sudo /usr/lib/NetworkManager/nm-vpnc-service --debug ******************************************** Output *************************************** ** Message: nm-vpnc-service (version 0.9.6.0) starting... ** Message: vpnc started with pid 10998 connection name : "connection" id : "AES256-encrypted IPSec-Client-Dialin" (s) uuid : "fa84dcef-339f-43a2-8d41-cf13349a104a" (s) type : "vpn" (s) permissions : [] (sd) autoconnect : TRUE (sd) timestamp : 1359043019 (s) read-only : FALSE (sd) zone : NULL (sd) master : NULL (sd) slave-type : NULL (sd)
vpn name : "vpn" service-type : "org.freedesktop.NetworkManager.vpnc" (s) user-name : "**********" (s) data : [ { 'NAT Traversal Mode': cisco-udp }, { 'ipsec-secret-type': save }, { 'IPSec secret-flags': 1 }, { 'xauth-password-type': save }, { 'Vendor': cisco }, { 'Xauth username': *********** }, { 'IPSec gateway': *********** }, { 'DPD idle timeout (our side)': 60 }, { 'IPSec ID': vtVPN }, { 'Xauth password-flags': 1 }, { 'Perfect Forward Secrecy': server }, { 'IKE DH Group': dh2 }, { 'Local Port': 500 }, ] (s) secrets : [ { 'IPSec secret': ************** }, { 'Xauth password': ************** }, ] (s) ipv4 name : "ipv4" method : "auto" (s) dns : [] (s) dns-search : [] (sd) addresses : [] (s) routes : [] (s) ignore-auto-routes : FALSE (sd) ignore-auto-dns : FALSE (sd) dhcp-client-id : NULL (sd) dhcp-send-hostname : TRUE (sd) dhcp-hostname : NULL (sd) never-default : FALSE (sd) may-fail : TRUE (sd) Config: Debug 3 Config: Script /usr/lib/NetworkManager/nm-vpnc-service-vpnc-helper Config: Cisco UDP Encapsulation Port 0 Config: Local Port 500 Config: IKE DH Group dh2 Config: Perfect Forward Secrecy server Config: IPSec ID vtVPN Config: DPD idle timeout (our side) 60 Config: IPSec gateway demdc-fw01.valtech.de Config: Xauth username erwin.yuekselgil Config: Vendor cisco Config: NAT Traversal Mode cisco-udp Config: Xauth password !vtPa55w0rd! Config: IPSec secret T2jjr0mUh9C=YD$2dkAU|ujk)WbhT7 vpnc version 0.5.3r512 hex_test: 00010203 S1 init_sockaddr [2013-03-12 09:33:26] S2 make_socket [2013-03-12 09:33:26] S3 setup_tunnel [2013-03-12 09:33:26] using interface tun0 S4 do_phase1_am [2013-03-12 09:33:26] S4.1 create_nonce [2013-03-12 09:33:26] i_cookie: dac74ced be9ac753 i_nonce: 38fc3028 92331194 c2ac3c3b 1acb6922 c4770528 S4.2 dh setup [2013-03-12 09:33:26] dh_public: 5e0f35ad 72b5c3ed 7afa0ac4 c4739e0e d2627b28 07852549 99526060 fc1fbbe4 03a3c7a2 90b94f28 be40e836 90cd37fa 303f01c2 6b606fcf 85325ddc 1a030866 e8eb8b51 b88a28f8 fb5f725f f48f2723 c7672e88 496c5379 abef70ba 164db836 a269b3c8 24354cc5 04282865 82e830e6 d9824efa b89ba2c8 df1713ac 4887608e S4.3 AM packet_1 [2013-03-12 09:33:26] sending: ========================> BEGIN_PARSE Received Packet Len: 1181 i_cookie: dac74ced be9ac753 r_cookie: 00000000 00000000 payload: 01 (ISAKMP_PAYLOAD_SA) isakmp_version: 10 exchange_type: 04 (ISAKMP_EXCHANGE_AGGRESSIVE) flags: 00 message_id: 00000000 len: 0000049d PARSING PAYLOAD type: 01 (ISAKMP_PAYLOAD_SA) next_type: 04 (ISAKMP_PAYLOAD_KE) length: 03a4 sa.doi: 00000001 (ISAKMP_DOI_IPSEC) sa.situation: 00000001 (ISAKMP_IPSEC_SIT_IDENTITY_ONLY) PARSING PAYLOAD type: 02 (ISAKMP_PAYLOAD_P) next_type: 00 (ISAKMP_PAYLOAD_NONE) length: 0398 p.number: 00 p.prot_id: 01 (ISAKMP_IPSEC_PROTO_ISAKMP) p.spi_size: 00 length: 18 p.spi: PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T) next_type: 03 (ISAKMP_PAYLOAD_T) length: 0028 t.number: 00 t.id: 01 (ISAKMP_IPSEC_KEY_IKE) t.attributes.type: 000e (IKE_ATTRIB_KEY_LENGTH) t.attributes.u.attr_16: 0100 t.attributes.type: 0001 (IKE_ATTRIB_ENC) t.attributes.u.attr_16: 0007 (IKE_ENC_AES_CBC) t.attributes.type: 0002 (IKE_ATTRIB_HASH) t.attributes.u.attr_16: 0002 (IKE_HASH_SHA) t.attributes.type: 0004 (IKE_ATTRIB_GROUP_DESC) t.attributes.u.attr_16: 0002 (IKE_GROUP_MODP_1024) t.attributes.type: 0003 (IKE_ATTRIB_AUTH_METHOD) t.attributes.u.attr_16: fde9 (IKE_AUTH_XAUTHInitPreShared) t.attributes.type: 000b (IKE_ATTRIB_LIFE_TYPE) t.attributes.u.attr_16: 0001 (IKE_LIFE_TYPE_SECONDS) t.attributes.type: 000c (IKE_ATTRIB_LIFE_DURATION) t.attributes.u.lots.length: 0004 t.attributes.u.lots.data: 0020c49b DONE PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T) PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T) next_type: 03 (ISAKMP_PAYLOAD_T) length: 0028 t.number: 01 t.id: 01 (ISAKMP_IPSEC_KEY_IKE) t.attributes.type: 000e (IKE_ATTRIB_KEY_LENGTH) t.attributes.u.attr_16: 0100 t.attributes.type: 0001 (IKE_ATTRIB_ENC) t.attributes.u.attr_16: 0007 (IKE_ENC_AES_CBC) t.attributes.type: 0002 (IKE_ATTRIB_HASH) t.attributes.u.attr_16: 0001 (IKE_HASH_MD5) t.attributes.type: 0004 (IKE_ATTRIB_GROUP_DESC) t.attributes.u.attr_16: 0002 (IKE_GROUP_MODP_1024) t.attributes.type: 0003 (IKE_ATTRIB_AUTH_METHOD) t.attributes.u.attr_16: fde9 (IKE_AUTH_XAUTHInitPreShared) t.attributes.type: 000b (IKE_ATTRIB_LIFE_TYPE) t.attributes.u.attr_16: 0001 (IKE_LIFE_TYPE_SECONDS) t.attributes.type: 000c (IKE_ATTRIB_LIFE_DURATION) t.attributes.u.lots.length: 0004 t.attributes.u.lots.data: 0020c49b DONE PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T) PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T) next_type: 03 (ISAKMP_PAYLOAD_T) length: 0028 t.number: 02 t.id: 01 (ISAKMP_IPSEC_KEY_IKE) t.attributes.type: 000e (IKE_ATTRIB_KEY_LENGTH) t.attributes.u.attr_16: 00c0 t.attributes.type: 0001 (IKE_ATTRIB_ENC) t.attributes.u.attr_16: 0007 (IKE_ENC_AES_CBC) t.attributes.type: 0002 (IKE_ATTRIB_HASH) t.attributes.u.attr_16: 0002 (IKE_HASH_SHA) t.attributes.type: 0004 (IKE_ATTRIB_GROUP_DESC) t.attributes.u.attr_16: 0002 (IKE_GROUP_MODP_1024) t.attributes.type: 0003 (IKE_ATTRIB_AUTH_METHOD) t.attributes.u.attr_16: fde9 (IKE_AUTH_XAUTHInitPreShared) t.attributes.type: 000b (IKE_ATTRIB_LIFE_TYPE) t.attributes.u.attr_16: 0001 (IKE_LIFE_TYPE_SECONDS) t.attributes.type: 000c (IKE_ATTRIB_LIFE_DURATION) t.attributes.u.lots.length: 0004 t.attributes.u.lots.data: 0020c49b DONE PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T) ...... PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T) next_type: 03 (ISAKMP_PAYLOAD_T) length: 0024 t.number: 16 t.id: 01 (ISAKMP_IPSEC_KEY_IKE) t.attributes.type: 0001 (IKE_ATTRIB_ENC) t.attributes.u.attr_16: 0000 (IKE_ENC_NO_CBC) t.attributes.type: 0002 (IKE_ATTRIB_HASH) t.attributes.u.attr_16: 0002 (IKE_HASH_SHA) t.attributes.type: 0004 (IKE_ATTRIB_GROUP_DESC) t.attributes.u.attr_16: 0002 (IKE_GROUP_MODP_1024) t.attributes.type: 0003 (IKE_ATTRIB_AUTH_METHOD) t.attributes.u.attr_16: 0001 (IKE_AUTH_PRESHARED) t.attributes.type: 000b (IKE_ATTRIB_LIFE_TYPE) t.attributes.u.attr_16: 0001 (IKE_LIFE_TYPE_SECONDS) t.attributes.type: 000c (IKE_ATTRIB_LIFE_DURATION) t.attributes.u.lots.length: 0004 t.attributes.u.lots.data: 0020c49b DONE PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T) PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T) next_type: 00 (ISAKMP_PAYLOAD_NONE) length: 0024 t.number: 17 t.id: 01 (ISAKMP_IPSEC_KEY_IKE) t.attributes.type: 0001 (IKE_ATTRIB_ENC) t.attributes.u.attr_16: 0000 (IKE_ENC_NO_CBC) t.attributes.type: 0002 (IKE_ATTRIB_HASH) t.attributes.u.attr_16: 0001 (IKE_HASH_MD5) t.attributes.type: 0004 (IKE_ATTRIB_GROUP_DESC) t.attributes.u.attr_16: 0002 (IKE_GROUP_MODP_1024) t.attributes.type: 0003 (IKE_ATTRIB_AUTH_METHOD) t.attributes.u.attr_16: 0001 (IKE_AUTH_PRESHARED) t.attributes.type: 000b (IKE_ATTRIB_LIFE_TYPE) t.attributes.u.attr_16: 0001 (IKE_LIFE_TYPE_SECONDS) t.attributes.type: 000c (IKE_ATTRIB_LIFE_DURATION) t.attributes.u.lots.length: 0004 t.attributes.u.lots.data: 0020c49b DONE PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T) PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE) DONE PARSING PAYLOAD type: 02 (ISAKMP_PAYLOAD_P) PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE) DONE PARSING PAYLOAD type: 01 (ISAKMP_PAYLOAD_SA) PARSING PAYLOAD type: 04 (ISAKMP_PAYLOAD_KE) next_type: 0a (ISAKMP_PAYLOAD_NONCE) length: 0084 ke.data: 5e0f35ad 72b5c3ed 7afa0ac4 c4739e0e d2627b28 07852549 99526060 fc1fbbe4 03a3c7a2 90b94f28 be40e836 90cd37fa 303f01c2 6b606fcf 85325ddc 1a030866 e8eb8b51 b88a28f8 fb5f725f f48f2723 c7672e88 496c5379 abef70ba 164db836 a269b3c8 24354cc5 04282865 82e830e6 d9824efa b89ba2c8 df1713ac 4887608e DONE PARSING PAYLOAD type: 04 (ISAKMP_PAYLOAD_KE) PARSING PAYLOAD type: 0a (ISAKMP_PAYLOAD_NONCE) next_type: 05 (ISAKMP_PAYLOAD_ID) length: 0018 ke.data: 38fc3028 92331194 c2ac3c3b 1acb6922 c4770528 DONE PARSING PAYLOAD type: 0a (ISAKMP_PAYLOAD_NONCE) PARSING PAYLOAD type: 05 (ISAKMP_PAYLOAD_ID) next_type: 0d (ISAKMP_PAYLOAD_VID) length: 000d id.type: 0b (ISAKMP_IPSEC_ID_KEY_ID) id.protocol: 11 id.port: 01f4 id.data: 76745650 4e DONE PARSING PAYLOAD type: 05 (ISAKMP_PAYLOAD_ID) PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) next_type: 0d (ISAKMP_PAYLOAD_VID) length: 000c ke.data: 09002689 dfd6b712 (Xauth) DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) next_type: 0d (ISAKMP_PAYLOAD_VID) length: 0014 ke.data: 12f5f28c 457168a9 702d9fe2 74cc0100 (Cisco Unity) DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) next_type: 00 (ISAKMP_PAYLOAD_NONE) length: 0014 ke.data: afcad713 68a1f1c9 6b8696fc 77570100 (DPD) DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE) PARSE_OK receiving: <======================== [2013-03-12 09:33:26] S4.4 AM_packet2 [2013-03-12 09:33:26] BEGIN_PARSE Received Packet Len: 396 i_cookie: dac74ced be9ac753 r_cookie: 6d9be56d eb4401f1 payload: 01 (ISAKMP_PAYLOAD_SA) isakmp_version: 10 exchange_type: 04 (ISAKMP_EXCHANGE_AGGRESSIVE) flags: 00 message_id: 00000000 len: 0000018c PARSING PAYLOAD type: 01 (ISAKMP_PAYLOAD_SA) next_type: 04 (ISAKMP_PAYLOAD_KE) length: 003c sa.doi: 00000001 (ISAKMP_DOI_IPSEC) sa.situation: 00000001 (ISAKMP_IPSEC_SIT_IDENTITY_ONLY) PARSING PAYLOAD type: 02 (ISAKMP_PAYLOAD_P) next_type: 00 (ISAKMP_PAYLOAD_NONE) length: 0030 p.number: 01 p.prot_id: 01 (ISAKMP_IPSEC_PROTO_ISAKMP) p.spi_size: 00 length: 01 p.spi: PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T) next_type: 00 (ISAKMP_PAYLOAD_NONE) length: 0028 t.number: 00 t.id: 01 (ISAKMP_IPSEC_KEY_IKE) t.attributes.type: 0001 (IKE_ATTRIB_ENC) t.attributes.u.attr_16: 0007 (IKE_ENC_AES_CBC) t.attributes.type: 000e (IKE_ATTRIB_KEY_LENGTH) t.attributes.u.attr_16: 0080 t.attributes.type: 0002 (IKE_ATTRIB_HASH) t.attributes.u.attr_16: 0002 (IKE_HASH_SHA) t.attributes.type: 0004 (IKE_ATTRIB_GROUP_DESC) t.attributes.u.attr_16: 0002 (IKE_GROUP_MODP_1024) t.attributes.type: 0003 (IKE_ATTRIB_AUTH_METHOD) t.attributes.u.attr_16: fde9 (IKE_AUTH_XAUTHInitPreShared) t.attributes.type: 000b (IKE_ATTRIB_LIFE_TYPE) t.attributes.u.attr_16: 0001 (IKE_LIFE_TYPE_SECONDS) t.attributes.type: 000c (IKE_ATTRIB_LIFE_DURATION) t.attributes.u.lots.length: 0004 t.attributes.u.lots.data: 0020c49b DONE PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T) PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE) DONE PARSING PAYLOAD type: 02 (ISAKMP_PAYLOAD_P) PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE) DONE PARSING PAYLOAD type: 01 (ISAKMP_PAYLOAD_SA) PARSING PAYLOAD type: 04 (ISAKMP_PAYLOAD_KE) next_type: 0a (ISAKMP_PAYLOAD_NONCE) length: 0084 ke.data: 5d7afd65 bf40a66b cc002a0c da33788b 8475521b 3af87ecc d7de5745 18248c91 a41be5b2 d2256d68 91c80f59 cebd3b1a 985753d5 f5e729b0 c9331421 03f9ef55 66aff737 98eb5af0 55089033 bee1f7e3 45a897c7 fd6287b5 bcc0dad9 6a647329 9d3a56aa 54469301 e8d1e31f cccfea23 b5fd3967 2ec812cf 01483b08 86833f23 DONE PARSING PAYLOAD type: 04 (ISAKMP_PAYLOAD_KE) PARSING PAYLOAD type: 0a (ISAKMP_PAYLOAD_NONCE) next_type: 05 (ISAKMP_PAYLOAD_ID) length: 0018 ke.data: d369859d 2975f488 df493192 fac08a87 9904c9fe DONE PARSING PAYLOAD type: 0a (ISAKMP_PAYLOAD_NONCE) PARSING PAYLOAD type: 05 (ISAKMP_PAYLOAD_ID) next_type: 08 (ISAKMP_PAYLOAD_HASH) length: 000c id.type: 01 (ISAKMP_IPSEC_ID_IPV4_ADDR) id.protocol: 11 id.port: 0000 id.data: 4d49ffe1 DONE PARSING PAYLOAD type: 05 (ISAKMP_PAYLOAD_ID) PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH) next_type: 0d (ISAKMP_PAYLOAD_VID) length: 0018 ke.data: a7cc7dbf 4dc96d67 e8963137 7865b918 b5f5052e DONE PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH) PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) next_type: 0d (ISAKMP_PAYLOAD_VID) length: 0014 ke.data: 12f5f28c 457168a9 702d9fe2 74cc0100 (Cisco Unity) DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) next_type: 0d (ISAKMP_PAYLOAD_VID) length: 000c ke.data: 09002689 dfd6b712 (Xauth) DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) next_type: 0d (ISAKMP_PAYLOAD_VID) length: 0014 ke.data: afcad713 68a1f1c9 6b8696fc 77570100 (DPD) DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) next_type: 0d (ISAKMP_PAYLOAD_VID) length: 0018 ke.data: 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000 (unknown) DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) next_type: 0d (ISAKMP_PAYLOAD_VID) length: 0014 ke.data: 985c4270 eb4501f1 ea3c84c6 12e89999 (unknown) DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) next_type: 00 (ISAKMP_PAYLOAD_NONE) length: 0014 ke.data: 1f07f70e aa6514d3 b0fa9654 2a500100 (unknown) DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE) PARSE_OK got ike lifetime attributes: 2147483 seconds IKE SA selected psk+xauth-aes128-sha1 unknown ISAKMP_PAYLOAD_VID: 12f5f28c 457168a9 702d9fe2 74cc0100 peer is XAUTH capable (draft-ietf-ipsec-isakmp-xauth-06) peer is DPD capable (RFC3706) unknown ISAKMP_PAYLOAD_VID: 4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000 unknown ISAKMP_PAYLOAD_VID: 985c4270 eb4501f1 ea3c84c6 12e89999 unknown ISAKMP_PAYLOAD_VID: 1f07f70e aa6514d3 b0fa9654 2a500100 dh_shared_secret: c1206d5a 2f0a5522 71811ae1 9963a927 a26ae0cf 7d89d577 d550de18 a96ffd64 bb48514e 814b2229 a7d7a505 fbde0db9 20307996 f25ce86c 6b17d166 3b47d8b6 c42bc6cd df2b51de 957988ce fb9cdb87 eaa2b55b 96dcc8a5 f70ce534 8e6b96b7 ef93e9a1 e9306300 482228f9 ac154417 ce3e00bb fc87f912 db33914d 099e5c78 (not dumping psk hash) skeyid: f7da5f16 b7621235 9ef76f9e 07466ec4 619986be expected hash: a7cc7dbf 4dc96d67 e8963137 7865b918 b5f5052e received hash: a7cc7dbf 4dc96d67 e8963137 7865b918 b5f5052e returned_hash: 518da587 0cb0b3bb 6666e91b 5edc8614 fef9c8ab psk_hash: 14b58707 3ffe323d 9e16d8ec 6129c823 93bca26f dh_shared_secret: c1206d5a 2f0a5522 71811ae1 9963a927 a26ae0cf 7d89d577 d550de18 a96ffd64 bb48514e 814b2229 a7d7a505 fbde0db9 20307996 f25ce86c 6b17d166 3b47d8b6 c42bc6cd df2b51de 957988ce fb9cdb87 eaa2b55b 96dcc8a5 f70ce534 8e6b96b7 ef93e9a1 e9306300 482228f9 ac154417 ce3e00bb fc87f912 db33914d 099e5c78 skeyid_d: d843a0a7 d31aacb6 de1e505c 06dba227 9bba4fbf skeyid_a: 5889b06b 7aeaf043 d11deb08 fe06014f 2e48a768 skeyid_e: 9636c8ad 2af6388f 1cb309dd 27558e28 7fe0d424 enc-key: 9636c8ad 2af6388f 1cb309dd 27558e28 current_iv: 9948509c a2d85235 ef6164cd 2a5aaee0 NAT status: no NAT-T VID seen S4.5 AM_packet3 [2013-03-12 09:33:26] size = 92, blksz = 16, padding = 4 sending: ========================> BEGIN_PARSE Received Packet Len: 124 i_cookie: dac74ced be9ac753 r_cookie: 6d9be56d eb4401f1 payload: 08 (ISAKMP_PAYLOAD_HASH) isakmp_version: 10 exchange_type: 04 (ISAKMP_EXCHANGE_AGGRESSIVE) flags: 01 message_id: 00000000 len: 0000007c PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH) next_type: 0b (ISAKMP_PAYLOAD_N) length: 0018 ke.data: 518da587 0cb0b3bb 6666e91b 5edc8614 fef9c8ab DONE PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH) PARSING PAYLOAD type: 0b (ISAKMP_PAYLOAD_N) next_type: 0d (ISAKMP_PAYLOAD_VID) length: 001c n.doi: 00000001 (ISAKMP_DOI_IPSEC) n.protocol: 01 (ISAKMP_IPSEC_PROTO_ISAKMP) n.spi_length: 10 n.type: 6002 (ISAKMP_N_IPSEC_INITIAL_CONTACT) n.spi: dac74ced be9ac753 6d9be56d eb4401f1 n.data: DONE PARSING PAYLOAD type: 0b (ISAKMP_PAYLOAD_N) PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) next_type: 0d (ISAKMP_PAYLOAD_VID) length: 0014 ke.data: 126e1f57 7291153b 20485f7f 155b4bc8 (unknown) DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) next_type: 00 (ISAKMP_PAYLOAD_NONE) length: 0014 ke.data: 12f5f28c 457168a9 702d9fe2 74cc0100 (Cisco Unity) DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID) PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE) PARSE_OK initial_iv: 65f4125a 515403e4 d12c86c8 7ab3bea1 receiving: <======================== [2013-03-12 09:33:26] S4.6 cleanup [2013-03-12 09:33:26] S5 do_phase2_xauth [2013-03-12 09:33:26] S5.1 xauth_request [2013-03-12 09:33:26] S5.2 notice_check [2013-03-12 09:33:26] BEGIN_PARSE Received Packet Len: 76 i_cookie: dac74ced be9ac753 r_cookie: 6d9be56d eb4401f1 payload: 08 (ISAKMP_PAYLOAD_HASH) isakmp_version: 10 exchange_type: 06 (ISAKMP_EXCHANGE_MODECFG_TRANSACTION) flags: 01 message_id: f1dbc7c1 len: 0000004c PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH) next_type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR) length: 0018 ke.data: 69a8f5e4 c03859c6 1977eacc e5d81aeb d96355fc DONE PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH) PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR) next_type: 00 (ISAKMP_PAYLOAD_NONE) length: 0014 modecfg.type: 01 (ISAKMP_MODECFG_CFG_REQUEST) modecfg.id: 0000 t.attributes.type: 4088 (ISAKMP_XAUTH_06_ATTRIB_TYPE) t.attributes.u.attr_16: 0000 t.attributes.type: 4089 (ISAKMP_XAUTH_06_ATTRIB_USER_NAME) t.attributes.u.lots.length: 0000 t.attributes.u.lots.data: t.attributes.type: 408a (ISAKMP_XAUTH_06_ATTRIB_USER_PASSWORD) t.attributes.u.lots.length: 0000 t.attributes.u.lots.data: DONE PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR) PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE) PARSE_OK hashlen: 20 u.hash.length: 20 expected_hash: 69a8f5e4 c03859c6 1977eacc e5d81aeb d96355fc h->u.hash.data: 69a8f5e4 c03859c6 1977eacc e5d81aeb d96355fc S5.3 type-is-xauth check [2013-03-12 09:33:26] S5.4 xauth type check [2013-03-12 09:33:26] S5.5 do xauth reply [2013-03-12 09:33:26] size = 72, blksz = 16, padding = 8 sending: ========================> BEGIN_PARSE Received Packet Len: 108 i_cookie: dac74ced be9ac753 r_cookie: 6d9be56d eb4401f1 payload: 08 (ISAKMP_PAYLOAD_HASH) isakmp_version: 10 exchange_type: 06 (ISAKMP_EXCHANGE_MODECFG_TRANSACTION) flags: 01 message_id: f1dbc7c1 len: 0000006c PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH) next_type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR) length: 0018 ke.data: f89b9e77 f35319a2 276028e2 67203896 09b0a5e2 DONE PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH) PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR) next_type: 00 (ISAKMP_PAYLOAD_NONE) length: 0030 modecfg.type: 02 (ISAKMP_MODECFG_CFG_REPLY) modecfg.id: 0000 t.attributes.type: 4088 (ISAKMP_XAUTH_06_ATTRIB_TYPE) t.attributes.u.attr_16: 0000 t.attributes.type: 4089 (ISAKMP_XAUTH_06_ATTRIB_USER_NAME) (not dumping xauth data length) (not dumping xauth data) t.attributes.type: 408a (ISAKMP_XAUTH_06_ATTRIB_USER_PASSWORD) (not dumping xauth data length) (not dumping xauth data) DONE PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR) PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE) PARSE_OK receiving: <======================== [2013-03-12 09:33:26] S5.2 notice_check [2013-03-12 09:33:26] BEGIN_PARSE Received Packet Len: 76 i_cookie: dac74ced be9ac753 r_cookie: 6d9be56d eb4401f1 payload: 08 (ISAKMP_PAYLOAD_HASH) isakmp_version: 10 exchange_type: 06 (ISAKMP_EXCHANGE_MODECFG_TRANSACTION) flags: 01 message_id: c35766b1 len: 0000004c PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH) next_type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR) length: 0018 ke.data: fe32233f 2e66d3d3 1bf168c8 ff5a234d 1f7ae56d DONE PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH) PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR) next_type: 00 (ISAKMP_PAYLOAD_NONE) length: 000c modecfg.type: 03 (ISAKMP_MODECFG_CFG_SET) modecfg.id: 0000 t.attributes.type: 408f (ISAKMP_XAUTH_06_ATTRIB_STATUS) t.attributes.u.attr_16: 0001 DONE PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR) PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE) PARSE_OK hashlen: 20 u.hash.length: 20 expected_hash: fe32233f 2e66d3d3 1bf168c8 ff5a234d 1f7ae56d h->u.hash.data: fe32233f 2e66d3d3 1bf168c8 ff5a234d 1f7ae56d S5.3 type-is-xauth check [2013-03-12 09:33:26] S5.6 process xauth set [2013-03-12 09:33:26] S5.7 send xauth ack [2013-03-12 09:33:26] size = 36, blksz = 16, padding = 12 sending: ========================> BEGIN_PARSE Received Packet Len: 76 i_cookie: dac74ced be9ac753 r_cookie: 6d9be56d eb4401f1 payload: 08 (ISAKMP_PAYLOAD_HASH) isakmp_version: 10 exchange_type: 06 (ISAKMP_EXCHANGE_MODECFG_TRANSACTION) flags: 01 message_id: c35766b1 len: 0000004c PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH) next_type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR) length: 0018 ke.data: 51b1f90d e5c039ab dfa1c608 b79ed746 a2283625 DONE PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH) PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR) next_type: 00 (ISAKMP_PAYLOAD_NONE) length: 000c modecfg.type: 04 (ISAKMP_MODECFG_CFG_ACK) modecfg.id: 0000 t.attributes.type: 408f (ISAKMP_XAUTH_06_ATTRIB_STATUS) t.attributes.u.attr_16: 0001 DONE PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR) PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE) PARSE_OK S5.8 xauth done [2013-03-12 09:33:26] S6 do_phase2_config [2013-03-12 09:33:26] S6.1 phase2_config send modecfg [2013-03-12 09:33:26] size = 151, blksz = 16, padding = 9 sending: ========================> BEGIN_PARSE Received Packet Len: 188 i_cookie: dac74ced be9ac753 r_cookie: 6d9be56d eb4401f1 payload: 08 (ISAKMP_PAYLOAD_HASH) isakmp_version: 10 exchange_type: 06 (ISAKMP_EXCHANGE_MODECFG_TRANSACTION) flags: 01 message_id: 97b42d1c len: 000000bc PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH) next_type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR) length: 0018 ke.data: cc19698c 01411b0f 85939156 695d9cb7 33aa2071 DONE PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH) PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR) next_type: 00 (ISAKMP_PAYLOAD_NONE) length: 007f modecfg.type: 01 (ISAKMP_MODECFG_CFG_REQUEST) modecfg.id: 0014 t.attributes.type: 0001 (ISAKMP_MODECFG_ATTRIB_INTERNAL_IP4_ADDRESS) t.attributes.u.lots.length: 0000 t.attributes.u.lots.data: t.attributes.type: 0002 (ISAKMP_MODECFG_ATTRIB_INTERNAL_IP4_NETMASK) t.attributes.u.lots.length: 0000 t.attributes.u.lots.data: t.attributes.type: 0003 (ISAKMP_MODECFG_ATTRIB_INTERNAL_IP4_DNS) t.attributes.u.lots.length: 0000 t.attributes.u.lots.data: t.attributes.type: 0004 (ISAKMP_MODECFG_ATTRIB_INTERNAL_IP4_NBNS) t.attributes.u.lots.length: 0000 t.attributes.u.lots.data: t.attributes.type: 7002 (ISAKMP_MODECFG_ATTRIB_CISCO_DEF_DOMAIN) t.attributes.u.lots.length: 0000 t.attributes.u.lots.data: t.attributes.type: 7005 (ISAKMP_MODECFG_ATTRIB_CISCO_UDP_ENCAP_PORT) t.attributes.u.lots.length: 0000 t.attributes.u.lots.data: t.attributes.type: 7008 (ISAKMP_MODECFG_ATTRIB_CISCO_FW_TYPE) t.attributes.u.lots.length: 000c t.attributes.u.lots.data: 80010001 80020001 80030002 t.attributes.type: 7007 (ISAKMP_MODECFG_ATTRIB_CISCO_DO_PFS) t.attributes.u.lots.length: 0000 t.attributes.u.lots.data: t.attributes.type: 7000 (ISAKMP_MODECFG_ATTRIB_CISCO_BANNER) t.attributes.u.lots.length: 0000 t.attributes.u.lots.data: t.attributes.type: 7001 (ISAKMP_MODECFG_ATTRIB_CISCO_SAVE_PW) t.attributes.u.lots.length: 0000 t.attributes.u.lots.data: t.attributes.type: 7004 (ISAKMP_MODECFG_ATTRIB_CISCO_SPLIT_INC) t.attributes.u.lots.length: 0000 t.attributes.type: 7003 (ISAKMP_MODECFG_ATTRIB_CISCO_SPLIT_DNS) t.attributes.u.lots.length: 0000 t.attributes.u.lots.data: t.attributes.type: 700a (ISAKMP_MODECFG_ATTRIB_CISCO_DDNS_HOSTNAME) t.attributes.u.lots.length: 000b t.attributes.u.lots.data: 45595545 4b53454c 47494c t.attributes.type: 0007 (ISAKMP_MODECFG_ATTRIB_APPLICATION_VERSION) t.attributes.u.lots.length: 0028 t.attributes.u.lots.data: 43697363 6f205379 7374656d 73205650 4e20436c 69656e74 20302e35 2e337235 31323a4c 696e7578 DONE PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR) PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE) PARSE_OK ********************************************** Continues ********************************* Trying to connect to server via ssh. But it never asks for a password. ********************************************* Output ************************************ lifetime status: 56 of 28800 seconds used, 0|0 of 0 kbytes used Rx pkt: 45000049 00004000 40112357 0a240084 0a240282 7ea20035 0035df37 533b0100 00010000 00000000 0c64656d 64632d70 722d7030 36026465 0776616c 74656368 03636f6d 00000100 01 sending packet: len = 117, padding = 5 iv: 26fda929 f6decc5b d05c1759 30ccb091 sending ESP packet (before crypt): 45008800 c41d0000 4032fff9 0a000308 4d49ffe1 7658c075 0000000e 26fda929 f6decc5b d05c1759 30ccb091 45000049 00004000 40112357 0a240084 0a240282 7ea20035 0035df37 533b0100 00010000 00000000 0c64656d 64632d70 722d7030 36026465 0776616c 74656368 03636f6d 00000100 01010203 04050504 sending ESP packet (after crypt): 45008800 c41d0000 4032fff9 0a000308 4d49ffe1 7658c075 0000000e 26fda929 f6decc5b d05c1759 30ccb091 729fc433 3eb6fecd d86f8940 fc798760 0b37e167 06bdd147 88a00e48 0886432d 3ea38b47 0d56b9fc 7af56adf 62facd45 e3acec86 b8e68a56 e2e4954e b7b3219d edcdb178 b5393520 d9cbd1d0 0a64ee52 sending ESP packet (after ah): 45008800 c41d0000 4032fff9 0a000308 4d49ffe1 7658c075 0000000e 26fda929 f6decc5b d05c1759 30ccb091 729fc433 3eb6fecd d86f8940 fc798760 0b37e167 06bdd147 88a00e48 0886432d 3ea38b47 0d56b9fc 7af56adf 62facd45 e3acec86 b8e68a56 e2e4954e b7b3219d edcdb178 b5393520 d9cbd1d0 0a64ee52 a384f2c5 0e78b858 f46986b2 size = 56, blksz = 16, padding = 8 sending: ========================> BEGIN_PARSE Received Packet Len: 92 i_cookie: 0a8a8ce1 011feefc r_cookie: a1b653d8 b920652e payload: 08 (ISAKMP_PAYLOAD_HASH) isakmp_version: 10 exchange_type: 05 (ISAKMP_EXCHANGE_INFORMATIONAL) flags: 01 message_id: 0e48e8d0 len: 0000005c PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH) next_type: 0b (ISAKMP_PAYLOAD_N) length: 0018 ke.data: 404676bd 9d2c1bcf f3750ed1 b753d1f7 7dbff28f DONE PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH) PARSING PAYLOAD type: 0b (ISAKMP_PAYLOAD_N) next_type: 00 (ISAKMP_PAYLOAD_NONE) length: 0020 n.doi: 00000001 (ISAKMP_DOI_IPSEC) n.protocol: 01 (ISAKMP_IPSEC_PROTO_ISAKMP) n.spi_length: 10 n.type: 8d28 (ISAKMP_N_R_U_THERE) n.spi: 0a8a8ce1 011feefc a1b653d8 b920652e n.data: 73c56b82 DONE PARSING PAYLOAD type: 0b (ISAKMP_PAYLOAD_N) PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE) PARSE_OK lifetime status: 60 of 28800 seconds used, 0|1 of 0 kbytes used *************************************************** Continues ************************************ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1104173 Title: vpnc does not connect if started from network-manager-gnome To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/network-manager-vpnc/+bug/1104173/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs