15 11:43:21.774 AM pppd[1129]: IPSec connection established

7/16/15 11:43:22.000 AM kernel[0]: AFP_VFS afpfs_DoReconnect: connect on /Volumes/IT failed 60.

7/16/15 11:43:22.000 AM kernel[0]: AFP_VFS afpfs_DoReconnect: connect to the server /Volumes/IT

7/16/15 11:43:37.000 AM kernel[0]: AFP_VFS afpfs_DoReconnect: connect on /Volumes/IT failed 60.

7/16/15 11:43:37.000 AM kernel[0]: AFP_VFS afpfs_DoReconnect: connect to the server /Volumes/IT

7/16/15 11:43:41.775 AM pppd[1129]: L2TP cannot connect to the server

7/16/15 11:43:41.777 AM racoon[1130]: caught rtm:2, need update interface address list

7/16/15 11:43:41.777 AM racoon[1130]: configuring default isakmp port.

7/16/15 11:43:41.778 AM racoon[1130]: 10 addrs are configured successfully

7/16/15 11:43:41.778 AM racoon[1130]: vpn_control socket closed by peer.

7/16/15 11:43:41.778 AM racoon[1130]: received disconnect all command.

7/16/15 11:43:41.778 AM racoon[1130]: IPSec disconnecting from server xxx.xxx.xxx.xxx

7/16/15 11:43:41.779 AM racoon[1130]: in ike_session_purgephXbydstaddrwop... purging Phase 2 structures

7/16/15 11:43:41.779 AM racoon[1130]: *** New Phase 2

7/16/15 11:43:41.779 AM racoon[1130]: ****** state changed to: IKEv1 info

7/16/15 11:43:41.779 AM racoon[1130]: Compute IV for Phase 2

7/16/15 11:43:41.780 AM racoon[1130]: hash(sha1)

7/16/15 11:43:41.780 AM racoon[1130]: encryption(aes)

7/16/15 11:43:41.780 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:41.780 AM racoon[1130]: Begin encryption.

7/16/15 11:43:41.780 AM racoon[1130]: encryption(aes)

7/16/15 11:43:41.780 AM racoon[1130]: pad length = 8

7/16/15 11:43:41.781 AM racoon[1130]: About to encrypt 48 bytes

0c000018 dc3ead4e a0a00632 234462b9 3cc875cc f1bfa5df 00000010 00000001

03040001 0f7c5339 00000000 00000008

7/16/15 11:43:41.781 AM racoon[1130]: encryption(aes)

7/16/15 11:43:41.781 AM racoon[1130]: Encrypted.

7/16/15 11:43:41.781 AM racoon[1130]: 76 bytes from xxx.xxx.xx.xx[500] to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:41.781 AM racoon[1130]: sockname xxx.xxx.xx.xx[500]

7/16/15 11:43:41.782 AM racoon[1130]: send packet from xxx.xxx.xx.xx[500]

7/16/15 11:43:41.782 AM racoon[1130]: send packet to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:41.782 AM racoon[1130]: @@@@@@ data being sent:


a7a8dc5a ee482312 f67ae2fd 137051eb 08100501 8a2bd78c 0000004c 0520d499

993e3d34 4c3743c0 a8984610 1905582c c6cb03cc a78965d1 3d341b53 25bb08c3

9d671471 83e3ce04 b84ab435

7/16/15 11:43:41.783 AM racoon[1130]: 1 times of 76 bytes message will be sent to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:41.783 AM racoon[1130]: sendto Information delete.

7/16/15 11:43:41.783 AM racoon[1130]: IKE Packet: transmit success. (Information message).

7/16/15 11:43:41.783 AM racoon[1130]: IV freed

7/16/15 11:43:41.784 AM racoon[1130]: IKEv1 Information-Notice: transmit success. (Delete IPSEC-SA).

7/16/15 11:43:41.784 AM racoon[1130]: Phase 2 sa expired xxx.xxx.xx.xx-xxx.xxx.xxx.xxx

7/16/15 11:43:41.784 AM racoon[1130]: ****** state changed to: Phase 2 expired

7/16/15 11:43:41.784 AM racoon[1130]: in ike_session_purgephXbydstaddrwop... purging Phase 1 and related Phase 2 structures

7/16/15 11:43:41.784 AM racoon[1130]: IPsec-SA needs to be purged: ESP xxx.xxx.xx.xx[500]->xxx.xxx.xxx.xxx[500] spi=218103808(0xd000000)

7/16/15 11:43:41.785 AM racoon[1130]: *** New Phase 2

7/16/15 11:43:41.785 AM racoon[1130]: ****** state changed to: IKEv1 info

7/16/15 11:43:41.785 AM racoon[1130]: Compute IV for Phase 2

7/16/15 11:43:41.785 AM racoon[1130]: hash(sha1)

7/16/15 11:43:41.785 AM racoon[1130]: encryption(aes)

7/16/15 11:43:41.785 AM racoon[1130]: hmac(hmac_sha1)

7/16/15 11:43:41.786 AM racoon[1130]: Begin encryption.

7/16/15 11:43:41.786 AM racoon[1130]: encryption(aes)

7/16/15 11:43:41.786 AM racoon[1130]: pad length = 12

7/16/15 11:43:41.786 AM racoon[1130]: About to encrypt 64 bytes

0c000018 8b2db0b9 fe0ad6b3 c457364a c826d9b4 82210abb 0000001c 00000001

01100001 a7a8dc5a ee482312 f67ae2fd 137051eb 00000000 00000000 0000000c

7/16/15 11:43:41.786 AM racoon[1130]: encryption(aes)

7/16/15 11:43:41.786 AM racoon[1130]: Encrypted.

7/16/15 11:43:41.786 AM racoon[1130]: 92 bytes from xxx.xxx.xx.xx[500] to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:41.786 AM racoon[1130]: sockname xxx.xxx.xx.xx[500]

7/16/15 11:43:41.787 AM racoon[1130]: send packet from xxx.xxx.xx.xx[500]

7/16/15 11:43:41.787 AM racoon[1130]: send packet to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:41.787 AM racoon[1130]: @@@@@@ data being sent:


a7a8dc5a ee482312 f67ae2fd 137051eb 08100501 b9b874b8 0000005c 8a28c16a

9de38467 9c481cce 8a060e21 b656cbd6 5ed3cc83 0167bc2d e8059ae8 5a963115

d946cf0e a93e7f3d 5ddd2fb8 5f518426 36a01740 2f486ed9 a0cfdbfb

7/16/15 11:43:41.787 AM racoon[1130]: 1 times of 92 bytes message will be sent to xxx.xxx.xxx.xxx[500]

7/16/15 11:43:41.787 AM racoon[1130]: sendto Information delete.

7/16/15 11:43:41.787 AM racoon[1130]: IKE Packet: transmit success. (Information message).

7/16/15 11:43:41.787 AM racoon[1130]: IV freed

7/16/15 11:43:41.788 AM racoon[1130]: IKEv1 Information-Notice: transmit success. (Delete ISAKMP-SA).

7/16/15 11:43:41.788 AM racoon[1130]: ISAKMP-SA expired xxx.xxx.xx.xx[500]-xxx.xxx.xxx.xxx[500] spi:a7a8dc5aee482312:f67ae2fd137051eb

7/16/15 11:43:41.788 AM racoon[1130]: ****** state changed to: Phase 1 expired

7/16/15 11:43:41.788 AM racoon[1130]: no ph1bind replacement found. NULL ph1.

7/16/15 11:43:41.788 AM racoon[1130]: vpncontrol_close_comm.

7/16/15 11:43:41.788 AM racoon[1130]: ==== Got usr1 signal - re-parsing configuration.

7/16/15 11:43:41.788 AM racoon[1130]: ==== flush negotiating sessions.

7/16/15 11:43:41.788 AM racoon[1130]: flushing ph2 handles: ignore_estab_or_assert 1...

7/16/15 11:43:41.788 AM racoon[1130]: Flushing Phase 1 handles: ignore_estab_or_assert 1...

7/16/15 11:43:41.789 AM racoon[1130]: already stopped ike_session_stopped_by_controller.

7/16/15 11:43:41.789 AM racoon[1130]: IV freed

7/16/15 11:43:41.789 AM racoon[1130]: ===== parsing configuration

7/16/15 11:43:41.789 AM racoon[1130]: reading configuration file /etc/racoon/racoon.conf

7/16/15 11:43:41.789 AM racoon[1130]: lifetime = 60

7/16/15 11:43:41.789 AM racoon[1130]: lifebyte = 0

7/16/15 11:43:41.789 AM racoon[1130]: encklen=0

7/16/15 11:43:41.790 AM racoon[1130]: p:1 t:1

7/16/15 11:43:41.790 AM racoon[1130]: 3DES-CBC(5)

7/16/15 11:43:41.790 AM racoon[1130]: SHA(2)

7/16/15 11:43:41.790 AM racoon[1130]: 1024-bit MODP group(2)

7/16/15 11:43:41.790 AM racoon[1130]: pre-shared key(1)

7/16/15 11:43:41.790 AM racoon[1130]: 0

7/16/15 11:43:41.790 AM racoon[1130]: 0

7/16/15 11:43:41.790 AM racoon[1130]: hmac(modp1024)

7/16/15 11:43:41.791 AM racoon[1130]: filename: /var/run/racoon/*.conf

7/16/15 11:43:41.791 AM racoon[1130]: glob found no matches for path "/var/run/racoon/*.conf"

7/16/15 11:43:41.791 AM racoon[1130]: parse succeeded.

7/16/15 11:43:41.791 AM racoon[1130]: @@@@@@ data from readmsg:


<<<omitted>>>





7/16/15 11:43:41.792 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:41.792 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].

7/16/15 11:43:41.792 AM racoon[1130]: still searching. skipping... session to xxx.xxx.xxx.xxx[0] is already stopped, active ph1 0 ph2 1.

7/16/15 11:43:41.792 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:41.792 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].

7/16/15 11:43:41.792 AM racoon[1130]: still searching. skipping... session to xxx.xxx.xxx.xxx[0] is already stopped, active ph1 0 ph2 1.

7/16/15 11:43:41.792 AM racoon[1130]: 76 bytes message received from xxx.xxx.xxx.xxx[500] to xxx.xxx.xx.xx[500]

7/16/15 11:43:41.792 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:41.793 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].

7/16/15 11:43:41.793 AM racoon[1130]: still searching. skipping... session to xxx.xxx.xxx.xxx[0] is already stopped, active ph1 0 ph2 1.

7/16/15 11:43:41.793 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:41.793 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].

7/16/15 11:43:41.793 AM racoon[1130]: still searching. skipping... session to xxx.xxx.xxx.xxx[0] is already stopped, active ph1 0 ph2 1.

7/16/15 11:43:41.793 AM racoon[1130]: New IKE-Session to xxx.xxx.xxx.xxx[500].

7/16/15 11:43:41.793 AM racoon[1130]: Connecting.

7/16/15 11:43:41.794 AM racoon[1130]: Unknown Informational exchange received.

7/16/15 11:43:41.794 AM racoon[1130]: caught rtm:2, need update interface address list

7/16/15 11:43:41.794 AM racoon[1130]: configuring default isakmp port.

7/16/15 11:43:41.795 AM racoon[1130]: 10 addrs are configured successfully

7/16/15 11:43:41.795 AM racoon[1130]: SADB delete message: proto-id 3

7/16/15 11:43:41.795 AM racoon[1130]: src: xxx.xxx.xx.xx[57041]

7/16/15 11:43:41.795 AM racoon[1130]: dst: xxx.xxx.xxx.xxx[1701]

7/16/15 11:43:41.795 AM racoon[1130]: SADB delete message: proto-id 3

7/16/15 11:43:41.795 AM racoon[1130]: src: xxx.xxx.xxx.xxx[1701]

7/16/15 11:43:41.795 AM racoon[1130]: dst: xxx.xxx.xx.xx[57041]

7/16/15 11:43:41.796 AM racoon[1130]: SADB delete message: proto-id 3

7/16/15 11:43:41.796 AM racoon[1130]: src: xxx.xxx.xx.xx[57041]

7/16/15 11:43:41.796 AM racoon[1130]: dst: xxx.xxx.xxx.xxx[1701]

7/16/15 11:43:41.796 AM racoon[1130]: SADB delete message: proto-id 3

7/16/15 11:43:41.796 AM racoon[1130]: src: xxx.xxx.xxx.xxx[1701]

7/16/15 11:43:41.796 AM racoon[1130]: dst: xxx.xxx.xx.xx[57041]

7/16/15 11:43:41.796 AM racoon[1130]: pfkey DELETE failed: No such file or directory

7/16/15 11:43:41.809 AM racoon[1130]: @@@@@@ data from readmsg:


<<<omitted>>>





7/16/15 11:43:41.809 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:41.809 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[500].

7/16/15 11:43:41.809 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].

7/16/15 11:43:41.809 AM racoon[1130]: still searching. skipping... session to xxx.xxx.xxx.xxx[0] is already stopped, active ph1 0 ph2 1.

7/16/15 11:43:41.809 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:41.809 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[500].

7/16/15 11:43:41.809 AM racoon[1130]: Pre-existing IKE-Session to xxx.xxx.xxx.xxx[500]. case 1.

7/16/15 11:43:41.809 AM racoon[1130]: 92 bytes message received from xxx.xxx.xxx.xxx[500] to xxx.xxx.xx.xx[500]

7/16/15 11:43:41.810 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:41.810 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[500].

7/16/15 11:43:41.810 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].

7/16/15 11:43:41.810 AM racoon[1130]: still searching. skipping... session to xxx.xxx.xxx.xxx[0] is already stopped, active ph1 0 ph2 1.

7/16/15 11:43:41.810 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].

7/16/15 11:43:41.810 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[500].

7/16/15 11:43:41.810 AM racoon[1130]: Pre-existing IKE-Session to xxx.xxx.xxx.xxx[500]. case 1.

7/16/15 11:43:41.810 AM racoon[1130]: Unknown Informational exchange received.

7/16/15 11:43:45.092 AM racoon[1130]: performing auto exit

7/16/15 11:43:45.092 AM racoon[1130]: flushing ph2 handles: ignore_estab_or_assert 0...

7/16/15 11:43:45.093 AM racoon[1130]: Flushing Phase 1 handles: ignore_estab_or_assert 0...

7/16/15 11:43:46.184 AM racoon[1130]: call pfkey_send_dump

7/16/15 11:43:46.184 AM racoon[1130]: Flushing Phase 1 handles: ignore_estab_or_assert 0...

7/16/15 11:43:46.184 AM racoon[1130]: vpncontrol_close.

7/16/15 11:43:46.185 AM racoon[1130]: racoon shutdown

Many-OTHER

Posted on Jul 16, 2015 8:55 AM

Reply
2 replies

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

L2TP over IPSEC not working from ONE device on ONE network

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.