Mar/08/2018 10:50:04 ipsec,debug => my auth (first 0x100 of 0x200) Mar/08/2018 10:50:04 ipsec,debug 6f6d5075 01293f4e cb011a20 c68ad4f4 c3eff2e6 7446cc82 1b867bab bd769b35 Mar/08/2018 10:50:04 ipsec,debug f55d0d53 71671477 e7f8ff76 1c509c19 a2749b54 e3eeb75c 610ac463 0bd5ccbc Mar/08/2018 10:50:04 ipsec,debug c1ad84dc 2113545f cec55124 ae37a378 213087a7 1fa393b0 94bff9f2 221cc75a Mar/08/2018 10:50:04 ipsec,debug 161481b5 436775a4 ea1da417 c528f7a6 18ea673a 6909bc2b 1df1b43b 296f51fc Mar/08/2018 10:50:04 ipsec,debug f97b167e a656758f a0557fee a077d1ae 04629cde 987b99c9 d5fcf5ad e4013b5d Mar/08/2018 10:50:04 ipsec,debug 740fa199 dd07028b cbb2364e 3f3eb4aa bc54b43e b0a96bff 1bd1667f d6bc49ab Mar/08/2018 10:50:04 ipsec,debug a04aaa53 8e1d3c67 040cc75b e1469147 9f5b0fc3 ad70bd6d d9aaf918 16e728c0 Mar/08/2018 10:50:04 ipsec,debug e618d133 eceef144 18fe8226 cda4386b 6e4a1c03 1a278880 58d96ab9 610abf9a Mar/08/2018 10:50:04 ipsec adding payload: AUTH Mar/08/2018 10:50:04 ipsec,debug => (first 0x100 of 0x208) Mar/08/2018 10:50:04 ipsec,debug 00000208 01000000 6f6d5075 01293f4e cb011a20 c68ad4f4 c3eff2e6 7446cc82 Mar/08/2018 10:50:04 ipsec,debug 1b867bab bd769b35 f55d0d53 71671477 e7f8ff76 1c509c19 a2749b54 e3eeb75c Mar/08/2018 10:50:04 ipsec,debug 610ac463 0bd5ccbc c1ad84dc 2113545f cec55124 ae37a378 213087a7 1fa393b0 Mar/08/2018 10:50:04 ipsec,debug 94bff9f2 221cc75a 161481b5 436775a4 ea1da417 c528f7a6 18ea673a 6909bc2b Mar/08/2018 10:50:04 ipsec,debug 1df1b43b 296f51fc f97b167e a656758f a0557fee a077d1ae 04629cde 987b99c9 Mar/08/2018 10:50:04 ipsec,debug d5fcf5ad e4013b5d 740fa199 dd07028b cbb2364e 3f3eb4aa bc54b43e b0a96bff Mar/08/2018 10:50:04 ipsec,debug 1bd1667f d6bc49ab a04aaa53 8e1d3c67 040cc75b e1469147 9f5b0fc3 ad70bd6d Mar/08/2018 10:50:04 ipsec,debug d9aaf918 16e728c0 e618d133 eceef144 18fe8226 cda4386b 6e4a1c03 1a278880 Mar/08/2018 10:50:04 ipsec adding payload: EAP Mar/08/2018 10:50:04 ipsec,debug => (size 0x9) Mar/08/2018 10:50:04 ipsec,debug 00000009 01000005 01 Mar/08/2018 10:50:04 ipsec,debug ===== sending 2188 bytes from 192.168.0.3[4500] to 192.168.0.1[1024] Mar/08/2018 10:50:04 ipsec,debug 1 times of 2192 bytes message will be sent to 192.168.0.1[1024] Mar/08/2018 10:50:04 ipsec,debug KA: 192.168.0.3[4500]->192.168.0.1[1024] Mar/08/2018 10:50:04 ipsec,debug 1 times of 1 bytes message will be sent to 192.168.0.1[1024] Mar/08/2018 10:50:04 ipsec,debug ===== received 76 bytes from 192.168.0.1[1024] to 192.168.0.3[4500] Mar/08/2018 10:50:04 ipsec ike2 request, exchange: AUTH:2 192.168.0.1[1024] Mar/08/2018 10:50:04 ipsec payload seen: ENC Mar/08/2018 10:50:04 ipsec processing payload: ENC Mar/08/2018 10:50:04 ipsec,debug => iv (size 0x10) Mar/08/2018 10:50:04 ipsec,debug 40e317b5 005cb4d2 621277c4 f91f8688 Mar/08/2018 10:50:04 ipsec,debug => plain payload (trimmed) (size 0xa) Mar/08/2018 10:50:04 ipsec,debug 0000000a 02000006 0300 Mar/08/2018 10:50:04 ipsec,debug decrypted Mar/08/2018 10:50:04 ipsec payload seen: EAP Mar/08/2018 10:50:04 ipsec processing payload: EAP Mar/08/2018 10:50:04 radius,debug new request 55:4a code=Access-Request service=ipsec called-id=192.168.0.3 Mar/08/2018 10:50:04 radius,debug sending 55:4a to 192.168.0.254:1812 Mar/08/2018 10:50:04 radius,debug,packet sending Access-Request with id 24 to 192.168.0.254:1812 Mar/08/2018 10:50:04 radius,debug,packet Signature = 0x2e7e8eefb0187bd8f3517123593ed343 Mar/08/2018 10:50:04 radius,debug,packet Called-Station-Id = "192.168.0.3" Mar/08/2018 10:50:04 radius,debug,packet Calling-Station-Id = "192.168.0.1" Mar/08/2018 10:50:04 radius,debug,packet User-Name = "" Mar/08/2018 10:50:04 radius,debug,packet NAS-Port = 8 Mar/08/2018 10:50:04 radius,debug,packet NAS-Port-Id = 0x8000000b Mar/08/2018 10:50:04 radius,debug,packet NAS-Port-Type = 5 Mar/08/2018 10:50:04 radius,debug,packet Service-Type = 2 Mar/08/2018 10:50:04 radius,debug,packet Framed-MTU = 1400 Mar/08/2018 10:50:04 radius,debug,packet EAP-Message = 0x020000060300 Mar/08/2018 10:50:04 radius,debug,packet Message-Authenticator = 0x80bdbc91476090a7013dc3cbc490c03e Mar/08/2018 10:50:04 radius,debug,packet NAS-Identifier = "MikroTik" Mar/08/2018 10:50:04 radius,debug,packet NAS-IP-Address = 192.168.0.3 Mar/08/2018 10:50:05 radius,debug resending 55:4a Mar/08/2018 10:50:05 radius,debug,packet sending Access-Request with id 24 to 192.168.0.254:1812 Mar/08/2018 10:50:05 radius,debug,packet Signature = 0x2e7e8eefb0187bd8f3517123593ed343 Mar/08/2018 10:50:05 radius,debug,packet Called-Station-Id = "192.168.0.3" Mar/08/2018 10:50:05 radius,debug,packet Calling-Station-Id = "192.168.0.1" Mar/08/2018 10:50:05 radius,debug,packet User-Name = "" Mar/08/2018 10:50:05 radius,debug,packet NAS-Port = 8 Mar/08/2018 10:50:05 radius,debug,packet NAS-Port-Id = 0x8000000b Mar/08/2018 10:50:05 radius,debug,packet NAS-Port-Type = 5 Mar/08/2018 10:50:05 radius,debug,packet Service-Type = 2 Mar/08/2018 10:50:05 radius,debug,packet Framed-MTU = 1400 Mar/08/2018 10:50:05 radius,debug,packet EAP-Message = 0x020000060300 Mar/08/2018 10:50:05 radius,debug,packet Message-Authenticator = 0x80bdbc91476090a7013dc3cbc490c03e Mar/08/2018 10:50:05 radius,debug,packet NAS-Identifier = "MikroTik" Mar/08/2018 10:50:05 radius,debug,packet NAS-IP-Address = 192.168.0.3 Mar/08/2018 10:50:05 ipsec,error bad EAP size Mar/08/2018 10:50:05 radius,debug,packet received Access-Reject with id 24 from 192.168.0.254:1812 Mar/08/2018 10:50:05 radius,debug,packet Signature = 0xf72c3946f4ecec08fb414a74c1144100 Mar/08/2018 10:50:05 radius,debug received reply for 55:4a Mar/08/2018 10:50:08 ipsec,debug ===== received 76 bytes from 192.168.0.1[1024] to 192.168.0.3[4500] Mar/08/2018 10:50:08 ipsec ike2 request, exchange: AUTH:2 192.168.0.1[1024] Mar/08/2018 10:50:08 ipsec reply retransmission Mar/08/2018 10:50:08 ipsec,debug ===== sending 2188 bytes from 192.168.0.3[4500] to 192.168.0.1[1024] Mar/08/2018 10:50:08 ipsec,debug 1 times of 2192 bytes message will be sent to 192.168.0.1[1024] Mar/08/2018 10:50:15 ipsec,debug ===== received 76 bytes from 192.168.0.1[1024] to 192.168.0.3[4500] Mar/08/2018 10:50:15 ipsec ike2 request, exchange: AUTH:2 192.168.0.1[1024] Mar/08/2018 10:50:15 ipsec reply retransmission Mar/08/2018 10:50:15 ipsec,debug ===== sending 2188 bytes from 192.168.0.3[4500] to 192.168.0.1[1024] Mar/08/2018 10:50:15 ipsec,debug 1 times of 2192 bytes message will be sent to 192.168.0.1[1024]