Code: Alles auswählen
[TraceData]
(Version) 9.10.0036
(Tracesessions) 0
(Comment) {N/A}
(NumberOfMessages) 32
(OffsetToIndex) 280014
[EndOfHeader]
[TraceStarted] 2024/08/12 13:15:53,290
Used config:
# Trace config
trace + VPN-Status @ -IKE1_HH -46. -2BLU -Loopback
trace + VPN-Packet @ -IKE1_HH -46. -2BLU -Loopback
# Show commands
show bootlog
show locked-jobs
[ShowCmd] 2024/08/12 13:15:54,288
Result of command: "show locked-jobs "
No list was dumped to the flash yet.
Current status:
Signal @ 06de6564 - Hardware-Watchdog pid:2 @ 06de6650 blocked for 18163630888 us at [BT] 04237334 04243170 04251aac 02dd0060
Signal @ 06de79e8 - Message-Watchdog pid:3 @ 06de7ab0 blocked for 18164630902 us at [BT] 04237334 04243da8 04251aac 02dd0060
Signal @ 06c62044 - RCU generation deleter pid:4 @ 06de8ef0 blocked at [BT] 0423686c 04234548 04251aac 02dd0060
Signal @ 0673699c - Http-Client-Auth-Revocation pid:41 @ 0d6c6ad0 blocked for 18318633314 us at [BT] 04237334 01c19b8c 04251aac 02dd0060
Signal @ 0d713824 - Thread-Killer pid:50 @ 0d40e630 blocked at [BT] 0423686c 04243738 04251aac 02dd0060
Signal @ 0919b1b4 - Timer-Management pid:211 @ 0919a110 blocked for 18163534624 us at [BT] 04237334 0424acf8 04251aac 02dd0060
Signal @ 06c4fd94 - Shell pid:214 @ 09211198 blocked at [BT] 0423686c 04a9e94c 0456eafc 02dd0060
Signal @ 0a103484 - USB-Device pid:239 @ 0a101420 blocked for 18199650543 us at [BT] 04237334 039cfbd4 039d34d4 02dcb718 04259210 02dd0060
Signal @ 0a14bcc4 - USB-HC pid:240 @ 0a149c60 blocked at [BT] 042370dc 039cfc78 039d3378 02dcb718 04259210 02dd0060
Signal @ 0a14e084 - USB-DR pid:241 @ 0a14c020 blocked at [BT] 042370dc 039cfc78 039d3378 02dcb718 04259210 02dd0060
Signal @ 0a2cb26c - Diffie-Hellman-Precalc pid:245 @ 0a2c9170 blocked for 18172720527 us at [BT] 04237334 025b3bdc 04251aac 02dd0060
Signal @ 0a2cb3a4 - VPN-Config pid:246 @ 0a2cb4d0 blocked at [BT] 0423686c 02490f64 04251aac 02dd0060
Signal @ 0a2fcfa4 - USB-Device pid:251 @ 0a2faf40 blocked for 18199864299 us at [BT] 04237334 039cfbd4 039d34d4 02dcb718 04259210 02dd0060
condition variable @ 06c0d4dc - BGP-Master-Control pid:264 @ 0a3688d0 blocked at [BT] 04237f8c 03a2758c 04251aac 02dd0060
Signal @ 0a3889ec - Digest-Auth-Revocation pid:269 @ 0a38d1d0 blocked for 18169479936 us at [BT] 04237334 04ac3f1c 04251aac 02dd0060
Signal @ 0a390bd4 - Digest-Auth-Revocation pid:272 @ 0a393290 blocked for 18169479938 us at [BT] 04237334 04ac3f1c 04251aac 02dd0060
HW-ID: NHP
[VPN-Status] 2024/08/12 13:16:05,204 Devicetime: 2024/08/12 13:16:04,716
Peer DEFAULT: Received an IKE_SA_INIT-REQUEST of 948 bytes
Gateways: 84.190.107.180:500<--80.187.81.206:25209
SPIs: 0x10C0C11933042A5B0000000000000000, Message-ID 0
Peer identified: DEFAULT
IKE_SA ('', '' IPSEC_IKE SPIs 0x10C0C11933042A5B3FB9DF732E56B827) entered to SADB
Received 5 notifications:
+NAT_DETECTION_SOURCE_IP(0x1DC727B47E4E74C1C10A2FB0727E710C9AF7A5C3) (STATUS)
+NAT_DETECTION_DESTINATION_IP(0x79A5D2D75CCAF230DF8334CCBF7B274091D24E14) (STATUS)
+IKEV2_FRAGMENTATION_SUPPORTED (STATUS)
+SIGNATURE_HASH_ALGORITHMS(0x0002000300040005) (STATUS)
+REDIRECT_SUPPORTED (STATUS)
Peer (initiator) is behind a NAT
NAT-T enabled => switching on port 4500
We (responder) are not behind a NAT. NAT-T is already enabled
+IKE-SA:
IKE-Proposal-1 (36 transforms)
ENCR : AES-CBC-128 AES-CBC-192 AES-CBC-256 AES-128-CTR AES-128-CTR AES-128-CTR ENCR-CAMELLIA-CBC ENCR-CAMELLIA-CBC ENCR-CAMELLIA-CBC ENCR-CAMELLIA-CTR ENCR-CAMELLIA-CTR ENCR-CAMELLIA-CTR 3DES
PRF : PRF-HMAC-SHA-256 PRF-HMAC-SHA-384 PRF-HMAC-SHA-512 PRF-AES128-XCBC PRF-HMAC-SHA1
INTEG: HMAC-SHA-256 HMAC-SHA-384 HMAC-SHA-512 HMAC-SHA1 AES-XCBC-96
DH : 19 20 21 28 29 30 31 32 15 16 17 18 14
IKE-Proposal-2 (37 transforms)
ENCR : AES-GCM-16-128 AES-GCM-16-192 AES-GCM-16-256 ENCR-AES-CCM-16 ENCR-AES-CCM-16 ENCR-AES-CCM-16 ENCR-CHACHA20-POLY1305 AES-GCM-12 AES-GCM-12 AES-GCM-12 AES-GCM-8 AES-GCM-8 AES-GCM-8 ENCR-AES-CCM-12 ENCR-AES-CCM-12 ENCR-AES-CCM-12 ENCR-AES-CCM-8 ENCR-AES-CCM-8 ENCR-AES-CCM-8
PRF : PRF-HMAC-SHA-256 PRF-HMAC-SHA-384 PRF-HMAC-SHA-512 PRF-AES128-XCBC PRF-HMAC-SHA1
DH : 19 20 21 28 29 30 31 32 15 16 17 18 14
-Agreed on DH-Group 30 but received KE-DH-Group 19 => responding with INVALID_KE_PAYLOAD(30)
[VPN-Status] 2024/08/12 13:16:05,205 Devicetime: 2024/08/12 13:16:04,716
Peer DEFAULT: Constructing an IKE_SA_INIT-RESPONSE for send
NOTIFY(INVALID_KE_PAYLOAD[7680])
Sending an IKE_SA_INIT-RESPONSE of 38 bytes (responder)
Gateways: 84.190.107.180:500-->80.187.81.206:25209, tag 0 (UDP)
SPIs: 0x10C0C11933042A5B0000000000000000, Message-ID 0
[VPN-Status] 2024/08/12 13:16:05,205 Devicetime: 2024/08/12 13:16:04,717
IKE_SA ('', '' IPSEC_IKE SPIs 0x10C0C11933042A5B0000000000000000) removed from SADB
IKE_SA ('', '' IPSEC_IKE SPIs 0x10C0C11933042A5B0000000000000000) freed
[VPN-Status] 2024/08/12 13:16:05,220 Devicetime: 2024/08/12 13:16:04,782
Peer DEFAULT: Received an IKE_SA_INIT-REQUEST of 1012 bytes
Gateways: 84.190.107.180:500<--80.187.81.206:25209
SPIs: 0x10C0C11933042A5B0000000000000000, Message-ID 0
Peer identified: DEFAULT
IKE_SA ('', '' IPSEC_IKE SPIs 0x10C0C11933042A5B79F69B81BF438C88) entered to SADB
Received 5 notifications:
+NAT_DETECTION_SOURCE_IP(0x1DC727B47E4E74C1C10A2FB0727E710C9AF7A5C3) (STATUS)
+NAT_DETECTION_DESTINATION_IP(0x79A5D2D75CCAF230DF8334CCBF7B274091D24E14) (STATUS)
+IKEV2_FRAGMENTATION_SUPPORTED (STATUS)
+SIGNATURE_HASH_ALGORITHMS(0x0002000300040005) (STATUS)
+REDIRECT_SUPPORTED (STATUS)
Peer (initiator) is behind a NAT
NAT-T enabled => switching on port 4500
We (responder) are not behind a NAT. NAT-T is already enabled
+IKE-SA:
IKE-Proposal-1 (36 transforms)
ENCR : AES-CBC-128 AES-CBC-192 AES-CBC-256 AES-128-CTR AES-128-CTR AES-128-CTR ENCR-CAMELLIA-CBC ENCR-CAMELLIA-CBC ENCR-CAMELLIA-CBC ENCR-CAMELLIA-CTR ENCR-CAMELLIA-CTR ENCR-CAMELLIA-CTR 3DES
PRF : PRF-HMAC-SHA-256 PRF-HMAC-SHA-384 PRF-HMAC-SHA-512 PRF-AES128-XCBC PRF-HMAC-SHA1
INTEG: HMAC-SHA-256 HMAC-SHA-384 HMAC-SHA-512 HMAC-SHA1 AES-XCBC-96
DH : 30 19 20 21 28 29 31 32 15 16 17 18 14
IKE-Proposal-2 (37 transforms)
ENCR : AES-GCM-16-128 AES-GCM-16-192 AES-GCM-16-256 ENCR-AES-CCM-16 ENCR-AES-CCM-16 ENCR-AES-CCM-16 ENCR-CHACHA20-POLY1305 AES-GCM-12 AES-GCM-12 AES-GCM-12 AES-GCM-8 AES-GCM-8 AES-GCM-8 ENCR-AES-CCM-12 ENCR-AES-CCM-12 ENCR-AES-CCM-12 ENCR-AES-CCM-8 ENCR-AES-CCM-8 ENCR-AES-CCM-8
PRF : PRF-HMAC-SHA-256 PRF-HMAC-SHA-384 PRF-HMAC-SHA-512 PRF-AES128-XCBC PRF-HMAC-SHA1
DH : 30 19 20 21 28 29 31 32 15 16 17 18 14
+Received KE-DH-Group 30 (1024 bits)
[VPN-Status] 2024/08/12 13:16:05,220 Devicetime: 2024/08/12 13:16:04,833
Peer DEFAULT: Constructing an IKE_SA_INIT-RESPONSE for send
+IKE-SA:
IKE-Proposal-1 (4 transforms)
ENCR : AES-CBC-256
PRF : PRF-HMAC-SHA-256
INTEG: HMAC-SHA-256
DH : 30
+KE-DH-Group 30 (1024 bits)
Switching to port pair 4500 ( NAT-T keep-alive is off)
IKE_SA_INIT [responder] for peer DEFAULT initiator id <no ipsec id>, responder id <no ipsec id>
initiator cookie: 0x10C0C11933042A5B, responder cookie: 0x79F69B81BF438C88
NAT-T enabled. We are not behind a nat, the remote side is behind a nat
SA ISAKMP for peer DEFAULT
Encryption : AES-CBC-256
Integrity : AUTH-HMAC-SHA-256
IKE-DH-Group : 30
PRF : PRF-HMAC-SHA-256
life time soft 08/13/2024 10:52:04 (in 77760 sec) / 0 kb
life time hard 08/13/2024 13:16:04 (in 86400 sec) / 0 kb
DPD: NONE
Negotiated: IKEV2_FRAGMENTATION
Sending an IKE_SA_INIT-RESPONSE of 377 bytes (responder)
Gateways: 84.190.107.180:4500-->80.187.81.206:4500, tag 0 (UDP)
SPIs: 0x10C0C11933042A5B79F69B81BF438C88, Message-ID 0
[VPN-Packet] 2024/08/12 13:16:05,283 Devicetime: 2024/08/12 13:16:04,898 [TELEKOM (9)]
Inbound UDP (17) packet, scope global, routing tag 0, thread 31 IPV4/0:
IPv4: 80.187.81.206 -> 84.190.107.180, Total-Len: 1396
UDP : 25221 -> 4500, Total-Len: 1376
IKEv2.0: 10c0c11933042a5b -> 79f69b81bf438c88, Length: 1364
Binary Data: 23 00 05 38 00 01 00 02 4e b9 a4 a5 e4 7d 98 d1
--> Passed to ike stack
[VPN-Status] 2024/08/12 13:16:05,283 Devicetime: 2024/08/12 13:16:04,900
Peer DEFAULT [responder]: Received an IKE_AUTH-REQUEST of 1364 bytes (encrypted)
Gateways: 84.190.107.180:4500<--80.187.81.206:4500
SPIs: 0x10C0C11933042A5B79F69B81BF438C88, Message-ID 1
Ikev2 Fragment Number/Total: 1/2
[VPN-Packet] 2024/08/12 13:16:05,298 Devicetime: 2024/08/12 13:16:04,905 [TELEKOM (9)]
Inbound UDP (17) packet, scope global, routing tag 0, thread 31 IPV4/0:
IPv4: 80.187.81.206 -> 84.190.107.180, Total-Len: 564
UDP : 25221 -> 4500, Total-Len: 544
IKEv2.0: 10c0c11933042a5b -> 79f69b81bf438c88, Length: 532
Binary Data: 00 00 01 f8 00 02 00 02 9c 69 01 a5 11 15 d0 3f
--> Passed to ike stack
[VPN-Status] 2024/08/12 13:16:05,298 Devicetime: 2024/08/12 13:16:04,910
Peer DEFAULT [responder]: Received an IKE_AUTH-REQUEST of 532 bytes (encrypted)
Gateways: 84.190.107.180:4500<--80.187.81.206:4500
SPIs: 0x10C0C11933042A5B79F69B81BF438C88, Message-ID 1
Ikev2 Fragment Number/Total: 2/2
[VPN-Status] 2024/08/12 13:16:05,314 Devicetime: 2024/08/12 13:16:04,931
Peer DEFAULT [responder]: Received an IKE_AUTH-REQUEST of 1781 bytes
Gateways: 84.190.107.180:4500<--80.187.81.206:4500
SPIs: 0x10C0C11933042A5B79F69B81BF438C88, Message-ID 1
CHILD_SA ('', '' ) entered to SADB
Updating remote port to 25221
Received 5 notifications:
+INITIAL_CONTACT (STATUS)
+MOBIKE_SUPPORTED (STATUS)
+NO_ADDITIONAL_ADDRESSES (STATUS)
+EAP_ONLY_AUTHENTICATION (STATUS)
+MESSAGE_ID_SYNC_SUPPORTED (STATUS)
+Received-ID CN=f4225221.invalid:DER_ASN1_DN matches the Expected-ID CN=f4225221.invalid:DER_ASN1_DN
+Peer identified: ANDROID
-Remote-ID is not referenced in the received certificate
Comparing id 0x301B311930170603550403131066343232353232312E696E76616C6964 with:
cert-id 0x308197310E300C0603550411130538353636313129302706092A864886F70D010901161A6B61726C2D6865696E7A4066616D6669736368626163682E64653112301006035504041309466973636862616368311430120603550407130B466F727374696E6E696E67310B30090603550406130244453110300E060355040A1307417665726C6F6E3111300F060355040313084634323235323231 -> does not DN match
[VPN-Status] 2024/08/12 13:16:05,314 Devicetime: 2024/08/12 13:16:04,932
Peer ANDROID: Constructing an IKE_AUTH-RESPONSE for send
NOTIFY(AUTHENTICATION_FAILED)
IKE_SA ('ANDROID', 'ISAKMP-PEER-ANDROID' IPSEC_IKE SPIs 0x10C0C11933042A5B79F69B81BF438C88) removed from SADB
Sending an IKE_AUTH-RESPONSE of 80 bytes (responder encrypted)
Gateways: 84.190.107.180:4500-->80.187.81.206:25221, tag 0 (UDP)
SPIs: 0x10C0C11933042A5B79F69B81BF438C88, Message-ID 1
[VPN-Status] 2024/08/12 13:16:05,314 Devicetime: 2024/08/12 13:16:04,932
IKE log: 131604.932986 Default IKE-DISCONNECT-RESPONSE: comchannel 36 set for peer ANDROID on message free
[VPN-Status] 2024/08/12 13:16:05,314 Devicetime: 2024/08/12 13:16:04,933
CHILD_SA ('', '' ) removed from SADB
CHILD_SA ('', '' ) freed
IKE_SA ('ANDROID', 'ISAKMP-PEER-ANDROID' IPSEC_IKE SPIs 0x10C0C11933042A5B79F69B81BF438C88) freed
[VPN-Status] 2024/08/12 13:16:05,314 Devicetime: 2024/08/12 13:16:04,933
ANDROID: DISCONNECT-RESPONSE sent for handle 36
[VPN-Status] 2024/08/12 13:16:05,314 Devicetime: 2024/08/12 13:16:04,933
VPN: policy manager error indication: ANDROID (80.187.81.206), cause: 8714
[VPN-Status] 2024/08/12 13:16:05,314 Devicetime: 2024/08/12 13:16:04,933
VPN: WAN state changed to WanCalled for ANDROID (80.187.81.206 IKEv2)[BT] 02457c3c 02459a08 024662ec 02dcb718 04259210 02dd0060
[VPN-Status] 2024/08/12 13:16:05,314 Devicetime: 2024/08/12 13:16:04,933
VPN: Error: IKE-R-IKE-key-mismatch (0x220a) for ANDROID (80.187.81.206 IKEv2)
[VPN-Status] 2024/08/12 13:16:05,314 Devicetime: 2024/08/12 13:16:04,934
VPN: ANDROID (80.187.81.206) disconnected
[VPN-Status] 2024/08/12 13:16:05,314 Devicetime: 2024/08/12 13:16:04,936
vpn-maps[36], remote: ANDROID, idle, dns-name, static-name
[VPN-Status] 2024/08/12 13:16:05,319 Devicetime: 2024/08/12 13:16:04,936
VPN: installing ruleset for ANDROID (0.0.0.0 IKEv2)
[VPN-Status] 2024/08/12 13:16:05,319 Devicetime: 2024/08/12 13:16:04,936
VPN: WAN state changed to WanDisconnect for ANDROID (0.0.0.0 IKEv2)[BT] 02457c3c 0245bbe4 02dcb718 04259210 02dd0060
[VPN-Status] 2024/08/12 13:16:05,319 Devicetime: 2024/08/12 13:16:04,937
Config parser: Start
[VPN-Status] 2024/08/12 13:16:05,319 Devicetime: 2024/08/12 13:16:04,937
Config parser: Finish
Wall clock time: 0 ms
CPU time: 0 ms
[VPN-Status] 2024/08/12 13:16:05,361 Devicetime: 2024/08/12 13:16:04,937
VPN: WAN state changed to WanIdle for ANDROID (0.0.0.0 IKEv2)[BT] 02457c3c 02459a08 0140599c 02dcb718 04259210 02dd0060
[VPN-Status] 2024/08/12 13:16:05,361 Devicetime: 2024/08/12 13:16:04,937
vpn-maps[36], remote: ANDROID, idle, dns-name, static-name
[VPN-Status] 2024/08/12 13:16:05,361 Devicetime: 2024/08/12 13:16:04,938
ANDROID (ikev2): Remote gateway has changed from 80.187.81.206 to 0.0.0.0 -> tearing down
[VPN-Status] 2024/08/12 13:16:05,361 Devicetime: 2024/08/12 13:16:04,939
VPN: rulesets installed
[TraceStopped] 2024/08/12 13:16:11,291
Used config:
# Trace config
trace + VPN-Status @ -IKE1_HH -46. -2BLU -Loopback
trace + VPN-Packet @ -IKE1_HH -46. -2BLU -Loopback
# Show commands
show bootlog
show locked-jobs
[Legend] 2009/07/09 00:00:00,000
VPN-Status, VPN-Packet, TraceStarted, TraceStopped, Sysinfo, ShowCmd, IPv6-Firewall, IPv6-Router, VPN-Debug, VPN-IKE
[Index] 2009/07/09 00:00:00,000
2,227,9;5,2113,23;5,260098,4432;4,2360,64;0,1837,27;0,350,7;0,235,4;0,1782,27;0,1162,27;1,416,9;0,301,6;1,413,9;0,300,6;0,1137,19;0,463,8;0,185,3;0,240,5;
0,126,3;0,153,3;0,206,3;0,156,3;0,121,3;0,137,3;0,130,3;0,195,3;0,99,3;0,143,5;0,198,3;0,137,3;0,168,3;0,103,4;3,227,9;
Für mich als Laien sieht das alles gut aus bis der Abbruch kommt. Ich hoffe, jemand erkennt mehr!