Всем привет!
Попробовал настроить strongswam ipsec IKEv2 по «простому пути», т.е. установив пакеты (Debian) и запустив strongMan WebUI ну и от туда настроить. Ну и как бы даже работает, но вот клиенты iPhone подключиться не могут. А вот почему? Как понять что не так? Android и Windows коннектятся корректно.
Не могу по логу идентифицировать что не так...
Вот такой лог имею попытки подключения
Oct 05 17:18:49 vpn.spider.net charon[18972]: 13[NET] received packet: from 85.140.160.28[748] to XXX.XXX.XXX.XXX[500] (370 bytes)
Oct 05 17:18:49 vpn.spider.net charon[18972]: 13[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
Oct 05 17:18:49 vpn.spider.net charon[18972]: 13[IKE] 85.140.160.28 is initiating an IKE_SA
Oct 05 17:18:49 vpn.spider.net charon[18972]: 13[IKE] 85.140.160.28 is initiating an IKE_SA
Oct 05 17:18:49 vpn.spider.net charon[18972]: 13[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Oct 05 17:18:49 vpn.spider.net charon[18972]: 13[IKE] remote host is behind NAT
Oct 05 17:18:49 vpn.spider.net charon[18972]: 13[IKE] DH group ECP_256 unacceptable, requesting MODP_2048
Oct 05 17:18:49 vpn.spider.net charon[18972]: 13[ENC] generating IKE_SA_INIT response 0 [ N(INVAL_KE) ]
Oct 05 17:18:49 vpn.spider.net charon[18972]: 13[NET] sending packet: from XXX.XXX.XXX.XXX[500] to 85.140.160.28[748] (38 bytes)
Oct 05 17:18:49 vpn.spider.net charon[18972]: 15[NET] received packet: from 85.140.160.28[748] to XXX.XXX.XXX.XXX[500] (562 bytes)
Oct 05 17:18:49 vpn.spider.net charon[18972]: 15[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
Oct 05 17:18:49 vpn.spider.net charon[18972]: 15[IKE] 85.140.160.28 is initiating an IKE_SA
Oct 05 17:18:49 vpn.spider.net charon[18972]: 15[IKE] 85.140.160.28 is initiating an IKE_SA
Oct 05 17:18:49 vpn.spider.net charon[18972]: 15[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Oct 05 17:18:49 vpn.spider.net charon[18972]: 15[IKE] remote host is behind NAT
Oct 05 17:18:49 vpn.spider.net charon[18972]: 15[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Oct 05 17:18:49 vpn.spider.net charon[18972]: 15[NET] sending packet: from XXX.XXX.XXX.XXX[500] to 85.140.160.28[748] (472 bytes)
Oct 05 17:18:49 vpn.spider.net charon[18972]: 16[NET] received packet: from 85.140.160.28[41574] to XXX.XXX.XXX.XXX[4500] (384 bytes)
Oct 05 17:18:49 vpn.spider.net charon[18972]: 16[ENC] unknown attribute type INTERNAL_DNS_DOMAIN
Oct 05 17:18:49 vpn.spider.net charon[18972]: 16[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr CPRQ(ADDR MASK DHCP DNS ADDR6 DHCP6 DNS6 DOMAIN) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr N(MOBIKE_SUP) ]
Oct 05 17:18:49 vpn.spider.net charon[18972]: 16[CFG] looking for peer configs matching XXX.XXX.XXX.XXX[vpn.spider.net]...85.140.160.287[10.78.193.56]
Oct 05 17:18:49 vpn.spider.net charon[18972]: 16[CFG] selected peer config 'vpn.spider.net'
Oct 05 17:18:49 vpn.spider.net charon[18972]: 16[IKE] initiating EAP_MSCHAPV2 method (id 0x2D)
Oct 05 17:18:49 vpn.spider.net charon[18972]: 16[IKE] peer supports MOBIKE
Oct 05 17:18:49 vpn.spider.net charon[18972]: 16[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
Oct 05 17:18:49 vpn.spider.net charon[18972]: 16[IKE] authentication of 'vpn.spider.net' (myself) with ECDSA_WITH_SHA256_DER successful
Oct 05 17:18:49 vpn.spider.net charon[18972]: 16[ENC] generating IKE_AUTH response 1 [ IDr AUTH EAP/REQ/MSCHAPV2 ]
Oct 05 17:18:49 vpn.spider.net charon[18972]: 16[NET] sending packet: from XXX.XXX.XXX.XXX[4500] to 85.140.160.28[41574] (224 bytes)
Oct 05 17:18:50 vpn.spider.net charon[18972]: 15[NET] received packet: from 85.140.160.28[748] to XXX.XXX.XXX.XXX[500] (370 bytes)
Oct 05 17:18:50 vpn.spider.net charon[18972]: 15[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
Oct 05 17:18:50 vpn.spider.net charon[18972]: 15[IKE] 85.140.160.28 is initiating an IKE_SA
Oct 05 17:18:50 vpn.spider.net charon[18972]: 15[IKE] 85.140.160.28 is initiating an IKE_SA
Oct 05 17:18:50 vpn.spider.net charon[18972]: 15[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Oct 05 17:18:50 vpn.spider.net charon[18972]: 15[IKE] remote host is behind NAT
Oct 05 17:18:50 vpn.spider.net charon[18972]: 15[IKE] DH group ECP_256 unacceptable, requesting MODP_2048
Oct 05 17:18:50 vpn.spider.net charon[18972]: 15[ENC] generating IKE_SA_INIT response 0 [ N(INVAL_KE) ]
Oct 05 17:18:50 vpn.spider.net charon[18972]: 15[NET] sending packet: from XXX.XXX.XXX.XXX[500] to 85.140.160.28[748] (38 bytes)
Oct 05 17:18:50 vpn.spider.net charon[18972]: 16[NET] received packet: from 85.140.160.28[748] to XXX.XXX.XXX.XXX[500] (562 bytes)
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[IKE] remote host is behind NAT
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[NET] sending packet: from XXX.XXX.XXX.XXX[500] to 85.140.160.28[748] (472 bytes)
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 09[NET] received packet: from 85.140.160.28[41574] to XXX.XXX.XXX.XXX[4500] (384 bytes)
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 09[ENC] unknown attribute type INTERNAL_DNS_DOMAIN
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 09[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr CPRQ(ADDR MASK DHCP DNS ADDR6 DHCP6 DNS6 DOMAIN) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr N(MOBIKE_SUP) ]
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 09[CFG] looking for peer configs matching XXX.XXX.XXX.XXX[vpn.spider.net]...85.140.160.28[10.78.193.56]
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 09[CFG] selected peer config 'vpn.spider.net'
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 09[IKE] initiating EAP_MSCHAPV2 method (id 0xE1)
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 09[IKE] peer supports MOBIKE
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 09[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 09[IKE] authentication of 'vpn.spider.net' (myself) with ECDSA_WITH_SHA256_DER successful
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 09[ENC] generating IKE_AUTH response 1 [ IDr AUTH EAP/REQ/MSCHAPV2 ]
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 09[NET] sending packet: from XXX.XXX.XXX.XXX[4500] to 85.140.160.28[41574] (224 bytes)
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 13[JOB] deleting half open IKE_SA with 85.140.160.28 after timeout
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 13[NET] received packet: from 85.140.160.28[748] to XXX.XXX.XXX.XXX[500] (370 bytes)
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 13[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 13[IKE] 85.140.160.28 is initiating an IKE_SA
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 13[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 13[IKE] remote host is behind NAT
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 13[IKE] DH group ECP_256 unacceptable, requesting MODP_2048
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 13[ENC] generating IKE_SA_INIT response 0 [ N(INVAL_KE) ]
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 13[NET] sending packet: from XXX.XXX.XXX.XXX[500] to 85.140.160.28[748] (38 bytes)
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 15[NET] received packet: from 85.140.160.28[748] to XXX.XXX.XXX.XXX[500] (562 bytes)
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 15[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
Oct 05 17:18:50 vpn.spider.net charon[18972]: 16[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 15[IKE] 85.140.160.28 is initiating an IKE_SA
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 15[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 15[IKE] remote host is behind NAT
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 15[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 15[NET] sending packet: from XXX.XXX.XXX.XXX[500] to 85.140.160.28[748] (472 bytes)
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[NET] received packet: from 85.140.160.28[41574] to XXX.XXX.XXX.XXX[4500] (384 bytes)
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[ENC] unknown attribute type INTERNAL_DNS_DOMAIN
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr CPRQ(ADDR MASK DHCP DNS ADDR6 DHCP6 DNS6 DOMAIN) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr N(MOBIKE_SUP) ]
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[CFG] looking for peer configs matching XXX.XXX.XXX.XXX[vpn.spider.net]...85.140.160.28[10.78.193.56]
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[CFG] selected peer config 'vpn.spider.net'
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[IKE] initiating EAP_MSCHAPV2 method (id 0x2D)
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[IKE] peer supports MOBIKE
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[IKE] authentication of 'vpn.spider.net' (myself) with ECDSA_WITH_SHA256_DER successful
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[ENC] generating IKE_AUTH response 1 [ IDr AUTH EAP/REQ/MSCHAPV2 ]
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[NET] sending packet: from XXX.XXX.XXX.XXX[4500] to 85.140.160.28[41574] (224 bytes)
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 15[NET] received packet: from 85.140.160.28[748] to XXX.XXX.XXX.XXX[500] (370 bytes)
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 15[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 15[IKE] 85.140.160.28 is initiating an IKE_SA
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 15[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 15[IKE] remote host is behind NAT
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 15[IKE] DH group ECP_256 unacceptable, requesting MODP_2048
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 15[ENC] generating IKE_SA_INIT response 0 [ N(INVAL_KE) ]
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 15[NET] sending packet: from XXX.XXX.XXX.XXX[500] to 85.140.160.28[748] (38 bytes)
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[NET] received packet: from 85.140.160.28[748] to XXX.XXX.XXX.XXX[500] (562 bytes)
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[IKE] 85.140.160.28 is initiating an IKE_SA
Oct 05 17:18:50 vpn.spider.net charon[18972]: 16[IKE] 85.140.160.28 is initiating an IKE_SA
Oct 05 17:18:50 vpn.spider.net ipsec[18972]: 16[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Oct 05 17:18:50 vpn.spider.net charon[18972]: 16[IKE] 85.140.160.28 is initiating an IKE_SA
Oct 05 17:18:50 vpn.spider.net charon[18972]: 16[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Oct 05 17:18:50 vpn.spider.net charon[18972]: 16[IKE] remote host is behind NAT
Oct 05 17:18:50 vpn.spider.net charon[18972]: 16[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Oct 05 17:18:50 vpn.spider.net charon[18972]: 16[NET] sending packet: from XXX.XXX.XXX.XXX[500] to 85.140.160.28[748] (472 bytes)
Oct 05 17:18:51 vpn.spider.net charon[18972]: 09[NET] received packet: from 85.140.160.28[41574] to XXX.XXX.XXX.XXX[4500] (384 bytes)
Oct 05 17:18:51 vpn.spider.net charon[18972]: 09[ENC] unknown attribute type INTERNAL_DNS_DOMAIN
Oct 05 17:18:51 vpn.spider.net charon[18972]: 09[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr CPRQ(ADDR MASK DHCP DNS ADDR6 DHCP6 DNS6 DOMAIN) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr N(MOBIKE_SUP) ]
Oct 05 17:18:51 vpn.spider.net charon[18972]: 09[CFG] looking for peer configs matching XXX.XXX.XXX.XXX[vpn.spider.net]...85.140.160.28[10.78.193.56]
Oct 05 17:18:51 vpn.spider.net charon[18972]: 09[CFG] selected peer config 'vpn.spider.net'
Oct 05 17:18:51 vpn.spider.net charon[18972]: 09[IKE] initiating EAP_MSCHAPV2 method (id 0xB0)
Oct 05 17:18:51 vpn.spider.net charon[18972]: 09[IKE] peer supports MOBIKE
Oct 05 17:18:51 vpn.spider.net charon[18972]: 09[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
Oct 05 17:18:51 vpn.spider.net charon[18972]: 09[IKE] authentication of 'vpn.spider.net' (myself) with ECDSA_WITH_SHA256_DER successful
Oct 05 17:18:51 vpn.spider.net charon[18972]: 09[ENC] generating IKE_AUTH response 1 [ IDr AUTH EAP/REQ/MSCHAPV2 ]
Oct 05 17:18:51 vpn.spider.net charon[18972]: 09[NET] sending packet: from XXX.XXX.XXX.XXX[4500] to 85.140.160.28[41574] (224 bytes)
Oct 05 17:18:52 vpn.spider.net charon[18972]: 12[NET] received packet: from 85.140.160.28[748] to XXX.XXX.XXX.XXX[500] (370 bytes)
Oct 05 17:18:52 vpn.spider.net charon[18972]: 12[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
Oct 05 17:18:52 vpn.spider.net charon[18972]: 12[IKE] 85.140.160.28 is initiating an IKE_SA
Oct 05 17:18:52 vpn.spider.net charon[18972]: 12[IKE] 85.140.160.28 is initiating an IKE_SA
Oct 05 17:18:52 vpn.spider.net charon[18972]: 12[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Oct 05 17:18:52 vpn.spider.net charon[18972]: 12[IKE] remote host is behind NAT
Oct 05 17:18:52 vpn.spider.net charon[18972]: 12[IKE] DH group ECP_256 unacceptable, requesting MODP_2048
Oct 05 17:18:52 vpn.spider.net charon[18972]: 12[ENC] generating IKE_SA_INIT response 0 [ N(INVAL_KE) ]
Oct 05 17:18:52 vpn.spider.net charon[18972]: 12[NET] sending packet: from XXX.XXX.XXX.XXX[500] to 85.140.160.28[748] (38 bytes)
Oct 05 17:18:52 vpn.spider.net charon[18972]: 11[NET] received packet: from 85.140.160.28[748] to XXX.XXX.XXX.XXX[500] (562 bytes)
Oct 05 17:18:52 vpn.spider.net charon[18972]: 11[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(REDIR_SUP) N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
Oct 05 17:18:52 vpn.spider.net charon[18972]: 11[IKE] 85.140.160.28 is initiating an IKE_SA
Oct 05 17:18:52 vpn.spider.net charon[18972]: 11[IKE] 85.140.160.28 is initiating an IKE_SA
Oct 05 17:18:52 vpn.spider.net charon[18972]: 11[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
Oct 05 17:18:52 vpn.spider.net charon[18972]: 11[IKE] remote host is behind NAT
Oct 05 17:18:52 vpn.spider.net charon[18972]: 11[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
Oct 05 17:18:52 vpn.spider.net charon[18972]: 11[NET] sending packet: from XXX.XXX.XXX.XXX[500] to 85.140.160.28[748] (472 bytes)
Oct 05 17:18:53 vpn.spider.net charon[18972]: 14[NET] received packet: from 85.140.160.28[41574] to XXX.XXX.XXX.XXX[4500] (384 bytes)
Oct 05 17:18:53 vpn.spider.net charon[18972]: 14[ENC] unknown attribute type INTERNAL_DNS_DOMAIN
Oct 05 17:18:53 vpn.spider.net charon[18972]: 14[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr CPRQ(ADDR MASK DHCP DNS ADDR6 DHCP6 DNS6 DOMAIN) N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) SA TSi TSr N(MOBIKE_SUP) ]
Oct 05 17:18:53 vpn.spider.net charon[18972]: 14[CFG] looking for peer configs matching XXX.XXX.XXX.XXX[vpn.spider.net]...85.140.160.28[10.78.193.56]
Oct 05 17:18:53 vpn.spider.net charon[18972]: 14[CFG] selected peer config 'vpn.spider.net'
Oct 05 17:18:53 vpn.spider.net charon[18972]: 14[IKE] initiating EAP_MSCHAPV2 method (id 0x33)
Oct 05 17:18:53 vpn.spider.net charon[18972]: 14[IKE] peer supports MOBIKE
Oct 05 17:18:53 vpn.spider.net charon[18972]: 14[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
Oct 05 17:18:53 vpn.spider.net charon[18972]: 14[IKE] authentication of 'vpn.spider.net' (myself) with ECDSA_WITH_SHA256_DER successful
Oct 05 17:18:53 vpn.spider.net charon[18972]: 14[ENC] generating IKE_AUTH response 1 [ IDr AUTH EAP/REQ/MSCHAPV2 ]
Oct 05 17:18:53 vpn.spider.net charon[18972]: 14[NET] sending packet: from XXX.XXX.XXX.XXX[4500] to 85.140.160.28[41574] (224 bytes)
Далее интерфейс iPhone говорит что попытка не удалась и предлагает попробовать снова.
По логам же через несколько минут появится пара строк, что клиент скинут по timeout.
# swanctl -L
vpn.spider.net: IKEv2, no reauthentication, no rekeying
local: %any
remote: %any
local public key authentication:
id: vpn.spider.net
certs: CN=vpn.spider.net
remote EAP_MSCHAPV2 authentication:
vpn.spider.net: TUNNEL, rekeying every 3600s
local: 0.0.0.0/0
remote: dynamic
Конфиг конечно «из загрузки» ибо strongMan там как-то через vici его запихивал.
# swanctl --list-conns -P
list-conn event {
vpn.spider.net {
local_addrs = [
%any
]
remote_addrs = [
%any
]
version = IKEv2
reauth_time = 0
rekey_time = 14400
unique = UNIQUE_NO
local-1 {
id = vpn.spider.net
class = public key
groups = [
]
cert_policy = [
]
certs = [
CN=vpn.spider.net
]
cacerts = [
]
}
remote-1 {
eap-type = EAP_MSCHAPV2
class = EAP
groups = [
]
cert_policy = [
]
certs = [
]
cacerts = [
]
}
children {
vpn.spider.net {
mode = TUNNEL
rekey_time = 3600
rekey_bytes = 0
rekey_packets = 0
dpd_action = none
close_action = none
local-ts = [
0.0.0.0/0
]
remote-ts = [
dynamic
]
}
}
}
}