sudo /usr/lib/NetworkManager/nm-vpnc-service --debug
******************************************** Output
***************************************
** Message: nm-vpnc-service (version 0.9.6.0) starting...
** Message: vpnc started with pid 10998
connection
name : "connection"
id : "AES256-encrypted IPSec-Client-Dialin" (s)
uuid : "fa84dcef-339f-43a2-8d41-cf13349a104a" (s)
type : "vpn" (s)
permissions : [] (sd)
autoconnect : TRUE (sd)
timestamp : 1359043019 (s)
read-only : FALSE (sd)
zone : NULL (sd)
master : NULL (sd)
slave-type : NULL (sd)
vpn
name : "vpn"
service-type : "org.freedesktop.NetworkManager.vpnc" (s)
user-name : "**********" (s)
data : [ { 'NAT Traversal Mode': cisco-udp }, { 'ipsec-secret-type':
save }, { 'IPSec secret-flags': 1 }, { 'xauth-password-type': save }, {
'Vendor': cisco }, { 'Xauth username': *********** }, { 'IPSec gateway':
*********** }, { 'DPD idle timeout (our side)': 60 }, { 'IPSec ID': vtVPN }, {
'Xauth password-flags': 1 }, { 'Perfect Forward Secrecy': server }, { 'IKE DH
Group': dh2 }, { 'Local Port': 500 }, ] (s)
secrets : [ { 'IPSec secret': ************** }, { 'Xauth password':
************** }, ] (s)
ipv4
name : "ipv4"
method : "auto" (s)
dns : [] (s)
dns-search : [] (sd)
addresses : [] (s)
routes : [] (s)
ignore-auto-routes : FALSE (sd)
ignore-auto-dns : FALSE (sd)
dhcp-client-id : NULL (sd)
dhcp-send-hostname : TRUE (sd)
dhcp-hostname : NULL (sd)
never-default : FALSE (sd)
may-fail : TRUE (sd)
Config: Debug 3
Config: Script /usr/lib/NetworkManager/nm-vpnc-service-vpnc-helper
Config: Cisco UDP Encapsulation Port 0
Config: Local Port 500
Config: IKE DH Group dh2
Config: Perfect Forward Secrecy server
Config: IPSec ID vtVPN
Config: DPD idle timeout (our side) 60
Config: IPSec gateway demdc-fw01.valtech.de
Config: Xauth username erwin.yuekselgil
Config: Vendor cisco
Config: NAT Traversal Mode cisco-udp
Config: Xauth password !vtPa55w0rd!
Config: IPSec secret T2jjr0mUh9C=YD$2dkAU|ujk)WbhT7
vpnc version 0.5.3r512
hex_test: 00010203
S1 init_sockaddr
[2013-03-12 09:33:26]
S2 make_socket
[2013-03-12 09:33:26]
S3 setup_tunnel
[2013-03-12 09:33:26]
using interface tun0
S4 do_phase1_am
[2013-03-12 09:33:26]
S4.1 create_nonce
[2013-03-12 09:33:26]
i_cookie: dac74ced be9ac753
i_nonce:
38fc3028 92331194 c2ac3c3b 1acb6922 c4770528
S4.2 dh setup
[2013-03-12 09:33:26]
dh_public:
5e0f35ad 72b5c3ed 7afa0ac4 c4739e0e d2627b28 07852549 99526060 fc1fbbe4
03a3c7a2 90b94f28 be40e836 90cd37fa 303f01c2 6b606fcf 85325ddc 1a030866
e8eb8b51 b88a28f8 fb5f725f f48f2723 c7672e88 496c5379 abef70ba 164db836
a269b3c8 24354cc5 04282865 82e830e6 d9824efa b89ba2c8 df1713ac 4887608e
S4.3 AM packet_1
[2013-03-12 09:33:26]
sending: ========================>
BEGIN_PARSE
Received Packet Len: 1181
i_cookie: dac74ced be9ac753
r_cookie: 00000000 00000000
payload: 01 (ISAKMP_PAYLOAD_SA)
isakmp_version: 10
exchange_type: 04 (ISAKMP_EXCHANGE_AGGRESSIVE)
flags: 00
message_id: 00000000
len: 0000049d
PARSING PAYLOAD type: 01 (ISAKMP_PAYLOAD_SA)
next_type: 04 (ISAKMP_PAYLOAD_KE)
length: 03a4
sa.doi: 00000001 (ISAKMP_DOI_IPSEC)
sa.situation: 00000001 (ISAKMP_IPSEC_SIT_IDENTITY_ONLY)
PARSING PAYLOAD type: 02 (ISAKMP_PAYLOAD_P)
next_type: 00 (ISAKMP_PAYLOAD_NONE)
length: 0398
p.number: 00
p.prot_id: 01 (ISAKMP_IPSEC_PROTO_ISAKMP)
p.spi_size: 00
length: 18
p.spi:
PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T)
next_type: 03 (ISAKMP_PAYLOAD_T)
length: 0028
t.number: 00
t.id: 01 (ISAKMP_IPSEC_KEY_IKE)
t.attributes.type: 000e (IKE_ATTRIB_KEY_LENGTH)
t.attributes.u.attr_16: 0100
t.attributes.type: 0001 (IKE_ATTRIB_ENC)
t.attributes.u.attr_16: 0007 (IKE_ENC_AES_CBC)
t.attributes.type: 0002 (IKE_ATTRIB_HASH)
t.attributes.u.attr_16: 0002 (IKE_HASH_SHA)
t.attributes.type: 0004 (IKE_ATTRIB_GROUP_DESC)
t.attributes.u.attr_16: 0002 (IKE_GROUP_MODP_1024)
t.attributes.type: 0003 (IKE_ATTRIB_AUTH_METHOD)
t.attributes.u.attr_16: fde9 (IKE_AUTH_XAUTHInitPreShared)
t.attributes.type: 000b (IKE_ATTRIB_LIFE_TYPE)
t.attributes.u.attr_16: 0001 (IKE_LIFE_TYPE_SECONDS)
t.attributes.type: 000c (IKE_ATTRIB_LIFE_DURATION)
t.attributes.u.lots.length: 0004
t.attributes.u.lots.data: 0020c49b
DONE PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T)
PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T)
next_type: 03 (ISAKMP_PAYLOAD_T)
length: 0028
t.number: 01
t.id: 01 (ISAKMP_IPSEC_KEY_IKE)
t.attributes.type: 000e (IKE_ATTRIB_KEY_LENGTH)
t.attributes.u.attr_16: 0100
t.attributes.type: 0001 (IKE_ATTRIB_ENC)
t.attributes.u.attr_16: 0007 (IKE_ENC_AES_CBC)
t.attributes.type: 0002 (IKE_ATTRIB_HASH)
t.attributes.u.attr_16: 0001 (IKE_HASH_MD5)
t.attributes.type: 0004 (IKE_ATTRIB_GROUP_DESC)
t.attributes.u.attr_16: 0002 (IKE_GROUP_MODP_1024)
t.attributes.type: 0003 (IKE_ATTRIB_AUTH_METHOD)
t.attributes.u.attr_16: fde9 (IKE_AUTH_XAUTHInitPreShared)
t.attributes.type: 000b (IKE_ATTRIB_LIFE_TYPE)
t.attributes.u.attr_16: 0001 (IKE_LIFE_TYPE_SECONDS)
t.attributes.type: 000c (IKE_ATTRIB_LIFE_DURATION)
t.attributes.u.lots.length: 0004
t.attributes.u.lots.data: 0020c49b
DONE PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T)
PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T)
next_type: 03 (ISAKMP_PAYLOAD_T)
length: 0028
t.number: 02
t.id: 01 (ISAKMP_IPSEC_KEY_IKE)
t.attributes.type: 000e (IKE_ATTRIB_KEY_LENGTH)
t.attributes.u.attr_16: 00c0
t.attributes.type: 0001 (IKE_ATTRIB_ENC)
t.attributes.u.attr_16: 0007 (IKE_ENC_AES_CBC)
t.attributes.type: 0002 (IKE_ATTRIB_HASH)
t.attributes.u.attr_16: 0002 (IKE_HASH_SHA)
t.attributes.type: 0004 (IKE_ATTRIB_GROUP_DESC)
t.attributes.u.attr_16: 0002 (IKE_GROUP_MODP_1024)
t.attributes.type: 0003 (IKE_ATTRIB_AUTH_METHOD)
t.attributes.u.attr_16: fde9 (IKE_AUTH_XAUTHInitPreShared)
t.attributes.type: 000b (IKE_ATTRIB_LIFE_TYPE)
t.attributes.u.attr_16: 0001 (IKE_LIFE_TYPE_SECONDS)
t.attributes.type: 000c (IKE_ATTRIB_LIFE_DURATION)
t.attributes.u.lots.length: 0004
t.attributes.u.lots.data: 0020c49b
DONE PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T)
......
PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T)
next_type: 03 (ISAKMP_PAYLOAD_T)
length: 0024
t.number: 16
t.id: 01 (ISAKMP_IPSEC_KEY_IKE)
t.attributes.type: 0001 (IKE_ATTRIB_ENC)
t.attributes.u.attr_16: 0000 (IKE_ENC_NO_CBC)
t.attributes.type: 0002 (IKE_ATTRIB_HASH)
t.attributes.u.attr_16: 0002 (IKE_HASH_SHA)
t.attributes.type: 0004 (IKE_ATTRIB_GROUP_DESC)
t.attributes.u.attr_16: 0002 (IKE_GROUP_MODP_1024)
t.attributes.type: 0003 (IKE_ATTRIB_AUTH_METHOD)
t.attributes.u.attr_16: 0001 (IKE_AUTH_PRESHARED)
t.attributes.type: 000b (IKE_ATTRIB_LIFE_TYPE)
t.attributes.u.attr_16: 0001 (IKE_LIFE_TYPE_SECONDS)
t.attributes.type: 000c (IKE_ATTRIB_LIFE_DURATION)
t.attributes.u.lots.length: 0004
t.attributes.u.lots.data: 0020c49b
DONE PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T)
PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T)
next_type: 00 (ISAKMP_PAYLOAD_NONE)
length: 0024
t.number: 17
t.id: 01 (ISAKMP_IPSEC_KEY_IKE)
t.attributes.type: 0001 (IKE_ATTRIB_ENC)
t.attributes.u.attr_16: 0000 (IKE_ENC_NO_CBC)
t.attributes.type: 0002 (IKE_ATTRIB_HASH)
t.attributes.u.attr_16: 0001 (IKE_HASH_MD5)
t.attributes.type: 0004 (IKE_ATTRIB_GROUP_DESC)
t.attributes.u.attr_16: 0002 (IKE_GROUP_MODP_1024)
t.attributes.type: 0003 (IKE_ATTRIB_AUTH_METHOD)
t.attributes.u.attr_16: 0001 (IKE_AUTH_PRESHARED)
t.attributes.type: 000b (IKE_ATTRIB_LIFE_TYPE)
t.attributes.u.attr_16: 0001 (IKE_LIFE_TYPE_SECONDS)
t.attributes.type: 000c (IKE_ATTRIB_LIFE_DURATION)
t.attributes.u.lots.length: 0004
t.attributes.u.lots.data: 0020c49b
DONE PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T)
PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE)
DONE PARSING PAYLOAD type: 02 (ISAKMP_PAYLOAD_P)
PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE)
DONE PARSING PAYLOAD type: 01 (ISAKMP_PAYLOAD_SA)
PARSING PAYLOAD type: 04 (ISAKMP_PAYLOAD_KE)
next_type: 0a (ISAKMP_PAYLOAD_NONCE)
length: 0084
ke.data:
5e0f35ad 72b5c3ed 7afa0ac4 c4739e0e d2627b28 07852549 99526060 fc1fbbe4
03a3c7a2 90b94f28 be40e836 90cd37fa 303f01c2 6b606fcf 85325ddc 1a030866
e8eb8b51 b88a28f8 fb5f725f f48f2723 c7672e88 496c5379 abef70ba 164db836
a269b3c8 24354cc5 04282865 82e830e6 d9824efa b89ba2c8 df1713ac 4887608e
DONE PARSING PAYLOAD type: 04 (ISAKMP_PAYLOAD_KE)
PARSING PAYLOAD type: 0a (ISAKMP_PAYLOAD_NONCE)
next_type: 05 (ISAKMP_PAYLOAD_ID)
length: 0018
ke.data:
38fc3028 92331194 c2ac3c3b 1acb6922 c4770528
DONE PARSING PAYLOAD type: 0a (ISAKMP_PAYLOAD_NONCE)
PARSING PAYLOAD type: 05 (ISAKMP_PAYLOAD_ID)
next_type: 0d (ISAKMP_PAYLOAD_VID)
length: 000d
id.type: 0b (ISAKMP_IPSEC_ID_KEY_ID)
id.protocol: 11
id.port: 01f4
id.data: 76745650 4e
DONE PARSING PAYLOAD type: 05 (ISAKMP_PAYLOAD_ID)
PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
next_type: 0d (ISAKMP_PAYLOAD_VID)
length: 000c
ke.data: 09002689 dfd6b712
(Xauth)
DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
next_type: 0d (ISAKMP_PAYLOAD_VID)
length: 0014
ke.data: 12f5f28c 457168a9 702d9fe2 74cc0100
(Cisco Unity)
DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
next_type: 00 (ISAKMP_PAYLOAD_NONE)
length: 0014
ke.data: afcad713 68a1f1c9 6b8696fc 77570100
(DPD)
DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE)
PARSE_OK
receiving: <========================
[2013-03-12 09:33:26]
S4.4 AM_packet2
[2013-03-12 09:33:26]
BEGIN_PARSE
Received Packet Len: 396
i_cookie: dac74ced be9ac753
r_cookie: 6d9be56d eb4401f1
payload: 01 (ISAKMP_PAYLOAD_SA)
isakmp_version: 10
exchange_type: 04 (ISAKMP_EXCHANGE_AGGRESSIVE)
flags: 00
message_id: 00000000
len: 0000018c
PARSING PAYLOAD type: 01 (ISAKMP_PAYLOAD_SA)
next_type: 04 (ISAKMP_PAYLOAD_KE)
length: 003c
sa.doi: 00000001 (ISAKMP_DOI_IPSEC)
sa.situation: 00000001 (ISAKMP_IPSEC_SIT_IDENTITY_ONLY)
PARSING PAYLOAD type: 02 (ISAKMP_PAYLOAD_P)
next_type: 00 (ISAKMP_PAYLOAD_NONE)
length: 0030
p.number: 01
p.prot_id: 01 (ISAKMP_IPSEC_PROTO_ISAKMP)
p.spi_size: 00
length: 01
p.spi:
PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T)
next_type: 00 (ISAKMP_PAYLOAD_NONE)
length: 0028
t.number: 00
t.id: 01 (ISAKMP_IPSEC_KEY_IKE)
t.attributes.type: 0001 (IKE_ATTRIB_ENC)
t.attributes.u.attr_16: 0007 (IKE_ENC_AES_CBC)
t.attributes.type: 000e (IKE_ATTRIB_KEY_LENGTH)
t.attributes.u.attr_16: 0080
t.attributes.type: 0002 (IKE_ATTRIB_HASH)
t.attributes.u.attr_16: 0002 (IKE_HASH_SHA)
t.attributes.type: 0004 (IKE_ATTRIB_GROUP_DESC)
t.attributes.u.attr_16: 0002 (IKE_GROUP_MODP_1024)
t.attributes.type: 0003 (IKE_ATTRIB_AUTH_METHOD)
t.attributes.u.attr_16: fde9 (IKE_AUTH_XAUTHInitPreShared)
t.attributes.type: 000b (IKE_ATTRIB_LIFE_TYPE)
t.attributes.u.attr_16: 0001 (IKE_LIFE_TYPE_SECONDS)
t.attributes.type: 000c (IKE_ATTRIB_LIFE_DURATION)
t.attributes.u.lots.length: 0004
t.attributes.u.lots.data: 0020c49b
DONE PARSING PAYLOAD type: 03 (ISAKMP_PAYLOAD_T)
PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE)
DONE PARSING PAYLOAD type: 02 (ISAKMP_PAYLOAD_P)
PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE)
DONE PARSING PAYLOAD type: 01 (ISAKMP_PAYLOAD_SA)
PARSING PAYLOAD type: 04 (ISAKMP_PAYLOAD_KE)
next_type: 0a (ISAKMP_PAYLOAD_NONCE)
length: 0084
ke.data:
5d7afd65 bf40a66b cc002a0c da33788b 8475521b 3af87ecc d7de5745 18248c91
a41be5b2 d2256d68 91c80f59 cebd3b1a 985753d5 f5e729b0 c9331421 03f9ef55
66aff737 98eb5af0 55089033 bee1f7e3 45a897c7 fd6287b5 bcc0dad9 6a647329
9d3a56aa 54469301 e8d1e31f cccfea23 b5fd3967 2ec812cf 01483b08 86833f23
DONE PARSING PAYLOAD type: 04 (ISAKMP_PAYLOAD_KE)
PARSING PAYLOAD type: 0a (ISAKMP_PAYLOAD_NONCE)
next_type: 05 (ISAKMP_PAYLOAD_ID)
length: 0018
ke.data:
d369859d 2975f488 df493192 fac08a87 9904c9fe
DONE PARSING PAYLOAD type: 0a (ISAKMP_PAYLOAD_NONCE)
PARSING PAYLOAD type: 05 (ISAKMP_PAYLOAD_ID)
next_type: 08 (ISAKMP_PAYLOAD_HASH)
length: 000c
id.type: 01 (ISAKMP_IPSEC_ID_IPV4_ADDR)
id.protocol: 11
id.port: 0000
id.data: 4d49ffe1
DONE PARSING PAYLOAD type: 05 (ISAKMP_PAYLOAD_ID)
PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH)
next_type: 0d (ISAKMP_PAYLOAD_VID)
length: 0018
ke.data:
a7cc7dbf 4dc96d67 e8963137 7865b918 b5f5052e
DONE PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH)
PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
next_type: 0d (ISAKMP_PAYLOAD_VID)
length: 0014
ke.data: 12f5f28c 457168a9 702d9fe2 74cc0100
(Cisco Unity)
DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
next_type: 0d (ISAKMP_PAYLOAD_VID)
length: 000c
ke.data: 09002689 dfd6b712
(Xauth)
DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
next_type: 0d (ISAKMP_PAYLOAD_VID)
length: 0014
ke.data: afcad713 68a1f1c9 6b8696fc 77570100
(DPD)
DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
next_type: 0d (ISAKMP_PAYLOAD_VID)
length: 0018
ke.data:
4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000
(unknown)
DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
next_type: 0d (ISAKMP_PAYLOAD_VID)
length: 0014
ke.data: 985c4270 eb4501f1 ea3c84c6 12e89999
(unknown)
DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
next_type: 00 (ISAKMP_PAYLOAD_NONE)
length: 0014
ke.data: 1f07f70e aa6514d3 b0fa9654 2a500100
(unknown)
DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE)
PARSE_OK
got ike lifetime attributes: 2147483 seconds
IKE SA selected psk+xauth-aes128-sha1
unknown ISAKMP_PAYLOAD_VID: 12f5f28c 457168a9 702d9fe2 74cc0100
peer is XAUTH capable (draft-ietf-ipsec-isakmp-xauth-06)
peer is DPD capable (RFC3706)
unknown ISAKMP_PAYLOAD_VID:
4048b7d5 6ebce885 25e7de7f 00d6c2d3 c0000000
unknown ISAKMP_PAYLOAD_VID: 985c4270 eb4501f1 ea3c84c6 12e89999
unknown ISAKMP_PAYLOAD_VID: 1f07f70e aa6514d3 b0fa9654 2a500100
dh_shared_secret:
c1206d5a 2f0a5522 71811ae1 9963a927 a26ae0cf 7d89d577 d550de18 a96ffd64
bb48514e 814b2229 a7d7a505 fbde0db9 20307996 f25ce86c 6b17d166 3b47d8b6
c42bc6cd df2b51de 957988ce fb9cdb87 eaa2b55b 96dcc8a5 f70ce534 8e6b96b7
ef93e9a1 e9306300 482228f9 ac154417 ce3e00bb fc87f912 db33914d 099e5c78
(not dumping psk hash)
skeyid:
f7da5f16 b7621235 9ef76f9e 07466ec4 619986be
expected hash:
a7cc7dbf 4dc96d67 e8963137 7865b918 b5f5052e
received hash:
a7cc7dbf 4dc96d67 e8963137 7865b918 b5f5052e
returned_hash:
518da587 0cb0b3bb 6666e91b 5edc8614 fef9c8ab
psk_hash:
14b58707 3ffe323d 9e16d8ec 6129c823 93bca26f
dh_shared_secret:
c1206d5a 2f0a5522 71811ae1 9963a927 a26ae0cf 7d89d577 d550de18 a96ffd64
bb48514e 814b2229 a7d7a505 fbde0db9 20307996 f25ce86c 6b17d166 3b47d8b6
c42bc6cd df2b51de 957988ce fb9cdb87 eaa2b55b 96dcc8a5 f70ce534 8e6b96b7
ef93e9a1 e9306300 482228f9 ac154417 ce3e00bb fc87f912 db33914d 099e5c78
skeyid_d:
d843a0a7 d31aacb6 de1e505c 06dba227 9bba4fbf
skeyid_a:
5889b06b 7aeaf043 d11deb08 fe06014f 2e48a768
skeyid_e:
9636c8ad 2af6388f 1cb309dd 27558e28 7fe0d424
enc-key: 9636c8ad 2af6388f 1cb309dd 27558e28
current_iv: 9948509c a2d85235 ef6164cd 2a5aaee0
NAT status: no NAT-T VID seen
S4.5 AM_packet3
[2013-03-12 09:33:26]
size = 92, blksz = 16, padding = 4
sending: ========================>
BEGIN_PARSE
Received Packet Len: 124
i_cookie: dac74ced be9ac753
r_cookie: 6d9be56d eb4401f1
payload: 08 (ISAKMP_PAYLOAD_HASH)
isakmp_version: 10
exchange_type: 04 (ISAKMP_EXCHANGE_AGGRESSIVE)
flags: 01
message_id: 00000000
len: 0000007c
PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH)
next_type: 0b (ISAKMP_PAYLOAD_N)
length: 0018
ke.data:
518da587 0cb0b3bb 6666e91b 5edc8614 fef9c8ab
DONE PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH)
PARSING PAYLOAD type: 0b (ISAKMP_PAYLOAD_N)
next_type: 0d (ISAKMP_PAYLOAD_VID)
length: 001c
n.doi: 00000001 (ISAKMP_DOI_IPSEC)
n.protocol: 01 (ISAKMP_IPSEC_PROTO_ISAKMP)
n.spi_length: 10
n.type: 6002 (ISAKMP_N_IPSEC_INITIAL_CONTACT)
n.spi: dac74ced be9ac753 6d9be56d eb4401f1
n.data:
DONE PARSING PAYLOAD type: 0b (ISAKMP_PAYLOAD_N)
PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
next_type: 0d (ISAKMP_PAYLOAD_VID)
length: 0014
ke.data: 126e1f57 7291153b 20485f7f 155b4bc8
(unknown)
DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
next_type: 00 (ISAKMP_PAYLOAD_NONE)
length: 0014
ke.data: 12f5f28c 457168a9 702d9fe2 74cc0100
(Cisco Unity)
DONE PARSING PAYLOAD type: 0d (ISAKMP_PAYLOAD_VID)
PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE)
PARSE_OK
initial_iv: 65f4125a 515403e4 d12c86c8 7ab3bea1
receiving: <========================
[2013-03-12 09:33:26]
S4.6 cleanup
[2013-03-12 09:33:26]
S5 do_phase2_xauth
[2013-03-12 09:33:26]
S5.1 xauth_request
[2013-03-12 09:33:26]
S5.2 notice_check
[2013-03-12 09:33:26]
BEGIN_PARSE
Received Packet Len: 76
i_cookie: dac74ced be9ac753
r_cookie: 6d9be56d eb4401f1
payload: 08 (ISAKMP_PAYLOAD_HASH)
isakmp_version: 10
exchange_type: 06 (ISAKMP_EXCHANGE_MODECFG_TRANSACTION)
flags: 01
message_id: f1dbc7c1
len: 0000004c
PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH)
next_type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR)
length: 0018
ke.data:
69a8f5e4 c03859c6 1977eacc e5d81aeb d96355fc
DONE PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH)
PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR)
next_type: 00 (ISAKMP_PAYLOAD_NONE)
length: 0014
modecfg.type: 01 (ISAKMP_MODECFG_CFG_REQUEST)
modecfg.id: 0000
t.attributes.type: 4088 (ISAKMP_XAUTH_06_ATTRIB_TYPE)
t.attributes.u.attr_16: 0000
t.attributes.type: 4089 (ISAKMP_XAUTH_06_ATTRIB_USER_NAME)
t.attributes.u.lots.length: 0000
t.attributes.u.lots.data:
t.attributes.type: 408a (ISAKMP_XAUTH_06_ATTRIB_USER_PASSWORD)
t.attributes.u.lots.length: 0000
t.attributes.u.lots.data:
DONE PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR)
PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE)
PARSE_OK
hashlen: 20
u.hash.length: 20
expected_hash:
69a8f5e4 c03859c6 1977eacc e5d81aeb d96355fc
h->u.hash.data:
69a8f5e4 c03859c6 1977eacc e5d81aeb d96355fc
S5.3 type-is-xauth check
[2013-03-12 09:33:26]
S5.4 xauth type check
[2013-03-12 09:33:26]
S5.5 do xauth reply
[2013-03-12 09:33:26]
size = 72, blksz = 16, padding = 8
sending: ========================>
BEGIN_PARSE
Received Packet Len: 108
i_cookie: dac74ced be9ac753
r_cookie: 6d9be56d eb4401f1
payload: 08 (ISAKMP_PAYLOAD_HASH)
isakmp_version: 10
exchange_type: 06 (ISAKMP_EXCHANGE_MODECFG_TRANSACTION)
flags: 01
message_id: f1dbc7c1
len: 0000006c
PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH)
next_type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR)
length: 0018
ke.data:
f89b9e77 f35319a2 276028e2 67203896 09b0a5e2
DONE PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH)
PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR)
next_type: 00 (ISAKMP_PAYLOAD_NONE)
length: 0030
modecfg.type: 02 (ISAKMP_MODECFG_CFG_REPLY)
modecfg.id: 0000
t.attributes.type: 4088 (ISAKMP_XAUTH_06_ATTRIB_TYPE)
t.attributes.u.attr_16: 0000
t.attributes.type: 4089 (ISAKMP_XAUTH_06_ATTRIB_USER_NAME)
(not dumping xauth data length)
(not dumping xauth data)
t.attributes.type: 408a (ISAKMP_XAUTH_06_ATTRIB_USER_PASSWORD)
(not dumping xauth data length)
(not dumping xauth data)
DONE PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR)
PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE)
PARSE_OK
receiving: <========================
[2013-03-12 09:33:26]
S5.2 notice_check
[2013-03-12 09:33:26]
BEGIN_PARSE
Received Packet Len: 76
i_cookie: dac74ced be9ac753
r_cookie: 6d9be56d eb4401f1
payload: 08 (ISAKMP_PAYLOAD_HASH)
isakmp_version: 10
exchange_type: 06 (ISAKMP_EXCHANGE_MODECFG_TRANSACTION)
flags: 01
message_id: c35766b1
len: 0000004c
PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH)
next_type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR)
length: 0018
ke.data:
fe32233f 2e66d3d3 1bf168c8 ff5a234d 1f7ae56d
DONE PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH)
PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR)
next_type: 00 (ISAKMP_PAYLOAD_NONE)
length: 000c
modecfg.type: 03 (ISAKMP_MODECFG_CFG_SET)
modecfg.id: 0000
t.attributes.type: 408f (ISAKMP_XAUTH_06_ATTRIB_STATUS)
t.attributes.u.attr_16: 0001
DONE PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR)
PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE)
PARSE_OK
hashlen: 20
u.hash.length: 20
expected_hash:
fe32233f 2e66d3d3 1bf168c8 ff5a234d 1f7ae56d
h->u.hash.data:
fe32233f 2e66d3d3 1bf168c8 ff5a234d 1f7ae56d
S5.3 type-is-xauth check
[2013-03-12 09:33:26]
S5.6 process xauth set
[2013-03-12 09:33:26]
S5.7 send xauth ack
[2013-03-12 09:33:26]
size = 36, blksz = 16, padding = 12
sending: ========================>
BEGIN_PARSE
Received Packet Len: 76
i_cookie: dac74ced be9ac753
r_cookie: 6d9be56d eb4401f1
payload: 08 (ISAKMP_PAYLOAD_HASH)
isakmp_version: 10
exchange_type: 06 (ISAKMP_EXCHANGE_MODECFG_TRANSACTION)
flags: 01
message_id: c35766b1
len: 0000004c
PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH)
next_type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR)
length: 0018
ke.data:
51b1f90d e5c039ab dfa1c608 b79ed746 a2283625
DONE PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH)
PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR)
next_type: 00 (ISAKMP_PAYLOAD_NONE)
length: 000c
modecfg.type: 04 (ISAKMP_MODECFG_CFG_ACK)
modecfg.id: 0000
t.attributes.type: 408f (ISAKMP_XAUTH_06_ATTRIB_STATUS)
t.attributes.u.attr_16: 0001
DONE PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR)
PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE)
PARSE_OK
S5.8 xauth done
[2013-03-12 09:33:26]
S6 do_phase2_config
[2013-03-12 09:33:26]
S6.1 phase2_config send modecfg
[2013-03-12 09:33:26]
size = 151, blksz = 16, padding = 9
sending: ========================>
BEGIN_PARSE
Received Packet Len: 188
i_cookie: dac74ced be9ac753
r_cookie: 6d9be56d eb4401f1
payload: 08 (ISAKMP_PAYLOAD_HASH)
isakmp_version: 10
exchange_type: 06 (ISAKMP_EXCHANGE_MODECFG_TRANSACTION)
flags: 01
message_id: 97b42d1c
len: 000000bc
PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH)
next_type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR)
length: 0018
ke.data:
cc19698c 01411b0f 85939156 695d9cb7 33aa2071
DONE PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH)
PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR)
next_type: 00 (ISAKMP_PAYLOAD_NONE)
length: 007f
modecfg.type: 01 (ISAKMP_MODECFG_CFG_REQUEST)
modecfg.id: 0014
t.attributes.type: 0001 (ISAKMP_MODECFG_ATTRIB_INTERNAL_IP4_ADDRESS)
t.attributes.u.lots.length: 0000
t.attributes.u.lots.data:
t.attributes.type: 0002 (ISAKMP_MODECFG_ATTRIB_INTERNAL_IP4_NETMASK)
t.attributes.u.lots.length: 0000
t.attributes.u.lots.data:
t.attributes.type: 0003 (ISAKMP_MODECFG_ATTRIB_INTERNAL_IP4_DNS)
t.attributes.u.lots.length: 0000
t.attributes.u.lots.data:
t.attributes.type: 0004 (ISAKMP_MODECFG_ATTRIB_INTERNAL_IP4_NBNS)
t.attributes.u.lots.length: 0000
t.attributes.u.lots.data:
t.attributes.type: 7002 (ISAKMP_MODECFG_ATTRIB_CISCO_DEF_DOMAIN)
t.attributes.u.lots.length: 0000
t.attributes.u.lots.data:
t.attributes.type: 7005 (ISAKMP_MODECFG_ATTRIB_CISCO_UDP_ENCAP_PORT)
t.attributes.u.lots.length: 0000
t.attributes.u.lots.data:
t.attributes.type: 7008 (ISAKMP_MODECFG_ATTRIB_CISCO_FW_TYPE)
t.attributes.u.lots.length: 000c
t.attributes.u.lots.data: 80010001 80020001 80030002
t.attributes.type: 7007 (ISAKMP_MODECFG_ATTRIB_CISCO_DO_PFS)
t.attributes.u.lots.length: 0000
t.attributes.u.lots.data:
t.attributes.type: 7000 (ISAKMP_MODECFG_ATTRIB_CISCO_BANNER)
t.attributes.u.lots.length: 0000
t.attributes.u.lots.data:
t.attributes.type: 7001 (ISAKMP_MODECFG_ATTRIB_CISCO_SAVE_PW)
t.attributes.u.lots.length: 0000
t.attributes.u.lots.data:
t.attributes.type: 7004 (ISAKMP_MODECFG_ATTRIB_CISCO_SPLIT_INC)
t.attributes.u.lots.length: 0000
t.attributes.type: 7003 (ISAKMP_MODECFG_ATTRIB_CISCO_SPLIT_DNS)
t.attributes.u.lots.length: 0000
t.attributes.u.lots.data:
t.attributes.type: 700a (ISAKMP_MODECFG_ATTRIB_CISCO_DDNS_HOSTNAME)
t.attributes.u.lots.length: 000b
t.attributes.u.lots.data: 45595545 4b53454c 47494c
t.attributes.type: 0007 (ISAKMP_MODECFG_ATTRIB_APPLICATION_VERSION)
t.attributes.u.lots.length: 0028
t.attributes.u.lots.data:
43697363 6f205379 7374656d 73205650 4e20436c 69656e74 20302e35 2e337235
31323a4c 696e7578
DONE PARSING PAYLOAD type: 0e (ISAKMP_PAYLOAD_MODECFG_ATTR)
PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE)
PARSE_OK
********************************************** Continues
*********************************
Trying to connect to server via ssh. But it never asks for a password.
********************************************* Output
************************************
lifetime status: 56 of 28800 seconds used, 0|0 of 0 kbytes used
Rx pkt:
45000049 00004000 40112357 0a240084 0a240282 7ea20035 0035df37 533b0100
00010000 00000000 0c64656d 64632d70 722d7030 36026465 0776616c 74656368
03636f6d 00000100 01
sending packet: len = 117, padding = 5
iv: 26fda929 f6decc5b d05c1759 30ccb091
sending ESP packet (before crypt):
45008800 c41d0000 4032fff9 0a000308 4d49ffe1 7658c075 0000000e 26fda929
f6decc5b d05c1759 30ccb091 45000049 00004000 40112357 0a240084 0a240282
7ea20035 0035df37 533b0100 00010000 00000000 0c64656d 64632d70 722d7030
36026465 0776616c 74656368 03636f6d 00000100 01010203 04050504
sending ESP packet (after crypt):
45008800 c41d0000 4032fff9 0a000308 4d49ffe1 7658c075 0000000e 26fda929
f6decc5b d05c1759 30ccb091 729fc433 3eb6fecd d86f8940 fc798760 0b37e167
06bdd147 88a00e48 0886432d 3ea38b47 0d56b9fc 7af56adf 62facd45 e3acec86
b8e68a56 e2e4954e b7b3219d edcdb178 b5393520 d9cbd1d0 0a64ee52
sending ESP packet (after ah):
45008800 c41d0000 4032fff9 0a000308 4d49ffe1 7658c075 0000000e 26fda929
f6decc5b d05c1759 30ccb091 729fc433 3eb6fecd d86f8940 fc798760 0b37e167
06bdd147 88a00e48 0886432d 3ea38b47 0d56b9fc 7af56adf 62facd45 e3acec86
b8e68a56 e2e4954e b7b3219d edcdb178 b5393520 d9cbd1d0 0a64ee52 a384f2c5
0e78b858 f46986b2
size = 56, blksz = 16, padding = 8
sending: ========================>
BEGIN_PARSE
Received Packet Len: 92
i_cookie: 0a8a8ce1 011feefc
r_cookie: a1b653d8 b920652e
payload: 08 (ISAKMP_PAYLOAD_HASH)
isakmp_version: 10
exchange_type: 05 (ISAKMP_EXCHANGE_INFORMATIONAL)
flags: 01
message_id: 0e48e8d0
len: 0000005c
PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH)
next_type: 0b (ISAKMP_PAYLOAD_N)
length: 0018
ke.data:
404676bd 9d2c1bcf f3750ed1 b753d1f7 7dbff28f
DONE PARSING PAYLOAD type: 08 (ISAKMP_PAYLOAD_HASH)
PARSING PAYLOAD type: 0b (ISAKMP_PAYLOAD_N)
next_type: 00 (ISAKMP_PAYLOAD_NONE)
length: 0020
n.doi: 00000001 (ISAKMP_DOI_IPSEC)
n.protocol: 01 (ISAKMP_IPSEC_PROTO_ISAKMP)
n.spi_length: 10
n.type: 8d28 (ISAKMP_N_R_U_THERE)
n.spi: 0a8a8ce1 011feefc a1b653d8 b920652e
n.data: 73c56b82
DONE PARSING PAYLOAD type: 0b (ISAKMP_PAYLOAD_N)
PARSING PAYLOAD type: 00 (ISAKMP_PAYLOAD_NONE)
PARSE_OK
lifetime status: 60 of 28800 seconds used, 0|1 of 0 kbytes used
*************************************************** Continues
************************************
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1104173
Title:
vpnc does not connect if started from network-manager-gnome
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager-vpnc/+bug/1104173/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs