L2TP over IPSEC not working from ONE device on ONE network
Hi All,
this is really odd. I have a MBP (mine, actually) with a L2TP over IPSec VPN configured to connect to a remote gateway (Sophos UTM320). When I'm in one particular remote location (another office, no point-to-point vpn between them), I get a "The L2TP-VPN server did not respond" when connecting; it doesn't even get to the "authenticating" step.
From another machine at the same location with the same credentials, I can connect.
From the same machine in a different location (on a different network), I can connect.
If I change the machine's local IP address, I still cannot connect.
Basically, a particular machine cannot connect but only when trying to connect from a particular location.
I have dumped my system configuration folder, wiped out and re-entered all settings, powered off then on.
I am officially dumbfounded.
Anyone else ever have this happen?
The only strange thing I see (maybe it's not strange) is the raccoon.log node in the console is dimmed. Is this normal? I see raccoon entries; there's a lot but maybe someone who know more about this stuff than I can decipher it (hopefully I removed all the security concerns and addresses):
Thanks,
Jeff
7/16/15 11:43:20.614 AM pppd[1129]: publish_entry SCDSet() failed: Success!
7/16/15 11:43:20.614 AM pppd[1129]: publish_entry SCDSet() failed: Success!
7/16/15 11:43:20.614 AM pppd[1129]: pppd 2.4.2 (Apple version 727.90.1) started by jcooper, uid 502
7/16/15 11:43:20.622 AM pppd[1129]: L2TP connecting to server 'yolo.kingarch.com' (xxx.xxx.xxx.xxx)...
7/16/15 11:43:20.622 AM pppd[1129]: IPSec connection started
7/16/15 11:43:20.629 AM racoon[1130]: lifetime = 3600
7/16/15 11:43:20.629 AM racoon[1130]: lifebyte = 0
7/16/15 11:43:20.629 AM racoon[1130]: encklen=256
7/16/15 11:43:20.629 AM racoon[1130]: p:1 t:1
7/16/15 11:43:20.629 AM racoon[1130]: AES-CBC(7)
7/16/15 11:43:20.629 AM racoon[1130]: SHA(2)
7/16/15 11:43:20.629 AM racoon[1130]: 1024-bit MODP group(2)
7/16/15 11:43:20.629 AM racoon[1130]: pre-shared key(1)
7/16/15 11:43:20.629 AM racoon[1130]: 0
7/16/15 11:43:20.629 AM racoon[1130]: 0
7/16/15 11:43:20.630 AM racoon[1130]: lifetime = 3600
7/16/15 11:43:20.630 AM racoon[1130]: lifebyte = 0
7/16/15 11:43:20.630 AM racoon[1130]: encklen=256
7/16/15 11:43:20.630 AM racoon[1130]: p:1 t:2
7/16/15 11:43:20.630 AM racoon[1130]: AES-CBC(7)
7/16/15 11:43:20.630 AM racoon[1130]: MD5(1)
7/16/15 11:43:20.630 AM racoon[1130]: 1024-bit MODP group(2)
7/16/15 11:43:20.630 AM racoon[1130]: pre-shared key(1)
7/16/15 11:43:20.630 AM racoon[1130]: 0
7/16/15 11:43:20.630 AM racoon[1130]: 0
7/16/15 11:43:20.631 AM racoon[1130]: lifetime = 3600
7/16/15 11:43:20.631 AM racoon[1130]: lifebyte = 0
7/16/15 11:43:20.631 AM racoon[1130]: encklen=128
7/16/15 11:43:20.631 AM racoon[1130]: p:1 t:3
7/16/15 11:43:20.631 AM racoon[1130]: AES-CBC(7)
7/16/15 11:43:20.631 AM racoon[1130]: SHA(2)
7/16/15 11:43:20.631 AM racoon[1130]: 1024-bit MODP group(2)
7/16/15 11:43:20.631 AM racoon[1130]: pre-shared key(1)
7/16/15 11:43:20.631 AM racoon[1130]: 0
7/16/15 11:43:20.631 AM racoon[1130]: 0
7/16/15 11:43:20.632 AM racoon[1130]: lifetime = 3600
7/16/15 11:43:20.632 AM racoon[1130]: lifebyte = 0
7/16/15 11:43:20.632 AM racoon[1130]: encklen=128
7/16/15 11:43:20.632 AM racoon[1130]: p:1 t:4
7/16/15 11:43:20.632 AM racoon[1130]: AES-CBC(7)
7/16/15 11:43:20.632 AM racoon[1130]: MD5(1)
7/16/15 11:43:20.632 AM racoon[1130]: 1024-bit MODP group(2)
7/16/15 11:43:20.632 AM racoon[1130]: pre-shared key(1)
7/16/15 11:43:20.632 AM racoon[1130]: 0
7/16/15 11:43:20.632 AM racoon[1130]: 0
7/16/15 11:43:20.632 AM racoon[1130]: lifetime = 3600
7/16/15 11:43:20.633 AM racoon[1130]: lifebyte = 0
7/16/15 11:43:20.633 AM racoon[1130]: encklen=0
7/16/15 11:43:20.633 AM racoon[1130]: p:1 t:5
7/16/15 11:43:20.633 AM racoon[1130]: 3DES-CBC(5)
7/16/15 11:43:20.633 AM racoon[1130]: SHA(2)
7/16/15 11:43:20.633 AM racoon[1130]: 1024-bit MODP group(2)
7/16/15 11:43:20.633 AM racoon[1130]: pre-shared key(1)
7/16/15 11:43:20.633 AM racoon[1130]: 0
7/16/15 11:43:20.633 AM racoon[1130]: 0
7/16/15 11:43:20.633 AM racoon[1130]: lifetime = 3600
7/16/15 11:43:20.634 AM racoon[1130]: lifebyte = 0
7/16/15 11:43:20.634 AM racoon[1130]: encklen=0
7/16/15 11:43:20.634 AM racoon[1130]: p:1 t:6
7/16/15 11:43:20.634 AM racoon[1130]: 3DES-CBC(5)
7/16/15 11:43:20.634 AM racoon[1130]: MD5(1)
7/16/15 11:43:20.634 AM racoon[1130]: 1024-bit MODP group(2)
7/16/15 11:43:20.634 AM racoon[1130]: pre-shared key(1)
7/16/15 11:43:20.634 AM racoon[1130]: 0
7/16/15 11:43:20.634 AM racoon[1130]: 0
7/16/15 11:43:20.635 AM racoon[1130]: parse succeeded.
7/16/15 11:43:20.635 AM racoon[1130]: plogsetfile: about to add racoon log file: /var/log/racoon.log
7/16/15 11:43:20.635 AM racoon[1130]: racoon launched by launchd.
7/16/15 11:43:20.641 AM racoon[1130]: my interface: ::1 (lo0)
7/16/15 11:43:20.641 AM racoon[1130]: my interface: 127.0.0.1 (lo0)
7/16/15 11:43:20.641 AM racoon[1130]: my interface: fe80::1%lo0 (lo0)
7/16/15 11:43:20.641 AM racoon[1130]: my interface: fe80::2acf:daff:fedc:defc%en1 (en1)
7/16/15 11:43:20.642 AM racoon[1130]: my interface: xxx.xxx.xx.xx (en1)
7/16/15 11:43:20.642 AM racoon[1130]: configuring default isakmp port.
7/16/15 11:43:20.642 AM racoon[1130]: 10 addrs are configured successfully
7/16/15 11:43:20.642 AM racoon[1130]: xxx.xxx.xx.xx[500] used as isakmp port (fd=7)
7/16/15 11:43:20.642 AM racoon[1130]: xxx.xxx.xx.xx[4500] used as isakmp port (fd=8)
7/16/15 11:43:20.642 AM racoon[1130]: fe80::2acf:daff:fedc:defc%en1[500] used as isakmp port (fd=9)
7/16/15 11:43:20.643 AM racoon[1130]: fe80::2acf:daff:fedc:defc%en1[4500] used as isakmp port (fd=10)
7/16/15 11:43:20.643 AM racoon[1130]: fe80::1%lo0[500] used as isakmp port (fd=11)
7/16/15 11:43:20.643 AM racoon[1130]: fe80::1%lo0[4500] used as isakmp port (fd=12)
7/16/15 11:43:20.643 AM racoon[1130]: 127.0.0.1[500] used as isakmp port (fd=13)
7/16/15 11:43:20.643 AM racoon[1130]: 127.0.0.1[4500] used as isakmp port (fd=14)
7/16/15 11:43:20.643 AM racoon[1130]: ::1[500] used as isakmp port (fd=15)
7/16/15 11:43:20.644 AM racoon[1130]: ::1[4500] used as isakmp port (fd=16)
7/16/15 11:43:20.644 AM racoon[1130]: found launchd socket.
7/16/15 11:43:20.649 AM racoon[1130]: accepted connection on vpn control socket.
7/16/15 11:43:20.649 AM racoon[1130]: received bind command on vpn control socket.
7/16/15 11:43:20.649 AM racoon[1130]: checking listen addrs: xxx.xxx.xx.xx[500]
7/16/15 11:43:20.649 AM racoon[1130]: suitable outbound SP found: xxx.xxx.xx.xx/32[57041] xxx.xxx.xxx.xxx/32[1701] proto=udp dir=out.
7/16/15 11:43:20.649 AM racoon[1130]: Suitable inbound SP found: xxx.xxx.xxx.xxx/32[1701] xxx.xxx.xx.xx/32[57041] proto=udp dir=in.
7/16/15 11:43:20.650 AM racoon[1130]: configuration found for xxx.xxx.xxx.xxx.
7/16/15 11:43:20.650 AM racoon[1130]: *** New Phase 2
7/16/15 11:43:20.650 AM racoon[1130]: Got new Phase 2 version 16
7/16/15 11:43:20.650 AM racoon[1130]: ****** state changed to: IKEv1 quick I start
7/16/15 11:43:20.650 AM racoon[1130]: new acquire xxx.xxx.xx.xx/32[57041] xxx.xxx.xxx.xxx/32[1701] proto=udp dir=out
7/16/15 11:43:20.650 AM racoon[1130]: (proto_id=ESP spisize=4 spi=00000000 spi_p=00000000 encmode=Transport reqid=0:0)
7/16/15 11:43:20.650 AM racoon[1130]: (trns_id=AES encklen=256 authtype=hmac-sha)
7/16/15 11:43:20.651 AM racoon[1130]: (trns_id=AES encklen=256 authtype=hmac-md5)
7/16/15 11:43:20.651 AM racoon[1130]: (trns_id=AES encklen=128 authtype=hmac-sha)
7/16/15 11:43:20.651 AM racoon[1130]: (trns_id=AES encklen=128 authtype=hmac-md5)
7/16/15 11:43:20.651 AM racoon[1130]: (trns_id=3DES encklen=0 authtype=hmac-sha)
7/16/15 11:43:20.651 AM racoon[1130]: (trns_id=3DES encklen=0 authtype=hmac-md5)
7/16/15 11:43:20.651 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[0].
7/16/15 11:43:20.651 AM racoon[1130]: New IKE-Session to xxx.xxx.xxx.xxx[0].
7/16/15 11:43:20.651 AM racoon[1130]: Connecting.
7/16/15 11:43:20.652 AM racoon[1130]: In post_acquire
7/16/15 11:43:20.652 AM racoon[1130]: configuration found for xxx.xxx.xxx.xxx.
7/16/15 11:43:20.652 AM racoon[1130]: ike_session_has_other_negoing_ph2: ph2 sub spid 13, db spid 13
7/16/15 11:43:20.652 AM racoon[1130]: IPsec-SA request for xxx.xxx.xxx.xxx queued due to no Phase 1 found.
7/16/15 11:43:20.652 AM racoon[1130]: *** New Phase 1
7/16/15 11:43:20.652 AM racoon[1130]: ****** state changed to: IKEv1 ident I start
7/16/15 11:43:20.652 AM racoon[1130]: ===
7/16/15 11:43:20.652 AM racoon[1130]: initiate new phase 1 negotiation: xxx.xxx.xx.xx[500]<=>xxx.xxx.xxx.xxx[500]
7/16/15 11:43:20.653 AM racoon[1130]: begin Identity Protection mode.
7/16/15 11:43:20.653 AM racoon[1130]: IPSec Phase 1 started (Initiated by me).
7/16/15 11:43:20.653 AM racoon[1130]: new cookie:
a7a8dc5aee482312
7/16/15 11:43:20.653 AM racoon[1130]: add payload of len 224, next type 13
7/16/15 11:43:20.653 AM racoon[1130]: add payload of len 16, next type 13
7/16/15 11:43:20.653 AM racoon[1130]: add payload of len 16, next type 13
7/16/15 11:43:20.653 AM racoon[1130]: add payload of len 16, next type 13
7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 16, next type 13
7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 16, next type 13
7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 16, next type 13
7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 16, next type 13
7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 16, next type 13
7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 16, next type 13
7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 16, next type 13
7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 20, next type 13
7/16/15 11:43:20.654 AM racoon[1130]: add payload of len 16, next type 0
7/16/15 11:43:20.654 AM racoon[1130]: 500 bytes from xxx.xxx.xx.xx[500] to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:20.655 AM racoon[1130]: sockname xxx.xxx.xx.xx[500]
7/16/15 11:43:20.655 AM racoon[1130]: send packet from xxx.xxx.xx.xx[500]
7/16/15 11:43:20.655 AM racoon[1130]: send packet to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:20.655 AM racoon[1130]: @@@@@@ data being sent:
<<<omitted>>>
7/16/15 11:43:20.656 AM racoon[1130]: 1 times of 500 bytes message will be sent to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:20.656 AM racoon[1130]: Resend Phase 1 packet a7a8dc5aee482312:0000000000000000
7/16/15 11:43:20.656 AM racoon[1130]: ****** state changed to: IKEv1 ident I msg1 sent
7/16/15 11:43:20.656 AM racoon[1130]: IKE Packet: transmit success. (Initiator, Main-Mode message 1).
7/16/15 11:43:20.656 AM racoon[1130]: >>>>> phase change status = Phase 1 started by us
7/16/15 11:43:20.656 AM racoon[1130]: vpn control writing 20 bytes
7/16/15 11:43:20.657 AM racoon[1130]: @@@@@@ data from readmsg:
<<<omitted>>>
7/16/15 11:43:20.658 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:20.658 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].
7/16/15 11:43:20.658 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:20.658 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].
7/16/15 11:43:20.658 AM racoon[1130]: Best-match IKE-Session to xxx.xxx.xxx.xxx[0].
7/16/15 11:43:20.658 AM racoon[1130]: 176 bytes message received from xxx.xxx.xxx.xxx[500] to xxx.xxx.xx.xx[500]
7/16/15 11:43:20.658 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:20.658 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].
7/16/15 11:43:20.658 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:20.658 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].
7/16/15 11:43:20.658 AM racoon[1130]: Best-match IKE-Session to xxx.xxx.xxx.xxx[0].
7/16/15 11:43:20.659 AM racoon[1130]: begin.
7/16/15 11:43:20.659 AM racoon[1130]: seen nptype=1(sa)
7/16/15 11:43:20.659 AM racoon[1130]: seen nptype=13(vid)
7/16/15 11:43:20.659 AM racoon[1130]: seen nptype=13(vid)
7/16/15 11:43:20.659 AM racoon[1130]: seen nptype=13(vid)
7/16/15 11:43:20.659 AM racoon[1130]: seen nptype=13(vid)
7/16/15 11:43:20.659 AM racoon[1130]: seen nptype=13(vid)
7/16/15 11:43:20.659 AM racoon[1130]: succeed.
7/16/15 11:43:20.659 AM racoon[1130]: received unknown Vendor ID:
882fe56d 6fd20dbc 2251613b 2ebe5beb
7/16/15 11:43:20.659 AM racoon[1130]: received Vendor ID: CISCO-UNITY
7/16/15 11:43:20.659 AM racoon[1130]: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
7/16/15 11:43:20.659 AM racoon[1130]: received Vendor ID: DPD
7/16/15 11:43:20.659 AM racoon[1130]: received Vendor ID: RFC 3947
7/16/15 11:43:20.659 AM racoon[1130]: Selected NAT-T version: RFC 3947
7/16/15 11:43:20.659 AM racoon[1130]: begin.
7/16/15 11:43:20.660 AM racoon[1130]: seen nptype=2(prop)
7/16/15 11:43:20.660 AM racoon[1130]: succeed.
7/16/15 11:43:20.660 AM racoon[1130]: proposal #1 len=44
7/16/15 11:43:20.660 AM racoon[1130]: begin.
7/16/15 11:43:20.660 AM racoon[1130]: seen nptype=3(trns)
7/16/15 11:43:20.660 AM racoon[1130]: succeed.
7/16/15 11:43:20.660 AM racoon[1130]: transform #1 len=36
7/16/15 11:43:20.660 AM racoon[1130]: type=Life Type, flag=0x8000, lorv=seconds
7/16/15 11:43:20.660 AM racoon[1130]: type=Life Duration, flag=0x8000, lorv=3600
7/16/15 11:43:20.660 AM racoon[1130]: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
7/16/15 11:43:20.660 AM racoon[1130]: encryption(aes)
7/16/15 11:43:20.660 AM racoon[1130]: type=Key Length, flag=0x8000, lorv=256
7/16/15 11:43:20.660 AM racoon[1130]: type=Authentication Method, flag=0x8000, lorv=pre-shared key
7/16/15 11:43:20.660 AM racoon[1130]: type=Hash Algorithm, flag=0x8000, lorv=SHA
7/16/15 11:43:20.660 AM racoon[1130]: hash(sha1)
7/16/15 11:43:20.660 AM racoon[1130]: type=Group Description, flag=0x8000, lorv=1024-bit MODP group
7/16/15 11:43:20.661 AM racoon[1130]: hmac(modp1024)
7/16/15 11:43:20.661 AM racoon[1130]: pair 1:
7/16/15 11:43:20.661 AM racoon[1130]: 0x7fd9420007d0: next=0x0 tnext=0x0
7/16/15 11:43:20.661 AM racoon[1130]: proposal #1: 1 transform
7/16/15 11:43:20.661 AM racoon[1130]: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1
7/16/15 11:43:20.661 AM racoon[1130]: trns#=1, trns-id=IKE
7/16/15 11:43:20.661 AM racoon[1130]: type=Life Type, flag=0x8000, lorv=seconds
7/16/15 11:43:20.661 AM racoon[1130]: type=Life Duration, flag=0x8000, lorv=3600
7/16/15 11:43:20.661 AM racoon[1130]: type=Encryption Algorithm, flag=0x8000, lorv=AES-CBC
7/16/15 11:43:20.661 AM racoon[1130]: type=Key Length, flag=0x8000, lorv=256
7/16/15 11:43:20.661 AM racoon[1130]: type=Authentication Method, flag=0x8000, lorv=pre-shared key
7/16/15 11:43:20.661 AM racoon[1130]: type=Hash Algorithm, flag=0x8000, lorv=SHA
7/16/15 11:43:20.661 AM racoon[1130]: type=Group Description, flag=0x8000, lorv=1024-bit MODP group
7/16/15 11:43:20.661 AM racoon[1130]: Compared: DB:Peer
7/16/15 11:43:20.661 AM racoon[1130]: (version = 0:0)
7/16/15 11:43:20.662 AM racoon[1130]: (lifetime = 3600:3600)
7/16/15 11:43:20.662 AM racoon[1130]: (lifebyte = 0:0)
7/16/15 11:43:20.662 AM racoon[1130]: enctype = AES-CBC:AES-CBC
7/16/15 11:43:20.662 AM racoon[1130]: (encklen = 256:256)
7/16/15 11:43:20.662 AM racoon[1130]: hashtype = SHA:SHA
7/16/15 11:43:20.662 AM racoon[1130]: authmethod = pre-shared key:pre-shared key
7/16/15 11:43:20.662 AM racoon[1130]: dh_group = 1024-bit MODP group:1024-bit MODP group
7/16/15 11:43:20.662 AM racoon[1130]: an acceptable proposal found.
7/16/15 11:43:20.662 AM racoon[1130]: hmac(modp1024)
7/16/15 11:43:20.662 AM racoon[1130]: agreed on pre-shared key auth.
7/16/15 11:43:20.662 AM racoon[1130]: ****** state changed to: IKEv1 ident I msg2 rcvd
7/16/15 11:43:20.662 AM racoon[1130]: >>>>> phase change status = Phase 1 started by peer
7/16/15 11:43:20.662 AM racoon[1130]: vpn control writing 20 bytes
7/16/15 11:43:20.662 AM racoon[1130]: IKE Packet: receive success. (Initiator, Main-Mode message 2).
7/16/15 11:43:20.662 AM racoon[1130]: ===
7/16/15 11:43:20.664 AM racoon[1130]: compute DH's private.
7/16/15 11:43:20.664 AM racoon[1130]: compute DH's public.
7/16/15 11:43:20.664 AM racoon[1130]: Hashing xxx.xxx.xxx.xxx[500] with algo #2
7/16/15 11:43:20.664 AM racoon[1130]: hash(sha1)
7/16/15 11:43:20.664 AM racoon[1130]: Hashing xxx.xxx.xx.xx[500] with algo #2
7/16/15 11:43:20.664 AM racoon[1130]: hash(sha1)
7/16/15 11:43:20.665 AM racoon[1130]: Adding remote and local NAT-D payloads.
7/16/15 11:43:20.665 AM racoon[1130]: add payload of len 128, next type 10
7/16/15 11:43:20.665 AM racoon[1130]: add payload of len 16, next type 20
7/16/15 11:43:20.665 AM racoon[1130]: add payload of len 20, next type 20
7/16/15 11:43:20.665 AM racoon[1130]: add payload of len 20, next type 0
7/16/15 11:43:20.665 AM racoon[1130]: 228 bytes from xxx.xxx.xx.xx[500] to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:20.665 AM racoon[1130]: sockname xxx.xxx.xx.xx[500]
7/16/15 11:43:20.665 AM racoon[1130]: send packet from xxx.xxx.xx.xx[500]
7/16/15 11:43:20.665 AM racoon[1130]: send packet to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:20.665 AM racoon[1130]: @@@@@@ data being sent:
<<<omitted>>>
7/16/15 11:43:20.665 AM racoon[1130]: 1 times of 228 bytes message will be sent to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:20.666 AM racoon[1130]: Resend Phase 1 packet a7a8dc5aee482312:f67ae2fd137051eb
7/16/15 11:43:20.666 AM racoon[1130]: ****** state changed to: IKEv1 ident I msg3 sent
7/16/15 11:43:20.666 AM racoon[1130]: IKE Packet: transmit success. (Initiator, Main-Mode message 3).
7/16/15 11:43:20.676 AM racoon[1130]: @@@@@@ data from readmsg:
<<<omitted>>>
7/16/15 11:43:20.676 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:20.677 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].
7/16/15 11:43:20.677 AM racoon[1130]: Best-match IKE-Session to xxx.xxx.xxx.xxx[0].
7/16/15 11:43:20.677 AM racoon[1130]: 228 bytes message received from xxx.xxx.xxx.xxx[500] to xxx.xxx.xx.xx[500]
7/16/15 11:43:20.677 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:20.677 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].
7/16/15 11:43:20.677 AM racoon[1130]: Best-match IKE-Session to xxx.xxx.xxx.xxx[0].
7/16/15 11:43:20.677 AM racoon[1130]: begin.
7/16/15 11:43:20.677 AM racoon[1130]: seen nptype=4(ke)
7/16/15 11:43:20.677 AM racoon[1130]: seen nptype=10(nonce)
7/16/15 11:43:20.677 AM racoon[1130]: seen nptype=20(nat-d)
7/16/15 11:43:20.677 AM racoon[1130]: seen nptype=20(nat-d)
7/16/15 11:43:20.677 AM racoon[1130]: succeed.
7/16/15 11:43:20.677 AM racoon[1130]: Hashing xxx.xxx.xx.xx[500] with algo #2
7/16/15 11:43:20.677 AM racoon[1130]: hash(sha1)
7/16/15 11:43:20.677 AM racoon[1130]: NAT-D payload #0 verified
7/16/15 11:43:20.678 AM racoon[1130]: Hashing xxx.xxx.xxx.xxx[500] with algo #2
7/16/15 11:43:20.678 AM racoon[1130]: hash(sha1)
7/16/15 11:43:20.678 AM racoon[1130]: NAT-D payload #1 verified
7/16/15 11:43:20.678 AM racoon[1130]: NAT not detected
7/16/15 11:43:20.678 AM racoon[1130]: ****** state changed to: IKEv1 ident I msg4 rcvd
7/16/15 11:43:20.678 AM racoon[1130]: IKE Packet: receive success. (Initiator, Main-Mode message 4).
7/16/15 11:43:20.678 AM racoon[1130]: ===
7/16/15 11:43:20.680 AM racoon[1130]: compute DH's shared.
7/16/15 11:43:20.680 AM racoon[1130]: Getting pre-shared key from keychain.
7/16/15 11:43:20.696 AM racoon[1130]: the psk found.
7/16/15 11:43:20.696 AM racoon[1130]: psk:
4b327650 6e403335 61746577 6a313836 38
7/16/15 11:43:20.696 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:20.696 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:20.696 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:20.696 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:20.696 AM racoon[1130]: encryption(aes)
7/16/15 11:43:20.696 AM racoon[1130]: hash(sha1)
7/16/15 11:43:20.697 AM racoon[1130]: len(SKEYID_e) < len(Ka) (20 < 32), generating long key (Ka = K1 | K2 | ...)
7/16/15 11:43:20.697 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:20.697 AM racoon[1130]: compute intermediate encryption key K1
7/16/15 11:43:20.697 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:20.697 AM racoon[1130]: compute intermediate encryption key K2
7/16/15 11:43:20.697 AM racoon[1130]: hash(sha1)
7/16/15 11:43:20.697 AM racoon[1130]: encryption(aes)
7/16/15 11:43:20.697 AM racoon[1130]: use ID type of IPv4_address
011101f4 0a14000b
7/16/15 11:43:20.697 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:20.697 AM racoon[1130]: added initial-contact payload.
7/16/15 11:43:20.697 AM racoon[1130]: add payload of len 8, next type 8
7/16/15 11:43:20.698 AM racoon[1130]: add payload of len 20, next type 11
7/16/15 11:43:20.698 AM racoon[1130]: add payload of len 24, next type 0
7/16/15 11:43:20.698 AM racoon[1130]: Begin encryption.
7/16/15 11:43:20.698 AM racoon[1130]: encryption(aes)
7/16/15 11:43:20.698 AM racoon[1130]: pad length = 16
7/16/15 11:43:20.698 AM racoon[1130]: About to encrypt 80 bytes
0800000c 011101f4 0a14000b 0b000018 742a9d49 093159fb a5784094 8192d086
6afe0b15 0000001c 00000001 01106002 a7a8dc5a ee482312 f67ae2fd 137051eb
00000000 00000000 00000000 00000010
7/16/15 11:43:20.698 AM racoon[1130]: encryption(aes)
7/16/15 11:43:20.698 AM racoon[1130]: Encrypted.
7/16/15 11:43:20.698 AM racoon[1130]: 108 bytes from xxx.xxx.xx.xx[500] to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:20.698 AM racoon[1130]: sockname xxx.xxx.xx.xx[500]
7/16/15 11:43:20.698 AM racoon[1130]: send packet from xxx.xxx.xx.xx[500]
7/16/15 11:43:20.698 AM racoon[1130]: send packet to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:20.698 AM racoon[1130]: @@@@@@ data being sent:
<<<omitted>>>
7/16/15 11:43:20.699 AM racoon[1130]: 1 times of 108 bytes message will be sent to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:20.699 AM racoon[1130]: Resend Phase 1 packet a7a8dc5aee482312:f67ae2fd137051eb
7/16/15 11:43:20.699 AM racoon[1130]: ****** state changed to: IKEv1 ident I msg5 sent
7/16/15 11:43:20.699 AM racoon[1130]: IKE Packet: transmit success. (Initiator, Main-Mode message 5).
7/16/15 11:43:20.702 AM racoon[1130]: @@@@@@ data from readmsg:
<<<omitted>>>
7/16/15 11:43:20.702 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:20.702 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].
7/16/15 11:43:20.702 AM racoon[1130]: Best-match IKE-Session to xxx.xxx.xxx.xxx[0].
7/16/15 11:43:20.702 AM racoon[1130]: 76 bytes message received from xxx.xxx.xxx.xxx[500] to xxx.xxx.xx.xx[500]
7/16/15 11:43:20.702 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:20.702 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].
7/16/15 11:43:20.702 AM racoon[1130]: Best-match IKE-Session to xxx.xxx.xxx.xxx[0].
7/16/15 11:43:20.702 AM racoon[1130]: Begin decryption.
7/16/15 11:43:20.703 AM racoon[1130]: encryption(aes)
7/16/15 11:43:20.703 AM racoon[1130]: IV was saved for next processing:
43410d22 8a4b0dbe 0ce5ca62 d20880dc
7/16/15 11:43:20.703 AM racoon[1130]: encryption(aes)
7/16/15 11:43:20.703 AM racoon[1130]: decrypted payload by IV:
7/16/15 11:43:20.703 AM racoon[1130]: padding len=0
7/16/15 11:43:20.703 AM racoon[1130]: skip to trim padding.
7/16/15 11:43:20.703 AM racoon[1130]: decrypted.
7/16/15 11:43:20.703 AM racoon[1130]: begin.
7/16/15 11:43:20.703 AM racoon[1130]: seen nptype=5(id)
7/16/15 11:43:20.703 AM racoon[1130]: seen nptype=8(hash)
7/16/15 11:43:20.703 AM racoon[1130]: succeed.
7/16/15 11:43:20.703 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:20.703 AM racoon[1130]: HASH for PSK validated.
7/16/15 11:43:20.703 AM racoon[1130]: IKEv1 Phase 1 AUTH: success. (Initiator, Main-Mode Message 6).
7/16/15 11:43:20.703 AM racoon[1130]: peer's ID:
01000000 d8abb57a
7/16/15 11:43:20.704 AM racoon[1130]: ****** state changed to: IKEv1 ident I msg6 rcvd
7/16/15 11:43:20.704 AM racoon[1130]: IKE Packet: receive success. (Initiator, Main-Mode message 6).
7/16/15 11:43:20.704 AM racoon[1130]: ===
7/16/15 11:43:20.704 AM racoon[1130]: ****** state changed to: Phase 1 Established
7/16/15 11:43:20.704 AM racoon[1130]: IKEv1 Phase 1 Initiator: success. (Initiator, Main-Mode).
7/16/15 11:43:20.704 AM racoon[1130]: ISAKMP-SA established xxx.xxx.xx.xx[500]-xxx.xxx.xxx.xxx[500] spi:a7a8dc5aee482312:f67ae2fd137051eb
7/16/15 11:43:20.704 AM racoon[1130]: IPSec Phase 1 established (Initiated by me).
7/16/15 11:43:20.704 AM racoon[1130]: ===
7/16/15 11:43:21.750 AM racoon[1130]: CHKPH1THERE: got a ph1 handler, setting ports.
7/16/15 11:43:21.751 AM racoon[1130]: iph1->local: xxx.xxx.xx.xx[500]
7/16/15 11:43:21.751 AM racoon[1130]: iph1->remote: xxx.xxx.xxx.xxx[500]
7/16/15 11:43:21.751 AM racoon[1130]: before:
7/16/15 11:43:21.751 AM racoon[1130]: src: xxx.xxx.xx.xx[0]
7/16/15 11:43:21.751 AM racoon[1130]: dst: xxx.xxx.xxx.xxx[0]
7/16/15 11:43:21.752 AM racoon[1130]: After:
7/16/15 11:43:21.752 AM racoon[1130]: src: xxx.xxx.xx.xx[500]
7/16/15 11:43:21.752 AM racoon[1130]: dst: xxx.xxx.xxx.xxx[500]
7/16/15 11:43:21.752 AM racoon[1130]: ===
7/16/15 11:43:21.752 AM racoon[1130]: begin QUICK mode.
7/16/15 11:43:21.752 AM racoon[1130]: initiate new phase 2 negotiation: xxx.xxx.xx.xx[500]<=>xxx.xxx.xxx.xxx[500]
7/16/15 11:43:21.752 AM racoon[1130]: ****** state changed to: IKEv1 quick I start
7/16/15 11:43:21.752 AM racoon[1130]: IPSec Phase 2 started (Initiated by me).
7/16/15 11:43:21.753 AM racoon[1130]: Compute IV for Phase 2
7/16/15 11:43:21.753 AM racoon[1130]: hash(sha1)
7/16/15 11:43:21.753 AM racoon[1130]: encryption(aes)
7/16/15 11:43:21.753 AM racoon[1130]: ****** state changed to: IKEv1 quick I getspi sent
7/16/15 11:43:21.753 AM racoon[1130]: call pfkey_send_getspi
7/16/15 11:43:21.753 AM racoon[1130]: pfkey GETSPI sent: ESP/Transport xxx.xxx.xxx.xxx[500]->xxx.xxx.xx.xx[500]
7/16/15 11:43:21.753 AM racoon[1130]: pfkey getspi sent.
7/16/15 11:43:21.754 AM racoon[1130]: >>>>> phase change status = Phase 2 started
7/16/15 11:43:21.754 AM racoon[1130]: vpn control writing 20 bytes
7/16/15 11:43:21.754 AM racoon[1130]: pfkey GETSPI succeeded: ESP/Transport xxx.xxx.xxx.xxx[500]->xxx.xxx.xx.xx[500] spi=259806009(0xf7c5339)
7/16/15 11:43:21.754 AM racoon[1130]: ****** state changed to: IKEv1 quick I getspi done
7/16/15 11:43:21.754 AM racoon[1130]: use local ID type IPv4_address
0111ded1 0a14000b
7/16/15 11:43:21.754 AM racoon[1130]: use remote ID type IPv4_address
0111ded1 0a14000b
7/16/15 11:43:21.754 AM racoon[1130]: IDci:
0111ded1 0a14000b
7/16/15 11:43:21.755 AM racoon[1130]: IDcr:
011106a5 d8abb57a
7/16/15 11:43:21.755 AM racoon[1130]: add payload of len 180, next type 10
7/16/15 11:43:21.755 AM racoon[1130]: add payload of len 16, next type 5
7/16/15 11:43:21.755 AM racoon[1130]: add payload of len 8, next type 5
7/16/15 11:43:21.755 AM racoon[1130]: add payload of len 8, next type 0
7/16/15 11:43:21.755 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:21.755 AM racoon[1130]: add payload of len 20, next type 1
7/16/15 11:43:21.755 AM racoon[1130]: Begin encryption.
7/16/15 11:43:21.755 AM racoon[1130]: encryption(aes)
7/16/15 11:43:21.756 AM racoon[1130]: pad length = 4
7/16/15 11:43:21.756 AM racoon[1130]: About to encrypt 256 bytes
<<<omitted>>>
7/16/15 11:43:21.756 AM racoon[1130]: encryption(aes)
7/16/15 11:43:21.756 AM racoon[1130]: Encrypted.
7/16/15 11:43:21.756 AM racoon[1130]: 284 bytes from xxx.xxx.xx.xx[500] to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:21.756 AM racoon[1130]: sockname xxx.xxx.xx.xx[500]
7/16/15 11:43:21.756 AM racoon[1130]: send packet from xxx.xxx.xx.xx[500]
7/16/15 11:43:21.756 AM racoon[1130]: send packet to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:21.757 AM racoon[1130]: @@@@@@ data being sent:
<<<omitted>>>
7/16/15 11:43:21.757 AM racoon[1130]: 1 times of 284 bytes message will be sent to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:21.757 AM racoon[1130]: Resend Phase 2 packet a7a8dc5aee482312:f67ae2fd137051eb:0000baab
7/16/15 11:43:21.757 AM racoon[1130]: ****** state changed to: IKEv1 quick I msg1 sent
7/16/15 11:43:21.757 AM racoon[1130]: IKE Packet: transmit success. (Initiator, Quick-Mode message 1).
7/16/15 11:43:21.760 AM racoon[1130]: @@@@@@ data from readmsg:
<<<omitted>>>
7/16/15 11:43:21.760 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:21.761 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].
7/16/15 11:43:21.761 AM racoon[1130]: Best-match IKE-Session to xxx.xxx.xxx.xxx[0].
7/16/15 11:43:21.761 AM racoon[1130]: 156 bytes message received from xxx.xxx.xxx.xxx[500] to xxx.xxx.xx.xx[500]
7/16/15 11:43:21.761 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:21.761 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].
7/16/15 11:43:21.761 AM racoon[1130]: Best-match IKE-Session to xxx.xxx.xxx.xxx[0].
7/16/15 11:43:21.761 AM racoon[1130]: Begin decryption.
7/16/15 11:43:21.761 AM racoon[1130]: encryption(aes)
7/16/15 11:43:21.762 AM racoon[1130]: IV was saved for next processing:
d629dc0b c35a030f c9b3c159 f2a43770
7/16/15 11:43:21.762 AM racoon[1130]: encryption(aes)
7/16/15 11:43:21.762 AM racoon[1130]: decrypted payload by IV:
7/16/15 11:43:21.762 AM racoon[1130]: padding len=0
7/16/15 11:43:21.762 AM racoon[1130]: skip to trim padding.
7/16/15 11:43:21.762 AM racoon[1130]: decrypted.
7/16/15 11:43:21.762 AM racoon[1130]: begin.
7/16/15 11:43:21.762 AM racoon[1130]: seen nptype=8(hash)
7/16/15 11:43:21.762 AM racoon[1130]: seen nptype=1(sa)
7/16/15 11:43:21.762 AM racoon[1130]: seen nptype=10(nonce)
7/16/15 11:43:21.762 AM racoon[1130]: seen nptype=5(id)
7/16/15 11:43:21.763 AM racoon[1130]: seen nptype=5(id)
7/16/15 11:43:21.763 AM racoon[1130]: succeed.
7/16/15 11:43:21.763 AM racoon[1130]: HASH allocated:hbuf->l=144 actual:tlen=112
7/16/15 11:43:21.763 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:21.763 AM racoon[1130]: begin.
7/16/15 11:43:21.763 AM racoon[1130]: seen nptype=2(prop)
7/16/15 11:43:21.763 AM racoon[1130]: succeed.
7/16/15 11:43:21.763 AM racoon[1130]: proposal #1 len=172
7/16/15 11:43:21.763 AM racoon[1130]: begin.
7/16/15 11:43:21.763 AM racoon[1130]: seen nptype=3(trns)
7/16/15 11:43:21.763 AM racoon[1130]: seen nptype=3(trns)
7/16/15 11:43:21.763 AM racoon[1130]: seen nptype=3(trns)
7/16/15 11:43:21.764 AM racoon[1130]: seen nptype=3(trns)
7/16/15 11:43:21.764 AM racoon[1130]: seen nptype=3(trns)
7/16/15 11:43:21.764 AM racoon[1130]: seen nptype=3(trns)
7/16/15 11:43:21.764 AM racoon[1130]: succeed.
7/16/15 11:43:21.764 AM racoon[1130]: transform #1 len=28
7/16/15 11:43:21.764 AM racoon[1130]: type=SA Life Type, flag=0x8000, lorv=seconds
7/16/15 11:43:21.764 AM racoon[1130]: type=SA Life Duration, flag=0x8000, lorv=3600
7/16/15 11:43:21.764 AM racoon[1130]: life duration was in TLV.
7/16/15 11:43:21.764 AM racoon[1130]: type=Encryption Mode, flag=0x8000, lorv=Transport
7/16/15 11:43:21.764 AM racoon[1130]: type=Key Length, flag=0x8000, lorv=256
7/16/15 11:43:21.764 AM racoon[1130]: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
7/16/15 11:43:21.764 AM racoon[1130]: transform #2 len=28
7/16/15 11:43:21.765 AM racoon[1130]: type=SA Life Type, flag=0x8000, lorv=seconds
7/16/15 11:43:21.765 AM racoon[1130]: type=SA Life Duration, flag=0x8000, lorv=3600
7/16/15 11:43:21.765 AM racoon[1130]: life duration was in TLV.
7/16/15 11:43:21.765 AM racoon[1130]: type=Encryption Mode, flag=0x8000, lorv=Transport
7/16/15 11:43:21.765 AM racoon[1130]: type=Key Length, flag=0x8000, lorv=256
7/16/15 11:43:21.765 AM racoon[1130]: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
7/16/15 11:43:21.765 AM racoon[1130]: transform #3 len=28
7/16/15 11:43:21.765 AM racoon[1130]: type=SA Life Type, flag=0x8000, lorv=seconds
7/16/15 11:43:21.765 AM racoon[1130]: type=SA Life Duration, flag=0x8000, lorv=3600
7/16/15 11:43:21.765 AM racoon[1130]: life duration was in TLV.
7/16/15 11:43:21.765 AM racoon[1130]: type=Encryption Mode, flag=0x8000, lorv=Transport
7/16/15 11:43:21.765 AM racoon[1130]: type=Key Length, flag=0x8000, lorv=128
7/16/15 11:43:21.765 AM racoon[1130]: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
7/16/15 11:43:21.765 AM racoon[1130]: transform #4 len=28
7/16/15 11:43:21.765 AM racoon[1130]: type=SA Life Type, flag=0x8000, lorv=seconds
7/16/15 11:43:21.766 AM racoon[1130]: type=SA Life Duration, flag=0x8000, lorv=3600
7/16/15 11:43:21.766 AM racoon[1130]: life duration was in TLV.
7/16/15 11:43:21.766 AM racoon[1130]: type=Encryption Mode, flag=0x8000, lorv=Transport
7/16/15 11:43:21.766 AM racoon[1130]: type=Key Length, flag=0x8000, lorv=128
7/16/15 11:43:21.766 AM racoon[1130]: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
7/16/15 11:43:21.766 AM racoon[1130]: transform #5 len=24
7/16/15 11:43:21.766 AM racoon[1130]: type=SA Life Type, flag=0x8000, lorv=seconds
7/16/15 11:43:21.766 AM racoon[1130]: type=SA Life Duration, flag=0x8000, lorv=3600
7/16/15 11:43:21.766 AM racoon[1130]: life duration was in TLV.
7/16/15 11:43:21.766 AM racoon[1130]: type=Encryption Mode, flag=0x8000, lorv=Transport
7/16/15 11:43:21.766 AM racoon[1130]: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
7/16/15 11:43:21.766 AM racoon[1130]: transform #6 len=24
7/16/15 11:43:21.766 AM racoon[1130]: type=SA Life Type, flag=0x8000, lorv=seconds
7/16/15 11:43:21.766 AM racoon[1130]: type=SA Life Duration, flag=0x8000, lorv=3600
7/16/15 11:43:21.766 AM racoon[1130]: life duration was in TLV.
7/16/15 11:43:21.766 AM racoon[1130]: type=Encryption Mode, flag=0x8000, lorv=Transport
7/16/15 11:43:21.767 AM racoon[1130]: type=Authentication Algorithm, flag=0x8000, lorv=hmac-md5
7/16/15 11:43:21.767 AM racoon[1130]: pair 1:
7/16/15 11:43:21.767 AM racoon[1130]: 0x7fd940513390: next=0x0 tnext=0x7fd940512d20
7/16/15 11:43:21.767 AM racoon[1130]: 0x7fd940512d20: next=0x0 tnext=0x7fd940512d40
7/16/15 11:43:21.767 AM racoon[1130]: 0x7fd940512d40: next=0x0 tnext=0x7fd940512d60
7/16/15 11:43:21.767 AM racoon[1130]: 0x7fd940512d60: next=0x0 tnext=0x7fd940512d80
7/16/15 11:43:21.767 AM racoon[1130]: 0x7fd940512d80: next=0x0 tnext=0x7fd940512da0
7/16/15 11:43:21.767 AM racoon[1130]: 0x7fd940512da0: next=0x0 tnext=0x0
7/16/15 11:43:21.767 AM racoon[1130]: proposal #1: 6 transform
7/16/15 11:43:21.767 AM racoon[1130]: begin.
7/16/15 11:43:21.767 AM racoon[1130]: seen nptype=2(prop)
7/16/15 11:43:21.767 AM racoon[1130]: succeed.
7/16/15 11:43:21.767 AM racoon[1130]: proposal #1 len=40
7/16/15 11:43:21.767 AM racoon[1130]: begin.
7/16/15 11:43:21.767 AM racoon[1130]: seen nptype=3(trns)
7/16/15 11:43:21.768 AM racoon[1130]: succeed.
7/16/15 11:43:21.768 AM racoon[1130]: transform #1 len=28
7/16/15 11:43:21.768 AM racoon[1130]: type=SA Life Type, flag=0x8000, lorv=seconds
7/16/15 11:43:21.768 AM racoon[1130]: type=SA Life Duration, flag=0x8000, lorv=3600
7/16/15 11:43:21.768 AM racoon[1130]: life duration was in TLV.
7/16/15 11:43:21.768 AM racoon[1130]: type=Encryption Mode, flag=0x8000, lorv=Transport
7/16/15 11:43:21.768 AM racoon[1130]: type=Key Length, flag=0x8000, lorv=256
7/16/15 11:43:21.768 AM racoon[1130]: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
7/16/15 11:43:21.768 AM racoon[1130]: pair 1:
7/16/15 11:43:21.768 AM racoon[1130]: 0x7fd940512cd0: next=0x0 tnext=0x0
7/16/15 11:43:21.768 AM racoon[1130]: proposal #1: 1 transform
7/16/15 11:43:21.768 AM racoon[1130]: begin compare proposals.
7/16/15 11:43:21.768 AM racoon[1130]: pair[1]: 0x7fd940512cd0
7/16/15 11:43:21.768 AM racoon[1130]: 0x7fd940512cd0: next=0x0 tnext=0x0
7/16/15 11:43:21.768 AM racoon[1130]: prop#=1 prot-id=ESP spi-size=4 #trns=1 trns#=1 trns-id=AES
7/16/15 11:43:21.768 AM racoon[1130]: type=SA Life Type, flag=0x8000, lorv=seconds
7/16/15 11:43:21.769 AM racoon[1130]: type=SA Life Duration, flag=0x8000, lorv=3600
7/16/15 11:43:21.769 AM racoon[1130]: type=Encryption Mode, flag=0x8000, lorv=Transport
7/16/15 11:43:21.769 AM racoon[1130]: type=Key Length, flag=0x8000, lorv=256
7/16/15 11:43:21.769 AM racoon[1130]: type=Authentication Algorithm, flag=0x8000, lorv=hmac-sha
7/16/15 11:43:21.769 AM racoon[1130]: peer's single bundle:
7/16/15 11:43:21.769 AM racoon[1130]: (proto_id=ESP spisize=4 spi=97ad5907 spi_p=00000000 encmode=Transport reqid=0:0)
7/16/15 11:43:21.769 AM racoon[1130]: (trns_id=AES encklen=256 authtype=hmac-sha)
7/16/15 11:43:21.769 AM racoon[1130]: my single bundle:
7/16/15 11:43:21.769 AM racoon[1130]: (proto_id=ESP spisize=4 spi=0f7c5339 spi_p=00000000 encmode=Transport reqid=0:0)
7/16/15 11:43:21.769 AM racoon[1130]: (trns_id=AES encklen=256 authtype=hmac-sha)
7/16/15 11:43:21.769 AM racoon[1130]: (trns_id=AES encklen=256 authtype=hmac-md5)
7/16/15 11:43:21.769 AM racoon[1130]: (trns_id=AES encklen=128 authtype=hmac-sha)
7/16/15 11:43:21.769 AM racoon[1130]: (trns_id=AES encklen=128 authtype=hmac-md5)
7/16/15 11:43:21.769 AM racoon[1130]: (trns_id=3DES encklen=0 authtype=hmac-sha)
7/16/15 11:43:21.769 AM racoon[1130]: (trns_id=3DES encklen=0 authtype=hmac-md5)
7/16/15 11:43:21.770 AM racoon[1130]: matched
7/16/15 11:43:21.770 AM racoon[1130]: ****** state changed to: IKEv1 quick I msg2 rcvd
7/16/15 11:43:21.770 AM racoon[1130]: IKE Packet: receive success. (Initiator, Quick-Mode message 2).
7/16/15 11:43:21.770 AM racoon[1130]: HASH(3) generate
7/16/15 11:43:21.770 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:21.770 AM racoon[1130]: add payload of len 20, next type 0
7/16/15 11:43:21.770 AM racoon[1130]: Begin encryption.
7/16/15 11:43:21.770 AM racoon[1130]: encryption(aes)
7/16/15 11:43:21.770 AM racoon[1130]: pad length = 8
7/16/15 11:43:21.770 AM racoon[1130]: About to encrypt 32 bytes
00000018 3d7e6113 d37cec08 fac96413 84e0a4fd a3226a96 00000000 00000008
7/16/15 11:43:21.770 AM racoon[1130]: encryption(aes)
7/16/15 11:43:21.770 AM racoon[1130]: Encrypted.
7/16/15 11:43:21.770 AM racoon[1130]: 60 bytes from xxx.xxx.xx.xx[500] to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:21.770 AM racoon[1130]: sockname xxx.xxx.xx.xx[500]
7/16/15 11:43:21.771 AM racoon[1130]: send packet from xxx.xxx.xx.xx[500]
7/16/15 11:43:21.771 AM racoon[1130]: send packet to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:21.771 AM racoon[1130]: @@@@@@ data being sent:
a7a8dc5a ee482312 f67ae2fd 137051eb 08102001 baab357b 0000003c a25ef5b4
bfd350fa f580cfa8 37472b5c c35f66cc fe819336 850331cd 847f7314
7/16/15 11:43:21.771 AM racoon[1130]: 1 times of 60 bytes message will be sent to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:21.771 AM racoon[1130]: IKE Packet: transmit success. (Initiator, Quick-Mode message 3).
7/16/15 11:43:21.771 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:21.771 AM racoon[1130]: encryption(aes)
7/16/15 11:43:21.771 AM racoon[1130]: hmac(sha1)
7/16/15 11:43:21.771 AM racoon[1130]: encklen=256 authklen=160
7/16/15 11:43:21.771 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:21.771 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:21.771 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:21.771 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:21.771 AM racoon[1130]: encryption(aes)
7/16/15 11:43:21.772 AM racoon[1130]: hmac(sha1)
7/16/15 11:43:21.772 AM racoon[1130]: encklen=256 authklen=160
7/16/15 11:43:21.772 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:21.772 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:21.772 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:21.772 AM racoon[1130]: KEYMAT computed.
7/16/15 11:43:21.772 AM racoon[1130]: ****** state changed to: IKEv1 quick I addsa
7/16/15 11:43:21.772 AM racoon[1130]: call pk_sendupdate
7/16/15 11:43:21.772 AM racoon[1130]: encryption(aes)
7/16/15 11:43:21.772 AM racoon[1130]: hmac(sha1)
7/16/15 11:43:21.772 AM racoon[1130]: call pfkey_send_update: e_type 12, e_klen 32, a_type 2, a_klen 20
7/16/15 11:43:21.772 AM racoon[1130]: pfkey update sent.
7/16/15 11:43:21.772 AM racoon[1130]: encryption(aes)
7/16/15 11:43:21.772 AM racoon[1130]: hmac(sha1)
7/16/15 11:43:21.772 AM racoon[1130]: call pfkey_send_add: e_type 12, e_klen 32, a_type 2, a_klen 20
7/16/15 11:43:21.773 AM racoon[1130]: pfkey add sent.
7/16/15 11:43:21.773 AM racoon[1130]: pfkey UPDATE succeeded: ESP/Transport xxx.xxx.xxx.xxx[500]->xxx.xxx.xx.xx[500] spi=259806009(0xf7c5339)
7/16/15 11:43:21.773 AM racoon[1130]: IPsec-SA established: ESP/Transport xxx.xxx.xxx.xxx[500]->xxx.xxx.xx.xx[500] spi=259806009(0xf7c5339)
7/16/15 11:43:21.773 AM racoon[1130]: ****** state changed to: Phase 2 established
7/16/15 11:43:21.773 AM racoon[1130]: IKEv1 Phase 2 Initiator: success. (Initiator, Quick-Mode).
7/16/15 11:43:21.773 AM racoon[1130]: Connected.
com.apple.message.domain: com.apple.Networking.ipsec.connect.l2tpipsec
com.apple.message.result: success
com.apple.message.signature: success
Sender_Mach_UUID: 980C9AF3-2CF8-38E8-9159-FBDBDC39C538
7/16/15 11:43:21.773 AM racoon[1130]: ike_session_ph2_established: ph2 established, spid 13
7/16/15 11:43:21.774 AM racoon[1130]: IPSec Phase 2 established (Initiated by me).
7/16/15 11:43:21.774 AM racoon[1130]: ===
7/16/15 11:43:21.774 AM racoon[1130]: IPsec-SA established: ESP/Transport xxx.xxx.xx.xx[500]->xxx.xxx.xxx.xxx[500] spi=2544720135(0x97ad5907)
7/16/15 11:43:21.774 AM racoon[1130]: >>>>> phase change status = Phase 2 established
7/16/15 11:43:21.774 AM racoon[1130]: vpn control writing 20 bytes
7/16/15 11:43:21.774 AM racoon[1130]: ===
7/16/15 11:43:21.774 AM pppd[1129]: IPSec connection established
7/16/15 11:43:22.000 AM kernel[0]: AFP_VFS afpfs_DoReconnect: connect on /Volumes/IT failed 60.
7/16/15 11:43:22.000 AM kernel[0]: AFP_VFS afpfs_DoReconnect: connect to the server /Volumes/IT
7/16/15 11:43:37.000 AM kernel[0]: AFP_VFS afpfs_DoReconnect: connect on /Volumes/IT failed 60.
7/16/15 11:43:37.000 AM kernel[0]: AFP_VFS afpfs_DoReconnect: connect to the server /Volumes/IT
7/16/15 11:43:41.775 AM pppd[1129]: L2TP cannot connect to the server
7/16/15 11:43:41.777 AM racoon[1130]: caught rtm:2, need update interface address list
7/16/15 11:43:41.777 AM racoon[1130]: configuring default isakmp port.
7/16/15 11:43:41.778 AM racoon[1130]: 10 addrs are configured successfully
7/16/15 11:43:41.778 AM racoon[1130]: vpn_control socket closed by peer.
7/16/15 11:43:41.778 AM racoon[1130]: received disconnect all command.
7/16/15 11:43:41.778 AM racoon[1130]: IPSec disconnecting from server xxx.xxx.xxx.xxx
7/16/15 11:43:41.779 AM racoon[1130]: in ike_session_purgephXbydstaddrwop... purging Phase 2 structures
7/16/15 11:43:41.779 AM racoon[1130]: *** New Phase 2
7/16/15 11:43:41.779 AM racoon[1130]: ****** state changed to: IKEv1 info
7/16/15 11:43:41.779 AM racoon[1130]: Compute IV for Phase 2
7/16/15 11:43:41.780 AM racoon[1130]: hash(sha1)
7/16/15 11:43:41.780 AM racoon[1130]: encryption(aes)
7/16/15 11:43:41.780 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:41.780 AM racoon[1130]: Begin encryption.
7/16/15 11:43:41.780 AM racoon[1130]: encryption(aes)
7/16/15 11:43:41.780 AM racoon[1130]: pad length = 8
7/16/15 11:43:41.781 AM racoon[1130]: About to encrypt 48 bytes
0c000018 dc3ead4e a0a00632 234462b9 3cc875cc f1bfa5df 00000010 00000001
03040001 0f7c5339 00000000 00000008
7/16/15 11:43:41.781 AM racoon[1130]: encryption(aes)
7/16/15 11:43:41.781 AM racoon[1130]: Encrypted.
7/16/15 11:43:41.781 AM racoon[1130]: 76 bytes from xxx.xxx.xx.xx[500] to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:41.781 AM racoon[1130]: sockname xxx.xxx.xx.xx[500]
7/16/15 11:43:41.782 AM racoon[1130]: send packet from xxx.xxx.xx.xx[500]
7/16/15 11:43:41.782 AM racoon[1130]: send packet to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:41.782 AM racoon[1130]: @@@@@@ data being sent:
a7a8dc5a ee482312 f67ae2fd 137051eb 08100501 8a2bd78c 0000004c 0520d499
993e3d34 4c3743c0 a8984610 1905582c c6cb03cc a78965d1 3d341b53 25bb08c3
9d671471 83e3ce04 b84ab435
7/16/15 11:43:41.783 AM racoon[1130]: 1 times of 76 bytes message will be sent to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:41.783 AM racoon[1130]: sendto Information delete.
7/16/15 11:43:41.783 AM racoon[1130]: IKE Packet: transmit success. (Information message).
7/16/15 11:43:41.783 AM racoon[1130]: IV freed
7/16/15 11:43:41.784 AM racoon[1130]: IKEv1 Information-Notice: transmit success. (Delete IPSEC-SA).
7/16/15 11:43:41.784 AM racoon[1130]: Phase 2 sa expired xxx.xxx.xx.xx-xxx.xxx.xxx.xxx
7/16/15 11:43:41.784 AM racoon[1130]: ****** state changed to: Phase 2 expired
7/16/15 11:43:41.784 AM racoon[1130]: in ike_session_purgephXbydstaddrwop... purging Phase 1 and related Phase 2 structures
7/16/15 11:43:41.784 AM racoon[1130]: IPsec-SA needs to be purged: ESP xxx.xxx.xx.xx[500]->xxx.xxx.xxx.xxx[500] spi=218103808(0xd000000)
7/16/15 11:43:41.785 AM racoon[1130]: *** New Phase 2
7/16/15 11:43:41.785 AM racoon[1130]: ****** state changed to: IKEv1 info
7/16/15 11:43:41.785 AM racoon[1130]: Compute IV for Phase 2
7/16/15 11:43:41.785 AM racoon[1130]: hash(sha1)
7/16/15 11:43:41.785 AM racoon[1130]: encryption(aes)
7/16/15 11:43:41.785 AM racoon[1130]: hmac(hmac_sha1)
7/16/15 11:43:41.786 AM racoon[1130]: Begin encryption.
7/16/15 11:43:41.786 AM racoon[1130]: encryption(aes)
7/16/15 11:43:41.786 AM racoon[1130]: pad length = 12
7/16/15 11:43:41.786 AM racoon[1130]: About to encrypt 64 bytes
0c000018 8b2db0b9 fe0ad6b3 c457364a c826d9b4 82210abb 0000001c 00000001
01100001 a7a8dc5a ee482312 f67ae2fd 137051eb 00000000 00000000 0000000c
7/16/15 11:43:41.786 AM racoon[1130]: encryption(aes)
7/16/15 11:43:41.786 AM racoon[1130]: Encrypted.
7/16/15 11:43:41.786 AM racoon[1130]: 92 bytes from xxx.xxx.xx.xx[500] to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:41.786 AM racoon[1130]: sockname xxx.xxx.xx.xx[500]
7/16/15 11:43:41.787 AM racoon[1130]: send packet from xxx.xxx.xx.xx[500]
7/16/15 11:43:41.787 AM racoon[1130]: send packet to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:41.787 AM racoon[1130]: @@@@@@ data being sent:
a7a8dc5a ee482312 f67ae2fd 137051eb 08100501 b9b874b8 0000005c 8a28c16a
9de38467 9c481cce 8a060e21 b656cbd6 5ed3cc83 0167bc2d e8059ae8 5a963115
d946cf0e a93e7f3d 5ddd2fb8 5f518426 36a01740 2f486ed9 a0cfdbfb
7/16/15 11:43:41.787 AM racoon[1130]: 1 times of 92 bytes message will be sent to xxx.xxx.xxx.xxx[500]
7/16/15 11:43:41.787 AM racoon[1130]: sendto Information delete.
7/16/15 11:43:41.787 AM racoon[1130]: IKE Packet: transmit success. (Information message).
7/16/15 11:43:41.787 AM racoon[1130]: IV freed
7/16/15 11:43:41.788 AM racoon[1130]: IKEv1 Information-Notice: transmit success. (Delete ISAKMP-SA).
7/16/15 11:43:41.788 AM racoon[1130]: ISAKMP-SA expired xxx.xxx.xx.xx[500]-xxx.xxx.xxx.xxx[500] spi:a7a8dc5aee482312:f67ae2fd137051eb
7/16/15 11:43:41.788 AM racoon[1130]: ****** state changed to: Phase 1 expired
7/16/15 11:43:41.788 AM racoon[1130]: no ph1bind replacement found. NULL ph1.
7/16/15 11:43:41.788 AM racoon[1130]: vpncontrol_close_comm.
7/16/15 11:43:41.788 AM racoon[1130]: ==== Got usr1 signal - re-parsing configuration.
7/16/15 11:43:41.788 AM racoon[1130]: ==== flush negotiating sessions.
7/16/15 11:43:41.788 AM racoon[1130]: flushing ph2 handles: ignore_estab_or_assert 1...
7/16/15 11:43:41.788 AM racoon[1130]: Flushing Phase 1 handles: ignore_estab_or_assert 1...
7/16/15 11:43:41.789 AM racoon[1130]: already stopped ike_session_stopped_by_controller.
7/16/15 11:43:41.789 AM racoon[1130]: IV freed
7/16/15 11:43:41.789 AM racoon[1130]: ===== parsing configuration
7/16/15 11:43:41.789 AM racoon[1130]: reading configuration file /etc/racoon/racoon.conf
7/16/15 11:43:41.789 AM racoon[1130]: lifetime = 60
7/16/15 11:43:41.789 AM racoon[1130]: lifebyte = 0
7/16/15 11:43:41.789 AM racoon[1130]: encklen=0
7/16/15 11:43:41.790 AM racoon[1130]: p:1 t:1
7/16/15 11:43:41.790 AM racoon[1130]: 3DES-CBC(5)
7/16/15 11:43:41.790 AM racoon[1130]: SHA(2)
7/16/15 11:43:41.790 AM racoon[1130]: 1024-bit MODP group(2)
7/16/15 11:43:41.790 AM racoon[1130]: pre-shared key(1)
7/16/15 11:43:41.790 AM racoon[1130]: 0
7/16/15 11:43:41.790 AM racoon[1130]: 0
7/16/15 11:43:41.790 AM racoon[1130]: hmac(modp1024)
7/16/15 11:43:41.791 AM racoon[1130]: filename: /var/run/racoon/*.conf
7/16/15 11:43:41.791 AM racoon[1130]: glob found no matches for path "/var/run/racoon/*.conf"
7/16/15 11:43:41.791 AM racoon[1130]: parse succeeded.
7/16/15 11:43:41.791 AM racoon[1130]: @@@@@@ data from readmsg:
<<<omitted>>>
7/16/15 11:43:41.792 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:41.792 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].
7/16/15 11:43:41.792 AM racoon[1130]: still searching. skipping... session to xxx.xxx.xxx.xxx[0] is already stopped, active ph1 0 ph2 1.
7/16/15 11:43:41.792 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:41.792 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].
7/16/15 11:43:41.792 AM racoon[1130]: still searching. skipping... session to xxx.xxx.xxx.xxx[0] is already stopped, active ph1 0 ph2 1.
7/16/15 11:43:41.792 AM racoon[1130]: 76 bytes message received from xxx.xxx.xxx.xxx[500] to xxx.xxx.xx.xx[500]
7/16/15 11:43:41.792 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:41.793 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].
7/16/15 11:43:41.793 AM racoon[1130]: still searching. skipping... session to xxx.xxx.xxx.xxx[0] is already stopped, active ph1 0 ph2 1.
7/16/15 11:43:41.793 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:41.793 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].
7/16/15 11:43:41.793 AM racoon[1130]: still searching. skipping... session to xxx.xxx.xxx.xxx[0] is already stopped, active ph1 0 ph2 1.
7/16/15 11:43:41.793 AM racoon[1130]: New IKE-Session to xxx.xxx.xxx.xxx[500].
7/16/15 11:43:41.793 AM racoon[1130]: Connecting.
7/16/15 11:43:41.794 AM racoon[1130]: Unknown Informational exchange received.
7/16/15 11:43:41.794 AM racoon[1130]: caught rtm:2, need update interface address list
7/16/15 11:43:41.794 AM racoon[1130]: configuring default isakmp port.
7/16/15 11:43:41.795 AM racoon[1130]: 10 addrs are configured successfully
7/16/15 11:43:41.795 AM racoon[1130]: SADB delete message: proto-id 3
7/16/15 11:43:41.795 AM racoon[1130]: src: xxx.xxx.xx.xx[57041]
7/16/15 11:43:41.795 AM racoon[1130]: dst: xxx.xxx.xxx.xxx[1701]
7/16/15 11:43:41.795 AM racoon[1130]: SADB delete message: proto-id 3
7/16/15 11:43:41.795 AM racoon[1130]: src: xxx.xxx.xxx.xxx[1701]
7/16/15 11:43:41.795 AM racoon[1130]: dst: xxx.xxx.xx.xx[57041]
7/16/15 11:43:41.796 AM racoon[1130]: SADB delete message: proto-id 3
7/16/15 11:43:41.796 AM racoon[1130]: src: xxx.xxx.xx.xx[57041]
7/16/15 11:43:41.796 AM racoon[1130]: dst: xxx.xxx.xxx.xxx[1701]
7/16/15 11:43:41.796 AM racoon[1130]: SADB delete message: proto-id 3
7/16/15 11:43:41.796 AM racoon[1130]: src: xxx.xxx.xxx.xxx[1701]
7/16/15 11:43:41.796 AM racoon[1130]: dst: xxx.xxx.xx.xx[57041]
7/16/15 11:43:41.796 AM racoon[1130]: pfkey DELETE failed: No such file or directory
7/16/15 11:43:41.809 AM racoon[1130]: @@@@@@ data from readmsg:
<<<omitted>>>
7/16/15 11:43:41.809 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:41.809 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[500].
7/16/15 11:43:41.809 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].
7/16/15 11:43:41.809 AM racoon[1130]: still searching. skipping... session to xxx.xxx.xxx.xxx[0] is already stopped, active ph1 0 ph2 1.
7/16/15 11:43:41.809 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:41.809 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[500].
7/16/15 11:43:41.809 AM racoon[1130]: Pre-existing IKE-Session to xxx.xxx.xxx.xxx[500]. case 1.
7/16/15 11:43:41.809 AM racoon[1130]: 92 bytes message received from xxx.xxx.xxx.xxx[500] to xxx.xxx.xx.xx[500]
7/16/15 11:43:41.810 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:41.810 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[500].
7/16/15 11:43:41.810 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[0].
7/16/15 11:43:41.810 AM racoon[1130]: still searching. skipping... session to xxx.xxx.xxx.xxx[0] is already stopped, active ph1 0 ph2 1.
7/16/15 11:43:41.810 AM racoon[1130]: start search for IKE-Session. target xxx.xxx.xxx.xxx[500].
7/16/15 11:43:41.810 AM racoon[1130]: still search for IKE-Session. this xxx.xxx.xxx.xxx[500].
7/16/15 11:43:41.810 AM racoon[1130]: Pre-existing IKE-Session to xxx.xxx.xxx.xxx[500]. case 1.
7/16/15 11:43:41.810 AM racoon[1130]: Unknown Informational exchange received.
7/16/15 11:43:45.092 AM racoon[1130]: performing auto exit
7/16/15 11:43:45.092 AM racoon[1130]: flushing ph2 handles: ignore_estab_or_assert 0...
7/16/15 11:43:45.093 AM racoon[1130]: Flushing Phase 1 handles: ignore_estab_or_assert 0...
7/16/15 11:43:46.184 AM racoon[1130]: call pfkey_send_dump
7/16/15 11:43:46.184 AM racoon[1130]: Flushing Phase 1 handles: ignore_estab_or_assert 0...
7/16/15 11:43:46.184 AM racoon[1130]: vpncontrol_close.
7/16/15 11:43:46.185 AM racoon[1130]: racoon shutdown
Many-OTHER