My Shrewsoft VPN client appears to have broken in recent weeks. I was not using it for a period of time and now it is not working at all.
I have uninstalled and reinstalled it. When I attempt to connect the software does not appear to be able to get out of my computer at all. If I put in a bad password or a correct password it makes no difference. I used the Trace Utility to record what has happening (masking the IP) 13/02/19 16:16:53 ## : IKE Daemon, ver 2.1.7 13/02/19 16:16:53 ## : Copyright 2010 Shrew Soft Inc. 13/02/19 16:16:53 ## : This product linked OpenSSL 0.9.8h 28 May 2008 13/02/19 16:16:53 ii : opened 'C:\Program Files\ShrewSoft\VPN Client\debug\iked.log' 13/02/19 16:16:53 ii : rebuilding vnet device list ... 13/02/19 16:16:54 ii : device ROOT\VNET\0000 disabled 13/02/19 16:16:54 ii : network process thread begin ... 13/02/19 16:16:54 ii : pfkey process thread begin ... 13/02/19 16:16:54 ii : ipc server process thread begin ... 13/02/19 16:17:02 ii : ipc client process thread begin ... 13/02/19 16:17:02 <A : peer config add message 13/02/19 16:17:02 DB : peer ref increment ( ref count = 1, obj count = 0 ) 13/02/19 16:17:02 DB : peer added ( obj count = 1 ) 13/02/19 16:17:03 ii : local address 10.0.1.32 selected for peer 13/02/19 16:17:03 DB : peer ref increment ( ref count = 2, obj count = 1 ) 13/02/19 16:17:03 DB : tunnel ref increment ( ref count = 1, obj count = 0 ) 13/02/19 16:17:03 DB : tunnel added ( obj count = 1 ) 13/02/19 16:17:03 <A : proposal config message 13/02/19 16:17:03 <A : proposal config message 13/02/19 16:17:03 <A : client config message 13/02/19 16:17:03 <A : xauth username message 13/02/19 16:17:03 <A : xauth password message 13/02/19 16:17:03 <A : local id '[email protected]' message 13/02/19 16:17:03 <A : remote id '[email protected]' message 13/02/19 16:17:03 <A : preshared key message 13/02/19 16:17:03 <A : remote resource message 13/02/19 16:17:03 <A : peer tunnel enable message 13/02/19 16:17:03 DB : tunnel ref increment ( ref count = 2, obj count = 1 ) 13/02/19 16:17:03 DB : new phase1 ( ISAKMP initiator ) 13/02/19 16:17:03 DB : exchange type is aggressive 13/02/19 16:17:03 DB : 10.0.1.32:500 <-> 00.109.237.19:500<http://0.109.237.19:500/> 13/02/19 16:17:03 DB : 1d8fcf824d3b9968:0000000000000000 13/02/19 16:17:03 DB : phase1 ref increment ( ref count = 1, obj count = 0 ) 13/02/19 16:17:03 DB : phase1 added ( obj count = 1 ) 13/02/19 16:17:03 >> : security association payload 13/02/19 16:17:03 >> : - proposal #1 payload 13/02/19 16:17:03 >> : -- transform #1 payload 13/02/19 16:17:03 >> : -- transform #2 payload 13/02/19 16:17:03 >> : -- transform #3 payload 13/02/19 16:17:03 >> : -- transform #4 payload 13/02/19 16:17:03 >> : -- transform #5 payload 13/02/19 16:17:03 >> : -- transform #6 payload 13/02/19 16:17:03 >> : -- transform #7 payload 13/02/19 16:17:03 >> : -- transform #8 payload 13/02/19 16:17:03 >> : -- transform #9 payload 13/02/19 16:17:03 >> : -- transform #10 payload 13/02/19 16:17:03 >> : -- transform #11 payload 13/02/19 16:17:03 >> : -- transform #12 payload 13/02/19 16:17:03 >> : -- transform #13 payload 13/02/19 16:17:03 >> : -- transform #14 payload 13/02/19 16:17:03 >> : -- transform #15 payload 13/02/19 16:17:03 >> : -- transform #16 payload 13/02/19 16:17:03 >> : -- transform #17 payload 13/02/19 16:17:03 >> : -- transform #18 payload 13/02/19 16:17:03 >> : key exchange payload 13/02/19 16:17:03 >> : nonce payload 13/02/19 16:17:03 >> : identification payload 13/02/19 16:17:03 >> : vendor id payload 13/02/19 16:17:03 ii : local supports XAUTH 13/02/19 16:17:03 >> : vendor id payload 13/02/19 16:17:03 ii : local supports nat-t ( draft v00 ) 13/02/19 16:17:03 >> : vendor id payload 13/02/19 16:17:03 ii : local supports nat-t ( draft v01 ) 13/02/19 16:17:03 >> : vendor id payload 13/02/19 16:17:03 ii : local supports nat-t ( draft v02 ) 13/02/19 16:17:03 >> : vendor id payload 13/02/19 16:17:03 ii : local supports nat-t ( draft v03 ) 13/02/19 16:17:03 >> : vendor id payload 13/02/19 16:17:03 ii : local supports nat-t ( rfc ) 13/02/19 16:17:03 >> : vendor id payload 13/02/19 16:17:03 ii : local supports FRAGMENTATION 13/02/19 16:17:03 >> : vendor id payload 13/02/19 16:17:03 ii : local supports DPDv1 13/02/19 16:17:03 >> : vendor id payload 13/02/19 16:17:03 ii : local is SHREW SOFT compatible 13/02/19 16:17:03 >> : vendor id payload 13/02/19 16:17:03 ii : local is NETSCREEN compatible 13/02/19 16:17:03 >> : vendor id payload 13/02/19 16:17:03 ii : local is SIDEWINDER compatible 13/02/19 16:17:03 >> : vendor id payload 13/02/19 16:17:03 ii : local is CISCO UNITY compatible 13/02/19 16:17:03 >= : cookies 1d8fcf824d3b9968:0000000000000000 13/02/19 16:17:03 >= : message 00000000 13/02/19 16:17:03 -> : send IKE packet 10.0.1.32:500 -> 00.109.237.19:500<http://0.109.237.19:500/> ( 1198 bytes ) 13/02/19 16:17:03 DB : phase1 resend event scheduled ( ref count = 2 ) 13/02/19 16:17:03 DB : phase1 ref decrement ( ref count = 1, obj count = 1 ) 13/02/19 16:17:03 DB : tunnel ref increment ( ref count = 3, obj count = 1 ) 13/02/19 16:17:08 -> : resend 1 phase1 packet(s) 10.0.1.32:500 -> 00.109.237.19:500 <http://0.109.237.19:500/> 13/02/19 16:17:13 -> : resend 1 phase1 packet(s) 10.0.1.32:500 -> 00.109.237.19:500 <http://0.109.237.19:500/> 13/02/19 16:17:18 -> : resend 1 phase1 packet(s) 10.0.1.32:500 -> 00.109.237.19:500 <http://0.109.237.19:500/> 13/02/19 16:17:23 ii : resend limit exceeded for phase1 exchange 13/02/19 16:17:23 ii : phase1 removal before expire time 13/02/19 16:17:23 DB : phase1 deleted ( obj count = 0 ) 13/02/19 16:17:23 DB : policy not found 13/02/19 16:17:23 DB : tunnel ref decrement ( ref count = 2, obj count = 1 ) 13/02/19 16:17:23 DB : policy not found 13/02/19 16:17:23 DB : policy not found 13/02/19 16:17:23 DB : policy not found 13/02/19 16:17:23 DB : policy not found 13/02/19 16:17:23 DB : policy not found 13/02/19 16:17:23 DB : tunnel stats event canceled ( ref count = 1 ) 13/02/19 16:17:23 DB : removing tunnel config references 13/02/19 16:17:23 DB : removing tunnel phase2 references 13/02/19 16:17:23 DB : removing tunnel phase1 references 13/02/19 16:17:23 DB : tunnel deleted ( obj count = 0 ) 13/02/19 16:17:23 DB : peer ref decrement ( ref count = 1, obj count = 1 ) 13/02/19 16:17:23 DB : removing all peer tunnel refrences 13/02/19 16:17:23 DB : peer deleted ( obj count = 0 ) 13/02/19 16:17:23 ii : ipc client process thread exit ... I have Windows 7 64-bit. Turning off the Windows Firewall has no effect that I can see. The only change that I know of is that I added a connection for a VPN in the Windows Network Center for a clientless VPN. It is not active but it is on my system. Thoughts? Terry
_______________________________________________ vpn-help mailing list [email protected] https://lists.shrew.net/mailman/listinfo/vpn-help
