Is there anything you guys would recommend I do to debug
or troubleshoot this or is this as simple as mismatching
info due to NAT?
----------------- Logs from Thor(AWS instance) Receiving
end---------------
Oct 8 18:04:00.985391: XAUTH PAM support
[enabled]
Oct 8 18:04:00.985798: | encryption algorithm
NULL_AUTH_AES_GMAC, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id:
23, IKEv2 id: 21
Oct 8 18:04:00.985803: | IKEv1 ESP ID id: 23 enum name:
NULL_AUTH_AES_GMAC
Oct 8 18:04:00.985806: | IKEv2 ID id: 21 enum name:
NULL_AUTH_AES_GMAC
Oct 8 18:04:00.985899: NULL_AUTH_AES_GMAC IKEv1:
ESP IKEv2: ESP {256,192,*128} aes_gmac
Oct 8 18:04:01.010590: | extracting the RSA private key for
Thor
Oct 8 18:04:01.026495: | DH ike_alg_lookup_by_id id:
MODP2048=14, found MODP2048
Oct 8 18:04:05.039048: | DH ike_alg_lookup_by_id id:
MODP2048=14, found MODP2048
Oct 8 18:04:08.147322: | encryption ike_alg_lookup_by_id
id: AES_CBC=12, found AES_CBC
Oct 8 18:04:08.147330: | PRF ike_alg_lookup_by_id id:
HMAC_SHA1=2, found HMAC_SHA1
Oct 8 18:04:08.147335: | integrity ike_alg_lookup_by_id id:
HMAC_SHA1_96=2, found HMAC_SHA1_96
Oct 8 18:04:08.147339: | DH ike_alg_lookup_by_id id:
MODP2048=14, found MODP2048
Oct 8 18:04:08.184824: "private#
0.0.0.0/0"[1] ...76.102.236.205
#3: Authenticated using RSA
Oct 8 18:04:08.185023: |
extracting the RSA private key for Thor
Oct 8 18:04:08.185502: | RSA key AwEAAeaaN found
Oct 8 18:04:08.185674: | NSS: Authentication to NSS
successful
Oct 8 18:04:08.189602: "private#
0.0.0.0/0"[1] ...XX.XXX.XXX.205
#3: responding to AUTH message (ID 1) from
XX.XXX.XXX.205:22311 with encrypted notification
AUTHENTICATION_FAILED
Oct 8 18:04:09.045268: | DH ike_alg_lookup_by_id id:
MODP2048=14, found MODP2048
Oct 8 18:04:09.066730: | encryption ike_alg_lookup_by_id
id: AES_CBC=12, found AES_CBC
Oct 8 18:04:09.066735: | PRF ike_alg_lookup_by_id id:
HMAC_SHA1=2, found HMAC_SHA1
Oct 8 18:04:09.066739: | integrity ike_alg_lookup_by_id id:
HMAC_SHA1_96=2, found HMAC_SHA1_96
Oct 8 18:04:09.066743: | DH ike_alg_lookup_by_id id:
MODP2048=14, found MODP2048
Oct 8 18:04:09.068964: | RSA key AwEAAeaaN found
Oct 8 18:04:09.069137:
|
NSS: Authentication to NSS successful
Oct 8 18:04:13.079020: "private#
0.0.0.0/0"[1] ...XX.XXX.XXX.205
#5: STATE_PARENT_I2: 3 second timeout exceeded after 3
retransmits. Possible authentication failure: no acceptable
response to our first encrypted message
---------------- Logs from ipsechost1(Behind home office
NAT/FW) initiating connection
Oct 8 11:04:06.912445: | cmd( 640):TIME='0'
PLUTO_CONN_POLICY='AUTH_NEVER+GROUPINSTANCE+PASS+NEVER_NEGOTIATE'
PLUTO:
Oct 8 11:04:06.912449: | cmd( 720):_CONN_KIND='CK_INSTANCE'
PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PE:
Oct 8 11:04:08.108299: | established-authenticated-ike
states: 0
Oct 8 11:04:08.108304: | authenticated-ipsec states: 0
Oct 8 11:04:08.110246: | IKEv2 transform ID:
AUTH_HMAC_SHA2_512_256 (0xe)
Oct 8 11:04:08.110266: | IKEv2 transform ID:
AUTH_HMAC_SHA2_256_128 (0xc)
Oct 8 11:04:08.110286: | IKEv2 transform ID:
AUTH_HMAC_SHA1_96 (0x2)
Oct 8 11:04:08.110517: | IKEv2 transform ID:
AUTH_HMAC_SHA2_512_256 (0xe)
Oct 8 11:04:08.110537: | IKEv2 transform ID:
AUTH_HMAC_SHA2_256_128 (0xc)
Oct 8 11:04:08.110557: | IKEv2 transform ID:
AUTH_HMAC_SHA1_96 (0x2)
Oct 8 11:04:08.110976: | established-authenticated-ike
states: 0
Oct 8 11:04:08.110981: | authenticated-ipsec states: 0
Oct 8 11:04:08.125827: | v2 state object #1 found, in
STATE_PARENT_I1
Oct 8 11:04:08.125839: | found state #1
Oct 8 11:04:08.126016: | selected state microcode
Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH
Oct 8 11:04:08.126021: | calling processor Initiator:
process IKE_SA_INIT reply, initiate IKE_AUTH
Oct 8 11:04:08.126398: | IKEv2 transform ID:
AUTH_HMAC_SHA1_96 (0x2)
Oct 8 11:04:08.128316: | established-authenticated-ike
states: 0
Oct 8 11:04:08.128321: | authenticated-ipsec states: 0
Oct 8 11:04:08.128356: | exchange type: ISAKMP_v2_AUTH
(0x23)
Oct 8 11:04:08.128686: | next payload type: setting 'IKEv2
Certificate Request Payload'.'next payload type' to IKEv2
Authentication Payload (39:ISAKMP_NEXT_v2AUTH)
Oct 8 11:04:08.128688: | *****emit IKEv2 Authentication
Payload:
Oct 8 11:04:08.128694: | auth method: IKEv2_AUTH_RSA
(0x1)
Oct 8 11:04:08.128697: | next payload type: saving payload
location 'IKEv2 Authentication Payload'.'next payload type'
Oct 8 11:04:08.128818: |
private key for cert ipsechost1 not found in local cache;
loading from NSS DB
Oct 8 11:04:08.132511: | emitting 256 raw bytes of rsa
signature into IKEv2 Authentication Payload
Oct 8 11:04:08.132565: | emitting length of IKEv2
Authentication Payload: 264
Oct 8 11:04:08.132619: | next payload type: previous 'IKEv2
Authentication Payload'.'next payload type' matches 'IKEv2
Security Association Payload' (33:ISAKMP_NEXT_v2SA)
Oct 8 11:04:08.132835: | IKEv2 transform ID:
AUTH_HMAC_SHA2_512_256 (0xe)
Oct 8 11:04:08.132852: | IKEv2 transform ID:
AUTH_HMAC_SHA2_256_128 (0xc)
Oct 8 11:04:08.132980: | IKEv2 transform ID:
AUTH_HMAC_SHA2_512_256 (0xe)
Oct 8 11:04:08.132997: | IKEv2 transform ID:
AUTH_HMAC_SHA2_256_128 (0xc)
Oct 8 11:04:08.133097: | IKEv2 transform ID:
AUTH_HMAC_SHA1_96 (0x2)
Oct 8 11:04:08.133277: | exchange type: ISAKMP_v2_AUTH
(0x23)
Oct 8 11:04:08.133515: | out calculated auth:
Oct 8 11:04:08.133542: | exchange type: ISAKMP_v2_AUTH
(0x23)
Oct 8 11:04:08.133773: | out calculated auth:
Oct 8 11:04:08.133800: | exchange type: ISAKMP_v2_AUTH
(0x23)
Oct 8 11:04:08.134027: | out calculated auth:
Oct 8 11:04:08.134054: | exchange type: ISAKMP_v2_AUTH
(0x23)
Oct 8 11:04:08.134226: | out calculated auth:
Oct 8 11:04:08.134267: | established-authenticated-ike
states: 0
Oct 8 11:04:08.134272: | authenticated-ipsec states: 0
Oct 8 11:04:08.166428: | exchange type: ISAKMP_v2_AUTH
(0x23)
Oct 8 11:04:08.166439: | processing version=2.0 packet
with exchange type=ISAKMP_v2_AUTH (35)
Oct 8 11:04:08.166441: | I am receiving an IKEv2 Response
ISAKMP_v2_AUTH
Oct 8 11:04:08.166456: | v2 state object #2 found, in
STATE_PARENT_I2
Oct 8 11:04:08.166459: | found state #2
Oct 8 11:04:08.166489: | Unpacking clear payload for svm:
Initiator: process INVALID_SYNTAX AUTH notification
Oct 8 11:04:08.166654: | calculated auth: 4a b3 f9 8a 22
3d 39 7d c6 16 5c 1a
Oct 8 11:04:08.166656: | provided auth: 4a b3 f9 8a 22
3d 39 7d c6 16 5c 1a
Oct 8 11:04:08.166659: | authenticator matched
Oct 8 11:04:08.166671:
|
#2 ikev2 ISAKMP_v2_AUTH decrypt success
Oct 8 11:04:08.166691: | Notify Message Type:
v2N_AUTHENTICATION_FAILED (0x18)
Oct 8 11:04:08.166696: | selected state microcode
Initiator: process AUTHENTICATION_FAILED AUTH notification
Oct 8 11:04:08.166701: | calling processor Initiator:
process AUTHENTICATION_FAILED AUTH notification
Oct 8 11:04:08.166706: "private#
0.0.0.0/0"[1] ...13.57.200.87
#2: IKE SA authentication request rejected:
AUTHENTICATION_FAILED
Oct 8 11:04:08.166830: | v2 state object #1 found, in
STATE_PARENT_I2
Oct 8 11:04:08.166836: | found state #1
Oct 8 11:04:08.166854: | no useful state microcode entry
found
Oct 8 11:04:08.166976: | out calculated auth:
Oct 8 11:04:09.025208: | parent_init v2 state object not
found
Oct 8 11:04:09.025506: | found policy =
RSASIG+ENCRYPT+TUNNEL+PFS+FAIL1+OPPORTUNISTIC+GROUPINSTANCE+IKEV2_ALLOW+IKEV2_PROPOSE+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
(private#
0.0.0.0/0)