ID
Size: a a a
ID
EV
ID
ID
EV
ID
ike=aes256gcm16-prfsha384-ecp384!
esp=aes256gcm16-ecp384!
ID
EV
ID
ID
ID
Jun 1 17:38:48 localhost charon: 09[NET] received packet: from 92.100.206.25[4500] to 173.255.238.184[4500] (440 bytes)
Jun 1 17:38:48 localhost charon: 09[ENC] parsed IKE_SA_INIT request 0 [ N(NATD_D_IP) N(NATD_S_IP) No KE SA ]
Jun 1 17:38:48 localhost charon: 09[IKE] 92.100.206.25 is initiating an IKE_SA
Jun 1 17:38:48 localhost charon: 09[CFG] received proposals: IKE:AES_CBC_128/3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048/MODP_1024
Jun 1 17:38:48 localhost charon: 09[CFG] configured proposals: IKE:AES_GCM_16_256/PRF_HMAC_SHA2_384/ECP_384
Jun 1 17:38:48 localhost charon: 09[IKE] faking NAT situation to enforce UDP encapsulation
Jun 1 17:38:48 localhost charon: 09[IKE] received proposals unacceptable
Jun 1 17:38:48 localhost charon: 09[ENC] generating IKE_SA_INIT response 0 [ N(NO_PROP) ]
Jun 1 17:38:48 localhost charon: 09[NET] sending packet: from 173.255.238.184[4500] to 92.100.206.25[4500] (36 bytes)
ID
ID
Jun 1 17:40:21 localhost charon: 06[CFG] received proposals: IKE:AES_CBC_128/3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048/MODP_1024
Jun 1 17:40:21 localhost charon: 06[CFG] configured proposals: IKE:AES_GCM_16_256/PRF_HMAC_SHA2_384/ECP_384
😎
T
ID
IKE:AES_GCM_16_256/PRF_HMAC_SHA2_384/ECP_384
ID