This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

VPN zwischen Fritzbox7490 und SG105W die hinter einer Fritzbox7490 steht

Hi @ALL,

 

hoffentlich kann mir jemand auf die Sprünge helfen - ich bin echt am Verzweifeln...

Folgendes Szenario:

 

Firmen-Netz oder auch SG-Netz:

192.168.1.0/24 wobei die SG die 192.168.1.1/24 hat.

 

Wan-Net - also das Netz vor der SG (Interneteinwahl)

192.168.8.0/24 wobei die SG die 192.168.8.3/24 hat.

GW ist hier die Fritzbox mit der 192.168.8.1/24 - zum Internet eine feste IP mit FQDN

Auf der Fritzbox ist ein Exposed-Host auf die SG

 

Büro-Netz ist das

192.168.113.0/24 hinter einer Fritzbox (192.168.113.5/24) mit DynDNS

 

Erstellte Policy auf der SG:

IKE - Alg. 3DES SHA1

IKE - Lebensd. 3600

IKE-HD-Gruppe 2 MODP1024

IPSEC - Alg. 3DES SH1

IPSEC - Lebensd. 3600

IPSEC PFS Gruppe 2 MODP1024

 

Gateway auf der SG:

Gateway Verbindungstyp: Verbindung initiierten

Gateway: DynDNS der Büro-Fritzbox

Verteilter Schlüssel

VPN-ID-Typ: Hostname

VPN-ID: FQDN der Büro-Fritzbox

Entfernte Netzwerke: 192.168.113.0/24

 

Verbindung auf der SG:

Gateway: das eben erstellte

Lokale Schnittstelle: Wan-Interface

Richtlinie: die oben erstellte

Internes Netz: Internes Netz

Automatische Firewall

Striktes Routing

 

 

die VPN-CFG auf der Büro-Fritzbox

vpncfg {
connections {
enabled = yes;
conn_type = conntype_lan;
name = "Sophos UTM";
always_renew = yes;
keepalive_ip = 192.168.1.1;
reject_not_encrypted = no;
dont_filter_netbios = yes;
localip = 0.0.0.0;
local_virtualip = 0.0.0.0;
remoteip = 0.0.0.0;
remote_virtualip = 0.0.0.0;
remotehostname = "remote.SG105W.com";
localid {
fqdn = "buerofritz.myfritz.net";
}
remoteid {
fqdn = "remote.SG105W.com";
}
mode = phase1_mode_idp;
phase1ss = "all/all/all";
keytype = connkeytype_pre_shared;
key = "qwertzuiopAsd";
cert_do_server_auth = no;
use_nat_t = no;
use_xauth = no;
use_cfgmode = no;
phase2localid {
ipnet {
ipaddr = 192.168.113.0;
mask = 255.255.255.0;
}
}
phase2remoteid {
ipnet {
ipaddr = 192.168.1.0;
mask = 255.255.255.0;
}
}
phase2ss = "esp-3des-sha/ah-no/comp-no/pfs";
accesslist = "permit ip any 192.168.1.0 255.255.255.0";
}
ike_forward_rules = "udp 0.0.0.0:500 0.0.0.0:500",
"udp 0.0.0.0:4500 0.0.0.0:4500";
}
 

Ich bekomme einfach keine Verbindung. Hat jemand eine Idee? 

Die verschiedensten Varianten habe ich durch probiert (was hier in der Community so steht), aber nichts funktioniert.

Site-to-Site-VPN-Tunnelstatus:

SA: 192.168.1.0/24=192.168.8.3   93.235.YYY.XXX=192.168.113.0/24
VPN ID: 192.168.8.3
Error: No connection


This thread was automatically locked due to age.
Parents
  • Hallo Michael,

    Herzlich willkommen hier in der Community !

    (Sorry, my German-speaking brain isn't creating thoughts at the moment. [:(])

    Setting up an IPsec VPN when one side is behind a NAT is tricky.  Please show pictures of the Edits of the IPsec Connection and the Remote Gateway.

    Also, let's look at the log:

    1. Confirm on the Debug tab of IPsec that Debug is not enabled.
    2. Disable the IPsec Connection.
    3. Start the IPsec Live Log and wait for it to begin to populate.
    4. Enable the IPsec Connection.
    5. Copy here about 60 lines from enabling through the error.  If you prefer, obfuscate IPs like 84.XX.YY.121, 10.X.Y.100, 192.168.X.200 and 172.2X.Y.51.  That lets us see immediately which IPs are local and which are identical or just in the same subnet.

    MfG - Bob (Bitte auf Deutsch weiterhin.)

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Hallo Bob,

     

    Danke für die Antwort.

    Anbei die Bilder

    und das Log:

    2020:07:01-12:54:29 sg105w ipsec_starter[15312]: Starting strongSwan 4.4.1git20100610 IPsec [starter]...
    2020:07:01-12:54:29 sg105w pluto[15325]: Starting IKEv1 pluto daemon (strongSwan 4.4.1git20100610) THREADS VENDORID CISCO_QUIRKS
    2020:07:01-12:54:29 sg105w ipsec_starter[15318]: pluto (15325) started after 20 ms
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'curl': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'ldap': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'aes': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'des': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'blowfish': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'serpent': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'twofish': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'sha1': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'sha2': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'md5': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'random': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'x509': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'pubkey': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'pkcs1': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'pgp': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'dnskey': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'pem': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'sqlite': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'hmac': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'gmp': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'xauth': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'attr': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'attr-sql': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: | plugin 'resolve': loaded successfully
    2020:07:01-12:54:29 sg105w pluto[15325]: loaded plugins: curl ldap aes des blowfish serpent twofish sha1 sha2 md5 random x509 pubkey pkcs1 pgp dnskey pem sqlite hmac gmp xauth attr attr-sql resolve
    2020:07:01-12:54:29 sg105w pluto[15325]: | inserting event EVENT_REINIT_SECRET, timeout in 3600 seconds
    2020:07:01-12:54:29 sg105w pluto[15325]: including NAT-Traversal patch (Version 0.6c)
    2020:07:01-12:54:29 sg105w pluto[15325]: | process 15325 listening for PF_KEY_V2 on file descriptor 7
    2020:07:01-12:54:29 sg105w pluto[15325]: Using Linux 2.6 IPsec interface code
    2020:07:01-12:54:29 sg105w pluto[15325]: | finish_pfkey_msg: SADB_REGISTER message 1 for AH
    2020:07:01-12:54:29 sg105w pluto[15325]: | 02 07 00 02 02 00 00 00 01 00 00 00 dd 3b 00 00
    2020:07:01-12:54:30 sg105w pluto[15325]: | pfkey_get: SADB_REGISTER message 1
    2020:07:01-12:54:30 sg105w pluto[15325]: | AH registered with kernel.
    2020:07:01-12:54:30 sg105w pluto[15325]: | finish_pfkey_msg: SADB_REGISTER message 2 for ESP
    2020:07:01-12:54:30 sg105w pluto[15325]: | 02 07 00 03 02 00 00 00 02 00 00 00 dd 3b 00 00
    2020:07:01-12:54:30 sg105w pluto[15325]: | pfkey_get: SADB_REGISTER message 2
    2020:07:01-12:54:30 sg105w pluto[15325]: | alg_init(): memset(0x80e0a60, 0, 2016) memset(0x80e1240, 0, 2032)
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=19 sadb_supported_len=56
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=14, alg_id=251
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[0], exttype=14, satype=3, alg_id=251, alg_ivlen=0, alg_minbits=0, alg_maxbits=0, res=0
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=14, alg_id=2
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[1], exttype=14, satype=3, alg_id=2, alg_ivlen=0, alg_minbits=128, alg_maxbits=128, res=0
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=14, alg_id=3
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[2], exttype=14, satype=3, alg_id=3, alg_ivlen=0, alg_minbits=160, alg_maxbits=160, res=0
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=14, alg_id=5
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[3], exttype=14, satype=3, alg_id=5, alg_ivlen=0, alg_minbits=256, alg_maxbits=256, res=0
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=14, alg_id=6
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[4], exttype=14, satype=3, alg_id=6, alg_ivlen=0, alg_minbits=384, alg_maxbits=384, res=0
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=14, alg_id=7
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[5], exttype=14, satype=3, alg_id=7, alg_ivlen=0, alg_minbits=512, alg_maxbits=512, res=0
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=19 sadb_supported_len=80
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=15, alg_id=11
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[6], exttype=15, satype=3, alg_id=11, alg_ivlen=0, alg_minbits=0, alg_maxbits=0, res=0
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=15, alg_id=2
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[7], exttype=15, satype=3, alg_id=2, alg_ivlen=8, alg_minbits=64, alg_maxbits=64, res=0
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=15, alg_id=3
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[8], exttype=15, satype=3, alg_id=3, alg_ivlen=8, alg_minbits=192, alg_maxbits=192, res=0
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=15, alg_id=6
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[9], exttype=15, satype=3, alg_id=6, alg_ivlen=8, alg_minbits=40, alg_maxbits=128, res=0
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=15, alg_id=7
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[10], exttype=15, satype=3, alg_id=7, alg_ivlen=8, alg_minbits=40, alg_maxbits=448, res=0
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=15, alg_id=12
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[11], exttype=15, satype=3, alg_id=12, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=15, alg_id=14
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=15, alg_id=15
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=15, alg_id=16
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=15, alg_id=18
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=15, alg_id=19
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=15, alg_id=20
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=15, alg_id=23
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=15, alg_id=252
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[12], exttype=15, satype=3, alg_id=252, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=15, alg_id=253
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[13], exttype=15, satype=3, alg_id=253, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_add(): satype=3, exttype=15, alg_id=13
    2020:07:01-12:54:30 sg105w pluto[15325]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[14], exttype=15, satype=3, alg_id=13, alg_ivlen=8, alg_minbits=160, alg_maxbits=288, res=0
    2020:07:01-12:54:30 sg105w pluto[15325]: | ESP registered with kernel.
    2020:07:01-12:54:30 sg105w pluto[15325]: | finish_pfkey_msg: SADB_REGISTER message 3 for IPCOMP
    2020:07:01-12:54:30 sg105w pluto[15325]: | 02 07 00 09 02 00 00 00 03 00 00 00 dd 3b 00 00
    2020:07:01-12:54:30 sg105w pluto[15325]: | pfkey_get: SADB_REGISTER message 3
    2020:07:01-12:54:30 sg105w pluto[15325]: | IPCOMP registered with kernel.
    2020:07:01-12:54:30 sg105w pluto[15325]: loading ca certificates from '/etc/ipsec.d/cacerts'
    2020:07:01-12:54:30 sg105w pluto[15325]: | file content is not binary ASN.1
    2020:07:01-12:54:30 sg105w pluto[15325]: | -----BEGIN CERTIFICATE-----
    2020:07:01-12:54:30 sg105w pluto[15325]: | -----END CERTIFICATE-----
    2020:07:01-12:54:30 sg105w pluto[15325]: | L0 - x509:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L1 - tbsCertificate:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L2 - DEFAULT v1:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L3 - version:
    2020:07:01-12:54:30 sg105w pluto[15325]: | X.509v3
    2020:07:01-12:54:30 sg105w pluto[15325]: | L2 - serialNumber:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L2 - signature:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L3 - algorithmIdentifier:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L4 - algorithm:
    2020:07:01-12:54:30 sg105w pluto[15325]: | 'sha256WithRSAEncryption'
    2020:07:01-12:54:30 sg105w pluto[15325]: | L2 - issuer:
    2020:07:01-12:54:30 sg105w pluto[15325]: | 'C=de, L=MeXXXX, O=mSCHNEIDER XXXX, CN=mSCHNEIDER XXXX VPN CA, E=mschneider@XXXXX.XX'
    2020:07:01-12:54:30 sg105w pluto[15325]: | L2 - validity:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L3 - notBefore:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L4 - utcTime:
    2020:07:01-12:54:30 sg105w pluto[15325]: | 'Jun 24 08:25:45 UTC 2020'
    2020:07:01-12:54:30 sg105w pluto[15325]: | L3 - notAfter:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L4 - utcTime:
    2020:07:01-12:54:30 sg105w pluto[15325]: | 'Jan 01 00:00:00 UTC 2038'
    2020:07:01-12:54:30 sg105w pluto[15325]: | L2 - subject:
    2020:07:01-12:54:30 sg105w pluto[15325]: | 'C=de, L=MeXXXX, O=mSCHNEIDER XXXX, CN=mSCHNEIDER XXXX VPN CA, E=mschneider@XXXXX.XX'
    2020:07:01-12:54:30 sg105w pluto[15325]: | L2 - subjectPublicKeyInfo:
    2020:07:01-12:54:30 sg105w pluto[15325]: | -- > --
    2020:07:01-12:54:30 sg105w pluto[15325]: | L0 - subjectPublicKeyInfo:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L1 - algorithm:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L2 - algorithmIdentifier:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L3 - algorithm:
    2020:07:01-12:54:30 sg105w pluto[15325]: | 'rsaEncryption'
    2020:07:01-12:54:30 sg105w pluto[15325]: | L1 - subjectPublicKey:
    2020:07:01-12:54:30 sg105w pluto[15325]: | -- > --
    2020:07:01-12:54:30 sg105w pluto[15325]: | L0 - RSAPublicKey:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L1 - modulus:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L1 - publicExponent:
    2020:07:01-12:54:30 sg105w pluto[15325]: | -- < --
    2020:07:01-12:54:30 sg105w pluto[15325]: | -- < --
    2020:07:01-12:54:30 sg105w pluto[15325]: | L2 - optional extensions:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L3 - extensions:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L4 - extension:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L5 - extnID:
    2020:07:01-12:54:30 sg105w pluto[15325]: | 'subjectKeyIdentifier'
    2020:07:01-12:54:30 sg105w pluto[15325]: | L5 - critical:
    2020:07:01-12:54:30 sg105w pluto[15325]: | FALSE
    2020:07:01-12:54:30 sg105w pluto[15325]: | L5 - extnValue:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L6 - keyIdentifier:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L4 - extension:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L5 - extnID:
    2020:07:01-12:54:30 sg105w pluto[15325]: | 'basicConstraints'
    2020:07:01-12:54:30 sg105w pluto[15325]: | L5 - critical:
    2020:07:01-12:54:30 sg105w pluto[15325]: | FALSE
    2020:07:01-12:54:30 sg105w pluto[15325]: | L5 - extnValue:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L6 - basicConstraints:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L7 - CA:
    2020:07:01-12:54:30 sg105w pluto[15325]: | TRUE
    2020:07:01-12:54:30 sg105w pluto[15325]: | L4 - extension:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L5 - extnID:
    2020:07:01-12:54:30 sg105w pluto[15325]: | 'subjectAltName'
    2020:07:01-12:54:30 sg105w pluto[15325]: | L5 - critical:
    2020:07:01-12:54:30 sg105w pluto[15325]: | FALSE
    2020:07:01-12:54:30 sg105w pluto[15325]: | L5 - extnValue:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L6 - generalNames:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L7 - generalName:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L8 - ipAddress:
    2020:07:01-12:54:30 sg105w pluto[15325]: | '127.0.0.1'
    2020:07:01-12:54:30 sg105w pluto[15325]: | L1 - signatureAlgorithm:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L2 - algorithmIdentifier:
    2020:07:01-12:54:30 sg105w pluto[15325]: | L3 - algorithm:
    2020:07:01-12:54:30 sg105w pluto[15325]: | 'sha256WithRSAEncryption'
    2020:07:01-12:54:30 sg105w pluto[15325]: | L1 - signatureValue:
    2020:07:01-12:54:30 sg105w pluto[15325]: loaded ca certificate from '/etc/ipsec.d/cacerts/VPN Signing CA.pem'
    2020:07:01-12:54:30 sg105w pluto[15325]: | authcert list locked by 'add_authcert'
    2020:07:01-12:54:30 sg105w pluto[15325]: | authcert inserted
    2020:07:01-12:54:30 sg105w pluto[15325]: | authcert list unlocked by 'add_authcert'
    2020:07:01-12:54:30 sg105w pluto[15325]: loading aa certificates from '/etc/ipsec.d/aacerts'
    2020:07:01-12:54:30 sg105w pluto[15325]: loading ocsp certificates from '/etc/ipsec.d/ocspcerts'
    2020:07:01-12:54:30 sg105w pluto[15325]: Changing to directory '/etc/ipsec.d/crls'
    2020:07:01-12:54:30 sg105w pluto[15325]: loading attribute certificates from '/etc/ipsec.d/acerts'
    2020:07:01-12:54:30 sg105w pluto[15325]: | inserting event EVENT_LOG_DAILY, timeout in 39930 seconds
    2020:07:01-12:54:30 sg105w pluto[15325]: | next event EVENT_REINIT_SECRET in 3599 seconds
    2020:07:01-12:54:30 sg105w pluto[15325]: |
    2020:07:01-12:54:30 sg105w pluto[15325]: | *received whack message
    2020:07:01-12:54:30 sg105w pluto[15325]: | next event EVENT_REINIT_SECRET in 3599 seconds
    2020:07:01-12:54:30 sg105w pluto[15325]: |
    2020:07:01-12:54:30 sg105w pluto[15325]: | *received whack message
    2020:07:01-12:54:30 sg105w pluto[15325]: | found lo with address 127.0.0.1
    2020:07:01-12:54:30 sg105w pluto[15325]: | found eth0 with address 192.168.1.1
    2020:07:01-12:54:30 sg105w pluto[15325]: | found eth1 with address 192.168.8.3
    2020:07:01-12:54:30 sg105w pluto[15325]: | found wlan1 with address 192.168.29.1
    2020:07:01-12:54:30 sg105w pluto[15325]: | found wlan0 with address 192.168.28.1
    2020:07:01-12:54:30 sg105w pluto[15325]: | found tun0 with address 10.242.2.1
    2020:07:01-12:54:30 sg105w pluto[15325]: adding interface tun0/tun0 10.242.2.1:500
    2020:07:01-12:54:30 sg105w pluto[15325]: adding interface tun0/tun0 10.242.2.1:4500
    2020:07:01-12:54:30 sg105w pluto[15325]: adding interface wlan0/wlan0 192.168.28.1:500
    2020:07:01-12:54:30 sg105w pluto[15325]: adding interface wlan0/wlan0 192.168.28.1:4500
    2020:07:01-12:54:30 sg105w pluto[15325]: adding interface wlan1/wlan1 192.168.29.1:500
    2020:07:01-12:54:30 sg105w pluto[15325]: adding interface wlan1/wlan1 192.168.29.1:4500
    2020:07:01-12:54:30 sg105w pluto[15325]: adding interface eth1/eth1 192.168.8.3:500
    2020:07:01-12:54:30 sg105w pluto[15325]: adding interface eth1/eth1 192.168.8.3:4500
    2020:07:01-12:54:30 sg105w pluto[15325]: adding interface eth0/eth0 192.168.1.1:500
    2020:07:01-12:54:30 sg105w pluto[15325]: adding interface eth0/eth0 192.168.1.1:4500
    2020:07:01-12:54:30 sg105w pluto[15325]: adding interface lo/lo 127.0.0.1:500
    2020:07:01-12:54:30 sg105w pluto[15325]: adding interface lo/lo 127.0.0.1:4500
    2020:07:01-12:54:30 sg105w pluto[15325]: | found lo with address 0000:0000:0000:0000:0000:0000:0000:0001
    2020:07:01-12:54:30 sg105w pluto[15325]: adding interface lo/lo ::1:500
    2020:07:01-12:54:30 sg105w pluto[15325]: | certs and keys locked by 'free_preshared_secrets'
    2020:07:01-12:54:30 sg105w pluto[15325]: | certs and keys unlocked by 'free_preshard_secrets'
    2020:07:01-12:54:30 sg105w pluto[15325]: loading secrets from "/etc/ipsec.secrets"
    2020:07:01-12:54:30 sg105w pluto[15325]: loaded PSK secret for 192.168.8.3 x7ckvXXXXXX.myfritz.net
    2020:07:01-12:54:30 sg105w pluto[15325]: | certs and keys locked by 'process_secret'
    2020:07:01-12:54:30 sg105w pluto[15325]: | certs and keys unlocked by 'process_secrets'
    2020:07:01-12:54:30 sg105w pluto[15325]: listening for IKE messages
    2020:07:01-12:54:30 sg105w pluto[15325]: | next event EVENT_REINIT_SECRET in 3599 seconds
    2020:07:01-12:54:30 sg105w pluto[15325]: |
    2020:07:01-12:54:30 sg105w pluto[15325]: | *received whack message
    2020:07:01-12:54:30 sg105w pluto[15325]: | from whack: got --esp=3des-sha1!;modp1024
    2020:07:01-12:54:30 sg105w pluto[15325]: | esp proposal: 3DES_CBC/HMAC_SHA1, ; pfsgroup=MODP_1024; strict
    2020:07:01-12:54:30 sg105w pluto[15325]: | from whack: got --ike=3des-sha1-modp1024!
    2020:07:01-12:54:30 sg105w pluto[15325]: | ike proposal: 3DES_CBC/HMAC_SHA1/MODP_1024, strict
    2020:07:01-12:54:30 sg105w pluto[15325]: added connection description "S_Fritz!Box_Michi_IN"
    2020:07:01-12:54:30 sg105w pluto[15325]: | 192.168.1.0/24===192.168.8.3[192.168.8.3]...79.XXX.YYY.97[x7ckv5XXXXXX.myfritz.net]===192.168.113.0/24
    2020:07:01-12:54:30 sg105w pluto[15325]: | ike_life: 3600s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; policy: PSK+ENCRYPT+TUNNEL+PFS
    2020:07:01-12:54:30 sg105w pluto[15325]: | next event EVENT_REINIT_SECRET in 3599 seconds
    2020:07:01-12:54:30 sg105w pluto[15325]: |
    2020:07:01-12:54:30 sg105w pluto[15325]: | *received whack message
    2020:07:01-12:54:30 sg105w pluto[15325]: | creating state object #1 at 0x93780a0
    2020:07:01-12:54:30 sg105w pluto[15325]: | ICOOKIE: d1 49 35 d2 fb d0 3d 72
    2020:07:01-12:54:30 sg105w pluto[15325]: | RCOOKIE: 00 00 00 00 00 00 00 00
    2020:07:01-12:54:30 sg105w pluto[15325]: | peer: 4f fa 96 61
    2020:07:01-12:54:30 sg105w pluto[15325]: | state hash entry 27
    2020:07:01-12:54:30 sg105w pluto[15325]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #1
    2020:07:01-12:54:30 sg105w pluto[15325]: | Queuing pending Quick Mode with 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN"
    2020:07:01-12:54:30 sg105w pluto[15325]: "S_Fritz!Box_Michi_IN" #1: initiating Main Mode
    2020:07:01-12:54:30 sg105w pluto[15325]: | **emit ISAKMP Message:
    2020:07:01-12:54:30 sg105w pluto[15325]: | initiator cookie:
    2020:07:01-12:54:30 sg105w pluto[15325]: | d1 49 35 d2 fb d0 3d 72
    2020:07:01-12:54:30 sg105w pluto[15325]: | responder cookie:
    2020:07:01-12:54:30 sg105w pluto[15325]: | 00 00 00 00 00 00 00 00
    2020:07:01-12:54:30 sg105w pluto[15325]: | next payload type: ISAKMP_NEXT_SA
    2020:07:01-12:54:30 sg105w pluto[15325]: | ISAKMP version: ISAKMP Version 1.0
    2020:07:01-12:54:30 sg105w pluto[15325]: | exchange type: ISAKMP_XCHG_IDPROT
    2020:07:01-12:54:30 sg105w pluto[15325]: | flags: none
    2020:07:01-12:54:30 sg105w pluto[15325]: | message ID: 00 00 00 00
    2020:07:01-12:54:30 sg105w pluto[15325]: | ***emit ISAKMP Security Association Payload:
    2020:07:01-12:54:30 sg105w pluto[15325]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-12:54:30 sg105w pluto[15325]: | DOI: ISAKMP_DOI_IPSEC
    2020:07:01-12:54:30 sg105w pluto[15325]: | ****emit IPsec DOI SIT:
    2020:07:01-12:54:30 sg105w pluto[15325]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
    2020:07:01-12:54:30 sg105w pluto[15325]: | ike proposal: 3DES_CBC/HMAC_SHA1/MODP_1024, strict
    2020:07:01-12:54:30 sg105w pluto[15325]: | ****emit ISAKMP Proposal Payload:
    2020:07:01-12:54:30 sg105w pluto[15325]: | next payload type: ISAKMP_NEXT_NONE
    2020:07:01-12:54:30 sg105w pluto[15325]: | proposal number: 0
    2020:07:01-12:54:30 sg105w pluto[15325]: | protocol ID: PROTO_ISAKMP
    2020:07:01-12:54:30 sg105w pluto[15325]: | SPI size: 0
    2020:07:01-12:54:30 sg105w pluto[15325]: | number of transforms: 1
    2020:07:01-12:54:30 sg105w pluto[15325]: | *****emit ISAKMP Transform Payload (ISAKMP):
    2020:07:01-12:54:30 sg105w pluto[15325]: | next payload type: ISAKMP_NEXT_NONE
    2020:07:01-12:54:30 sg105w pluto[15325]: | transform number: 0
    2020:07:01-12:54:30 sg105w pluto[15325]: | transform ID: KEY_IKE
    2020:07:01-12:54:30 sg105w pluto[15325]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-12:54:30 sg105w pluto[15325]: | af+type: OAKLEY_LIFE_TYPE
    2020:07:01-12:54:30 sg105w pluto[15325]: | length/value: 1
    2020:07:01-12:54:30 sg105w pluto[15325]: | [1 is OAKLEY_LIFE_SECONDS]
    2020:07:01-12:54:30 sg105w pluto[15325]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-12:54:30 sg105w pluto[15325]: | af+type: OAKLEY_LIFE_DURATION
    2020:07:01-12:54:30 sg105w pluto[15325]: | length/value: 3600
    2020:07:01-12:54:30 sg105w pluto[15325]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-12:54:30 sg105w pluto[15325]: | af+type: OAKLEY_ENCRYPTION_ALGORITHM
    2020:07:01-12:54:30 sg105w pluto[15325]: | length/value: 5
    2020:07:01-12:54:30 sg105w pluto[15325]: | [5 is 3DES_CBC]
    2020:07:01-12:54:30 sg105w pluto[15325]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-12:54:30 sg105w pluto[15325]: | af+type: OAKLEY_HASH_ALGORITHM
    2020:07:01-12:54:30 sg105w pluto[15325]: | length/value: 2
    2020:07:01-12:54:30 sg105w pluto[15325]: | [2 is HMAC_SHA1]
    2020:07:01-12:54:30 sg105w pluto[15325]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-12:54:30 sg105w pluto[15325]: | af+type: OAKLEY_AUTHENTICATION_METHOD
    2020:07:01-12:54:30 sg105w pluto[15325]: | length/value: 1
    2020:07:01-12:54:30 sg105w pluto[15325]: | [1 is pre-shared key]
    2020:07:01-12:54:30 sg105w pluto[15325]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-12:54:30 sg105w pluto[15325]: | af+type: OAKLEY_GROUP_DESCRIPTION
    2020:07:01-12:54:30 sg105w pluto[15325]: | length/value: 2
    2020:07:01-12:54:30 sg105w pluto[15325]: | [2 is MODP_1024]
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting length of ISAKMP Proposal Payload: 40
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting length of ISAKMP Security Association Payload: 52
    2020:07:01-12:54:30 sg105w pluto[15325]: | out_vendorid(): sending [strongSwan]
    2020:07:01-12:54:30 sg105w pluto[15325]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-12:54:30 sg105w pluto[15325]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-12:54:30 sg105w pluto[15325]: | V_ID 88 2f e5 6d 6f d2 0d bc 22 51 61 3b 2e be 5b eb
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-12:54:30 sg105w pluto[15325]: | out_vendorid(): sending [Cisco-Unity]
    2020:07:01-12:54:30 sg105w pluto[15325]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-12:54:30 sg105w pluto[15325]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-12:54:30 sg105w pluto[15325]: | V_ID 12 f5 f2 8c 45 71 68 a9 70 2d 9f e2 74 cc 01 00
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-12:54:30 sg105w pluto[15325]: | out_vendorid(): sending [XAUTH]
    2020:07:01-12:54:30 sg105w pluto[15325]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-12:54:30 sg105w pluto[15325]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting 8 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-12:54:30 sg105w pluto[15325]: | V_ID 09 00 26 89 df d6 b7 12
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting length of ISAKMP Vendor ID Payload: 12
    2020:07:01-12:54:30 sg105w pluto[15325]: | out_vendorid(): sending [Dead Peer Detection]
    2020:07:01-12:54:30 sg105w pluto[15325]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-12:54:30 sg105w pluto[15325]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-12:54:30 sg105w pluto[15325]: | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-12:54:30 sg105w pluto[15325]: | out_vendorid(): sending [RFC 3947]
    2020:07:01-12:54:30 sg105w pluto[15325]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-12:54:30 sg105w pluto[15325]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-12:54:30 sg105w pluto[15325]: | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-12:54:30 sg105w pluto[15325]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:01-12:54:30 sg105w pluto[15325]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-12:54:30 sg105w pluto[15325]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-12:54:30 sg105w pluto[15325]: | V_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-12:54:30 sg105w pluto[15325]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-02]
    2020:07:01-12:54:30 sg105w pluto[15325]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-12:54:30 sg105w pluto[15325]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-12:54:30 sg105w pluto[15325]: | V_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-12:54:30 sg105w pluto[15325]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:01-12:54:30 sg105w pluto[15325]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-12:54:30 sg105w pluto[15325]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-12:54:30 sg105w pluto[15325]: | V_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-12:54:30 sg105w pluto[15325]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-00]
    2020:07:01-12:54:30 sg105w pluto[15325]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-12:54:30 sg105w pluto[15325]: | next payload type: ISAKMP_NEXT_NONE
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-12:54:30 sg105w pluto[15325]: | V_ID 44 85 15 2d 18 b6 bb cd 0b e8 a8 46 95 79 dd cc
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-12:54:30 sg105w pluto[15325]: | emitting length of ISAKMP Message: 252
    2020:07:01-12:54:30 sg105w pluto[15325]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #1
    2020:07:01-12:54:30 sg105w pluto[15325]: | next event EVENT_RETRANSMIT in 10 seconds for #1
    2020:07:01-12:54:40 sg105w pluto[15325]: |
    2020:07:01-12:54:40 sg105w pluto[15325]: | *time to handle event
    2020:07:01-12:54:40 sg105w pluto[15325]: | event after this is EVENT_REINIT_SECRET in 3589 seconds
    2020:07:01-12:54:40 sg105w pluto[15325]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-12:54:40 sg105w pluto[15325]: | inserting event EVENT_RETRANSMIT, timeout in 20 seconds for #1
    2020:07:01-12:54:40 sg105w pluto[15325]: | next event EVENT_RETRANSMIT in 20 seconds for #1
    2020:07:01-12:55:00 sg105w pluto[15325]: |
    2020:07:01-12:55:00 sg105w pluto[15325]: | *time to handle event
    2020:07:01-12:55:00 sg105w pluto[15325]: | event after this is EVENT_REINIT_SECRET in 3569 seconds
    2020:07:01-12:55:00 sg105w pluto[15325]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-12:55:00 sg105w pluto[15325]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-12:55:00 sg105w pluto[15325]: | next event EVENT_RETRANSMIT in 40 seconds for #1
     
    Vielen Dank für Ihre Hilfe
     
    Mit freundlichen Grüßen Michael
  • Hallo,

    ich finde erst mal keinen Hinweis darauf, dass die Verbindung abgelehnt wird ... Bitte mal einen Screenshot nach dem Klick auf "Site-to-site VPN".

    Ein bisschen komisch ist die Einstellung auf der FB "use_nat_t = no;" da ja die Verbindung über NAT-Grenzen aufgebaut wird.

    u.U. wird das dann aber bei der Aushandlung einfach aktiviert.

    Auf der SG ist NAT-T aktiviert?

    Gibt es im Log noch Meldungen mit einem "Verbindung abgelehnt", "Reonnect", "Timeout" o.Ä.? Dann mal bitte noch ein paar mehr logzeilen.


    Dirk

    Systema Gesellschaft für angewandte Datentechnik mbH  // Sophos Platinum Partner
    Sophos Solution Partner since 2003
    If a post solves your question, click the 'Verify Answer' link at this post.

  • Hallo Dirk,

    wo stelle ich NAT-T denn ein? Sorry, aber ich habe keine Ahnung...

    Live-Protokoll: IPsec-VPN
    Filter:
    Autoscroll
    Reload
    2020:07:01-13:41:41 sg105w pluto[15325]: | next event EVENT_RETRANSMIT in 10 seconds for #4
    2020:07:01-13:41:42 sg105w pluto[15325]: |
    2020:07:01-13:41:42 sg105w pluto[15325]: | *received whack message
    2020:07:01-13:41:42 sg105w pluto[15325]: | next event EVENT_RETRANSMIT in 9 seconds for #4
    2020:07:01-13:41:51 sg105w pluto[15325]: |
    2020:07:01-13:41:51 sg105w pluto[15325]: | *time to handle event
    2020:07:01-13:41:51 sg105w pluto[15325]: | event after this is EVENT_REINIT_SECRET in 758 seconds
    2020:07:01-13:41:51 sg105w pluto[15325]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #4
    2020:07:01-13:41:51 sg105w pluto[15325]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #4
    2020:07:01-13:41:51 sg105w pluto[15325]: | next event EVENT_RETRANSMIT in 40 seconds for #4
    2020:07:01-13:42:03 sg105w pluto[15325]: |
    2020:07:01-13:42:03 sg105w pluto[15325]: | *received whack message
    2020:07:01-13:42:03 sg105w pluto[15325]: | next event EVENT_RETRANSMIT in 28 seconds for #4
    2020:07:01-13:42:03 sg105w pluto[15325]: |
    2020:07:01-13:42:03 sg105w pluto[15325]: | *received whack message
    2020:07:01-13:42:03 sg105w pluto[15325]: shutting down
    2020:07:01-13:42:03 sg105w pluto[15325]: | certs and keys locked by 'free_preshared_secrets'
    2020:07:01-13:42:03 sg105w pluto[15325]: forgetting secrets
    2020:07:01-13:42:03 sg105w pluto[15325]: | certs and keys unlocked by 'free_preshard_secrets'
    2020:07:01-13:42:03 sg105w pluto[15325]: "S_Fritz!Box_Michi_IN": deleting connection
    2020:07:01-13:42:03 sg105w pluto[15325]: "S_Fritz!Box_Michi_IN" #4: deleting state (STATE_MAIN_I1)
    2020:07:01-13:42:03 sg105w pluto[15325]: | ICOOKIE: 40 6a 3f 1a 95 2a 94 a5
    2020:07:01-13:42:03 sg105w pluto[15325]: | RCOOKIE: 00 00 00 00 00 00 00 00
    2020:07:01-13:42:03 sg105w pluto[15325]: | peer: 4f fa 96 61
    2020:07:01-13:42:03 sg105w pluto[15325]: | state hash entry 23
    2020:07:01-13:42:03 sg105w pluto[15325]: | certs and keys locked by 'delete_connection'
    2020:07:01-13:42:03 sg105w pluto[15325]: | certs and keys unlocked by 'delete_connection'
    2020:07:01-13:42:03 sg105w pluto[15325]: | crl fetch request list locked by 'free_crl_fetch'
    2020:07:01-13:42:03 sg105w pluto[15325]: | crl fetch request list unlocked by 'free_crl_fetch'
    2020:07:01-13:42:03 sg105w pluto[15325]: | ocsp fetch request list locked by 'free_ocsp_fetch'
    2020:07:01-13:42:03 sg105w pluto[15325]: | ocsp fetch request list unlocked by 'free_ocsp_fetch'
    2020:07:01-13:42:03 sg105w pluto[15325]: | authcert list locked by 'free_authcerts'
    2020:07:01-13:42:03 sg105w pluto[15325]: | authcert list unlocked by 'free_authcerts'
    2020:07:01-13:42:03 sg105w pluto[15325]: | crl list locked by 'free_crls'
    2020:07:01-13:42:03 sg105w pluto[15325]: | crl list unlocked by 'free_crls'
    2020:07:01-13:42:03 sg105w pluto[15325]: | ocsp cache locked by 'free_ocsp_cache'
    2020:07:01-13:42:03 sg105w pluto[15325]: | ocsp cache unlocked by 'free_ocsp_cache'
    2020:07:01-13:42:03 sg105w pluto[15325]: shutting down interface lo/lo ::1
    2020:07:01-13:42:03 sg105w pluto[15325]: shutting down interface lo/lo 127.0.0.1
    2020:07:01-13:42:03 sg105w pluto[15325]: shutting down interface lo/lo 127.0.0.1
    2020:07:01-13:42:03 sg105w pluto[15325]: shutting down interface eth0/eth0 192.168.1.1
    2020:07:01-13:42:03 sg105w pluto[15325]: shutting down interface eth0/eth0 192.168.1.1
    2020:07:01-13:42:03 sg105w pluto[15325]: shutting down interface eth1/eth1 192.168.8.3
    2020:07:01-13:42:03 sg105w pluto[15325]: shutting down interface eth1/eth1 192.168.8.3
    2020:07:01-13:42:03 sg105w pluto[15325]: shutting down interface wlan1/wlan1 192.168.29.1
    2020:07:01-13:42:03 sg105w pluto[15325]: shutting down interface wlan1/wlan1 192.168.29.1
    2020:07:01-13:42:03 sg105w pluto[15325]: shutting down interface wlan0/wlan0 192.168.28.1
    2020:07:01-13:42:03 sg105w pluto[15325]: shutting down interface wlan0/wlan0 192.168.28.1
    2020:07:01-13:42:03 sg105w pluto[15325]: shutting down interface tun0/tun0 10.242.2.1
    2020:07:01-13:42:03 sg105w pluto[15325]: shutting down interface tun0/tun0 10.242.2.1
    2020:07:01-13:42:03 sg105w ipsec_starter[15318]: pluto stopped after 40 ms
    2020:07:01-13:42:03 sg105w ipsec_starter[15318]: ipsec starter stopped
    2020:07:01-13:42:17 sg105w ipsec_starter[30099]: Starting strongSwan 4.4.1git20100610 IPsec [starter]...
    2020:07:01-13:42:17 sg105w pluto[30112]: Starting IKEv1 pluto daemon (strongSwan 4.4.1git20100610) THREADS VENDORID CISCO_QUIRKS
    2020:07:01-13:42:17 sg105w ipsec_starter[30105]: pluto (30112) started after 20 ms
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'curl': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'ldap': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'aes': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'des': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'blowfish': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'serpent': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'twofish': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'sha1': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'sha2': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'md5': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'random': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'x509': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'pubkey': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'pkcs1': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'pgp': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'dnskey': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'pem': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'sqlite': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'hmac': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'gmp': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'xauth': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'attr': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'attr-sql': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: | plugin 'resolve': loaded successfully
    2020:07:01-13:42:18 sg105w pluto[30112]: loaded plugins: curl ldap aes des blowfish serpent twofish sha1 sha2 md5 random x509 pubkey pkcs1 pgp dnskey pem sqlite hmac gmp xauth attr attr-sql resolve
    2020:07:01-13:42:18 sg105w pluto[30112]: | inserting event EVENT_REINIT_SECRET, timeout in 3600 seconds
    2020:07:01-13:42:18 sg105w pluto[30112]: including NAT-Traversal patch (Version 0.6c)
    2020:07:01-13:42:18 sg105w pluto[30112]: | process 30112 listening for PF_KEY_V2 on file descriptor 7
    2020:07:01-13:42:18 sg105w pluto[30112]: Using Linux 2.6 IPsec interface code
    2020:07:01-13:42:18 sg105w pluto[30112]: | finish_pfkey_msg: SADB_REGISTER message 1 for AH
    2020:07:01-13:42:18 sg105w pluto[30112]: | 02 07 00 02 02 00 00 00 01 00 00 00 a0 75 00 00
    2020:07:01-13:42:18 sg105w pluto[30112]: | pfkey_get: SADB_REGISTER message 1
    2020:07:01-13:42:18 sg105w pluto[30112]: | AH registered with kernel.
    2020:07:01-13:42:18 sg105w pluto[30112]: | finish_pfkey_msg: SADB_REGISTER message 2 for ESP
    2020:07:01-13:42:18 sg105w pluto[30112]: | 02 07 00 03 02 00 00 00 02 00 00 00 a0 75 00 00
    2020:07:01-13:42:18 sg105w pluto[30112]: | pfkey_get: SADB_REGISTER message 2
    2020:07:01-13:42:18 sg105w pluto[30112]: | alg_init(): memset(0x80e0a60, 0, 2016) memset(0x80e1240, 0, 2032)
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=19 sadb_supported_len=56
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=14, alg_id=251
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[0], exttype=14, satype=3, alg_id=251, alg_ivlen=0, alg_minbits=0, alg_maxbits=0, res=0
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=14, alg_id=2
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[1], exttype=14, satype=3, alg_id=2, alg_ivlen=0, alg_minbits=128, alg_maxbits=128, res=0
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=14, alg_id=3
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[2], exttype=14, satype=3, alg_id=3, alg_ivlen=0, alg_minbits=160, alg_maxbits=160, res=0
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=14, alg_id=5
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[3], exttype=14, satype=3, alg_id=5, alg_ivlen=0, alg_minbits=256, alg_maxbits=256, res=0
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=14, alg_id=6
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[4], exttype=14, satype=3, alg_id=6, alg_ivlen=0, alg_minbits=384, alg_maxbits=384, res=0
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=14, alg_id=7
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[5], exttype=14, satype=3, alg_id=7, alg_ivlen=0, alg_minbits=512, alg_maxbits=512, res=0
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: sadb_msg_len=19 sadb_supported_len=80
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=15, alg_id=11
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[6], exttype=15, satype=3, alg_id=11, alg_ivlen=0, alg_minbits=0, alg_maxbits=0, res=0
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=15, alg_id=2
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[7], exttype=15, satype=3, alg_id=2, alg_ivlen=8, alg_minbits=64, alg_maxbits=64, res=0
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=15, alg_id=3
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[8], exttype=15, satype=3, alg_id=3, alg_ivlen=8, alg_minbits=192, alg_maxbits=192, res=0
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=15, alg_id=6
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[9], exttype=15, satype=3, alg_id=6, alg_ivlen=8, alg_minbits=40, alg_maxbits=128, res=0
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=15, alg_id=7
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[10], exttype=15, satype=3, alg_id=7, alg_ivlen=8, alg_minbits=40, alg_maxbits=448, res=0
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=15, alg_id=12
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[11], exttype=15, satype=3, alg_id=12, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=15, alg_id=14
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=15, alg_id=15
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=15, alg_id=16
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=15, alg_id=18
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=15, alg_id=19
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=15, alg_id=20
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=15, alg_id=23
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=15, alg_id=252
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[12], exttype=15, satype=3, alg_id=252, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=15, alg_id=253
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[13], exttype=15, satype=3, alg_id=253, alg_ivlen=8, alg_minbits=128, alg_maxbits=256, res=0
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_add(): satype=3, exttype=15, alg_id=13
    2020:07:01-13:42:18 sg105w pluto[30112]: | kernel_alg_register_pfkey(): SADB_SATYPE_ESP: alg[14], exttype=15, satype=3, alg_id=13, alg_ivlen=8, alg_minbits=160, alg_maxbits=288, res=0
    2020:07:01-13:42:18 sg105w pluto[30112]: | ESP registered with kernel.
    2020:07:01-13:42:18 sg105w pluto[30112]: | finish_pfkey_msg: SADB_REGISTER message 3 for IPCOMP
    2020:07:01-13:42:18 sg105w pluto[30112]: | 02 07 00 09 02 00 00 00 03 00 00 00 a0 75 00 00
    2020:07:01-13:42:18 sg105w pluto[30112]: | pfkey_get: SADB_REGISTER message 3
    2020:07:01-13:42:18 sg105w pluto[30112]: | IPCOMP registered with kernel.
    2020:07:01-13:42:18 sg105w pluto[30112]: loading ca certificates from '/etc/ipsec.d/cacerts'
    2020:07:01-13:42:18 sg105w pluto[30112]: | file content is not binary ASN.1
    2020:07:01-13:42:18 sg105w pluto[30112]: | -----BEGIN CERTIFICATE-----
    2020:07:01-13:42:18 sg105w pluto[30112]: | -----END CERTIFICATE-----
    2020:07:01-13:42:18 sg105w pluto[30112]: | L0 - x509:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L1 - tbsCertificate:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L2 - DEFAULT v1:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L3 - version:
    2020:07:01-13:42:18 sg105w pluto[30112]: | X.509v3
    2020:07:01-13:42:18 sg105w pluto[30112]: | L2 - serialNumber:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L2 - signature:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L3 - algorithmIdentifier:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L4 - algorithm:
    2020:07:01-13:42:18 sg105w pluto[30112]: | 'sha256WithRSAEncryption'
    2020:07:01-13:42:18 sg105w pluto[30112]: | L2 - issuer:
    2020:07:01-13:42:18 sg105w pluto[30112]: | 'C=de, L=MeXXX, O=mSCHNEIDER XXXX, CN=mSCHNEIDER XXXX CA, E=mschneider@XXXXX.XX'
    2020:07:01-13:42:18 sg105w pluto[30112]: | L2 - validity:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L3 - notBefore:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L4 - utcTime:
    2020:07:01-13:42:18 sg105w pluto[30112]: | 'Jun 24 08:25:45 UTC 2020'
    2020:07:01-13:42:18 sg105w pluto[30112]: | L3 - notAfter:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L4 - utcTime:
    2020:07:01-13:42:18 sg105w pluto[30112]: | 'Jan 01 00:00:00 UTC 2038'
    2020:07:01-13:42:18 sg105w pluto[30112]: | L2 - subject:
    2020:07:01-13:42:18 sg105w pluto[30112]: | 'C=de, L=MeXXX, O=mSCHNEIDER XXXX, CN=mSCHNEIDER XXXX CA, E=mschneider@XXXXX.XX'
    2020:07:01-13:42:18 sg105w pluto[30112]: | L2 - subjectPublicKeyInfo:
    2020:07:01-13:42:18 sg105w pluto[30112]: | -- > --
    2020:07:01-13:42:18 sg105w pluto[30112]: | L0 - subjectPublicKeyInfo:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L1 - algorithm:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L2 - algorithmIdentifier:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L3 - algorithm:
    2020:07:01-13:42:18 sg105w pluto[30112]: | 'rsaEncryption'
    2020:07:01-13:42:18 sg105w pluto[30112]: | L1 - subjectPublicKey:
    2020:07:01-13:42:18 sg105w pluto[30112]: | -- > --
    2020:07:01-13:42:18 sg105w pluto[30112]: | L0 - RSAPublicKey:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L1 - modulus:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L1 - publicExponent:
    2020:07:01-13:42:18 sg105w pluto[30112]: | -- < --
    2020:07:01-13:42:18 sg105w pluto[30112]: | -- < --
    2020:07:01-13:42:18 sg105w pluto[30112]: | L2 - optional extensions:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L3 - extensions:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L4 - extension:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L5 - extnID:
    2020:07:01-13:42:18 sg105w pluto[30112]: | 'subjectKeyIdentifier'
    2020:07:01-13:42:18 sg105w pluto[30112]: | L5 - critical:
    2020:07:01-13:42:18 sg105w pluto[30112]: | FALSE
    2020:07:01-13:42:18 sg105w pluto[30112]: | L5 - extnValue:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L6 - keyIdentifier:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L4 - extension:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L5 - extnID:
    2020:07:01-13:42:18 sg105w pluto[30112]: | 'basicConstraints'
    2020:07:01-13:42:18 sg105w pluto[30112]: | L5 - critical:
    2020:07:01-13:42:18 sg105w pluto[30112]: | FALSE
    2020:07:01-13:42:18 sg105w pluto[30112]: | L5 - extnValue:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L6 - basicConstraints:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L7 - CA:
    2020:07:01-13:42:18 sg105w pluto[30112]: | TRUE
    2020:07:01-13:42:18 sg105w pluto[30112]: | L4 - extension:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L5 - extnID:
    2020:07:01-13:42:18 sg105w pluto[30112]: | 'subjectAltName'
    2020:07:01-13:42:18 sg105w pluto[30112]: | L5 - critical:
    2020:07:01-13:42:18 sg105w pluto[30112]: | FALSE
    2020:07:01-13:42:18 sg105w pluto[30112]: | L5 - extnValue:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L6 - generalNames:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L7 - generalName:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L8 - ipAddress:
    2020:07:01-13:42:18 sg105w pluto[30112]: | '127.0.0.1'
    2020:07:01-13:42:18 sg105w pluto[30112]: | L1 - signatureAlgorithm:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L2 - algorithmIdentifier:
    2020:07:01-13:42:18 sg105w pluto[30112]: | L3 - algorithm:
    2020:07:01-13:42:18 sg105w pluto[30112]: | 'sha256WithRSAEncryption'
    2020:07:01-13:42:18 sg105w pluto[30112]: | L1 - signatureValue:
    2020:07:01-13:42:18 sg105w pluto[30112]: loaded ca certificate from '/etc/ipsec.d/cacerts/VPN Signing CA.pem'
    2020:07:01-13:42:18 sg105w pluto[30112]: | authcert list locked by 'add_authcert'
    2020:07:01-13:42:18 sg105w pluto[30112]: | authcert inserted
    2020:07:01-13:42:18 sg105w pluto[30112]: | authcert list unlocked by 'add_authcert'
    2020:07:01-13:42:18 sg105w pluto[30112]: loading aa certificates from '/etc/ipsec.d/aacerts'
    2020:07:01-13:42:18 sg105w pluto[30112]: loading ocsp certificates from '/etc/ipsec.d/ocspcerts'
    2020:07:01-13:42:18 sg105w pluto[30112]: Changing to directory '/etc/ipsec.d/crls'
    2020:07:01-13:42:18 sg105w pluto[30112]: loading attribute certificates from '/etc/ipsec.d/acerts'
    2020:07:01-13:42:18 sg105w pluto[30112]: | inserting event EVENT_LOG_DAILY, timeout in 37062 seconds
    2020:07:01-13:42:18 sg105w pluto[30112]: | next event EVENT_REINIT_SECRET in 3600 seconds
    2020:07:01-13:42:18 sg105w pluto[30112]: |
    2020:07:01-13:42:18 sg105w pluto[30112]: | *received whack message
    2020:07:01-13:42:18 sg105w pluto[30112]: | next event EVENT_REINIT_SECRET in 3600 seconds
    2020:07:01-13:42:18 sg105w pluto[30112]: |
    2020:07:01-13:42:18 sg105w pluto[30112]: | *received whack message
    2020:07:01-13:42:18 sg105w pluto[30112]: | found lo with address 127.0.0.1
    2020:07:01-13:42:18 sg105w pluto[30112]: | found eth0 with address 192.168.1.1
    2020:07:01-13:42:18 sg105w pluto[30112]: | found eth1 with address 192.168.8.3
    2020:07:01-13:42:18 sg105w pluto[30112]: | found wlan1 with address 192.168.29.1
    2020:07:01-13:42:18 sg105w pluto[30112]: | found wlan0 with address 192.168.28.1
    2020:07:01-13:42:18 sg105w pluto[30112]: | found tun0 with address 10.242.2.1
    2020:07:01-13:42:18 sg105w pluto[30112]: adding interface tun0/tun0 10.242.2.1:500
    2020:07:01-13:42:18 sg105w pluto[30112]: adding interface tun0/tun0 10.242.2.1:4500
    2020:07:01-13:42:18 sg105w pluto[30112]: adding interface wlan0/wlan0 192.168.28.1:500
    2020:07:01-13:42:18 sg105w pluto[30112]: adding interface wlan0/wlan0 192.168.28.1:4500
    2020:07:01-13:42:18 sg105w pluto[30112]: adding interface wlan1/wlan1 192.168.29.1:500
    2020:07:01-13:42:18 sg105w pluto[30112]: adding interface wlan1/wlan1 192.168.29.1:4500
    2020:07:01-13:42:18 sg105w pluto[30112]: adding interface eth1/eth1 192.168.8.3:500
    2020:07:01-13:42:18 sg105w pluto[30112]: adding interface eth1/eth1 192.168.8.3:4500
    2020:07:01-13:42:18 sg105w pluto[30112]: adding interface eth0/eth0 192.168.1.1:500
    2020:07:01-13:42:18 sg105w pluto[30112]: adding interface eth0/eth0 192.168.1.1:4500
    2020:07:01-13:42:18 sg105w pluto[30112]: adding interface lo/lo 127.0.0.1:500
    2020:07:01-13:42:18 sg105w pluto[30112]: adding interface lo/lo 127.0.0.1:4500
    2020:07:01-13:42:18 sg105w pluto[30112]: | found lo with address 0000:0000:0000:0000:0000:0000:0000:0001
    2020:07:01-13:42:18 sg105w pluto[30112]: adding interface lo/lo ::1:500
    2020:07:01-13:42:18 sg105w pluto[30112]: | certs and keys locked by 'free_preshared_secrets'
    2020:07:01-13:42:18 sg105w pluto[30112]: | certs and keys unlocked by 'free_preshard_secrets'
    2020:07:01-13:42:18 sg105w pluto[30112]: loading secrets from "/etc/ipsec.secrets"
    2020:07:01-13:42:18 sg105w pluto[30112]: loaded PSK secret for 192.168.8.3 x7ckv5XXXXXXX.myfritz.net
    2020:07:01-13:42:18 sg105w pluto[30112]: | certs and keys locked by 'process_secret'
    2020:07:01-13:42:18 sg105w pluto[30112]: | certs and keys unlocked by 'process_secrets'
    2020:07:01-13:42:18 sg105w pluto[30112]: listening for IKE messages
    2020:07:01-13:42:18 sg105w pluto[30112]: | next event EVENT_REINIT_SECRET in 3600 seconds
    2020:07:01-13:42:18 sg105w pluto[30112]: |
    2020:07:01-13:42:18 sg105w pluto[30112]: | *received whack message
    2020:07:01-13:42:18 sg105w pluto[30112]: | from whack: got --esp=3des-sha1!;modp1024
    2020:07:01-13:42:18 sg105w pluto[30112]: | esp proposal: 3DES_CBC/HMAC_SHA1, ; pfsgroup=MODP_1024; strict
    2020:07:01-13:42:18 sg105w pluto[30112]: | from whack: got --ike=3des-sha1-modp1024!
    2020:07:01-13:42:18 sg105w pluto[30112]: | ike proposal: 3DES_CBC/HMAC_SHA1/MODP_1024, strict
    2020:07:01-13:42:18 sg105w pluto[30112]: added connection description "S_Fritz!Box_Michi_IN"
    2020:07:01-13:42:18 sg105w pluto[30112]: | 192.168.1.0/24===192.168.8.3[192.168.8.3]...79.XXX.YYY.97[x7ckv5XXXXXXX.myfritz.net]===192.168.113.0/24
    2020:07:01-13:42:18 sg105w pluto[30112]: | ike_life: 3600s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; policy: PSK+ENCRYPT+TUNNEL+PFS
    2020:07:01-13:42:18 sg105w pluto[30112]: | next event EVENT_REINIT_SECRET in 3600 seconds
    2020:07:01-13:42:18 sg105w pluto[30112]: |
    2020:07:01-13:42:18 sg105w pluto[30112]: | *received whack message
    2020:07:01-13:42:18 sg105w pluto[30112]: | creating state object #1 at 0x94cf0a0
    2020:07:01-13:42:18 sg105w pluto[30112]: | ICOOKIE: 39 8a 40 38 31 d6 35 f3
    2020:07:01-13:42:18 sg105w pluto[30112]: | RCOOKIE: 00 00 00 00 00 00 00 00
    2020:07:01-13:42:18 sg105w pluto[30112]: | peer: 4f fa 96 61
    2020:07:01-13:42:18 sg105w pluto[30112]: | state hash entry 0
    2020:07:01-13:42:18 sg105w pluto[30112]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #1
    2020:07:01-13:42:18 sg105w pluto[30112]: | Queuing pending Quick Mode with 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN"
    2020:07:01-13:42:18 sg105w pluto[30112]: "S_Fritz!Box_Michi_IN" #1: initiating Main Mode
    2020:07:01-13:42:18 sg105w pluto[30112]: | **emit ISAKMP Message:
    2020:07:01-13:42:18 sg105w pluto[30112]: | initiator cookie:
    2020:07:01-13:42:18 sg105w pluto[30112]: | 39 8a 40 38 31 d6 35 f3
    2020:07:01-13:42:18 sg105w pluto[30112]: | responder cookie:
    2020:07:01-13:42:18 sg105w pluto[30112]: | 00 00 00 00 00 00 00 00
    2020:07:01-13:42:18 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_SA
    2020:07:01-13:42:18 sg105w pluto[30112]: | ISAKMP version: ISAKMP Version 1.0
    2020:07:01-13:42:18 sg105w pluto[30112]: | exchange type: ISAKMP_XCHG_IDPROT
    2020:07:01-13:42:18 sg105w pluto[30112]: | flags: none
    2020:07:01-13:42:18 sg105w pluto[30112]: | message ID: 00 00 00 00
    2020:07:01-13:42:18 sg105w pluto[30112]: | ***emit ISAKMP Security Association Payload:
    2020:07:01-13:42:18 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:42:18 sg105w pluto[30112]: | DOI: ISAKMP_DOI_IPSEC
    2020:07:01-13:42:18 sg105w pluto[30112]: | ****emit IPsec DOI SIT:
    2020:07:01-13:42:18 sg105w pluto[30112]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
    2020:07:01-13:42:18 sg105w pluto[30112]: | ike proposal: 3DES_CBC/HMAC_SHA1/MODP_1024, strict
    2020:07:01-13:42:18 sg105w pluto[30112]: | ****emit ISAKMP Proposal Payload:
    2020:07:01-13:42:18 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_NONE
    2020:07:01-13:42:18 sg105w pluto[30112]: | proposal number: 0
    2020:07:01-13:42:18 sg105w pluto[30112]: | protocol ID: PROTO_ISAKMP
    2020:07:01-13:42:18 sg105w pluto[30112]: | SPI size: 0
    2020:07:01-13:42:18 sg105w pluto[30112]: | number of transforms: 1
    2020:07:01-13:42:18 sg105w pluto[30112]: | *****emit ISAKMP Transform Payload (ISAKMP):
    2020:07:01-13:42:18 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_NONE
    2020:07:01-13:42:18 sg105w pluto[30112]: | transform number: 0
    2020:07:01-13:42:18 sg105w pluto[30112]: | transform ID: KEY_IKE
    2020:07:01-13:42:18 sg105w pluto[30112]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-13:42:18 sg105w pluto[30112]: | af+type: OAKLEY_LIFE_TYPE
    2020:07:01-13:42:18 sg105w pluto[30112]: | length/value: 1
    2020:07:01-13:42:18 sg105w pluto[30112]: | [1 is OAKLEY_LIFE_SECONDS]
    2020:07:01-13:42:18 sg105w pluto[30112]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-13:42:18 sg105w pluto[30112]: | af+type: OAKLEY_LIFE_DURATION
    2020:07:01-13:42:18 sg105w pluto[30112]: | length/value: 3600
    2020:07:01-13:42:18 sg105w pluto[30112]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-13:42:18 sg105w pluto[30112]: | af+type: OAKLEY_ENCRYPTION_ALGORITHM
    2020:07:01-13:42:18 sg105w pluto[30112]: | length/value: 5
    2020:07:01-13:42:18 sg105w pluto[30112]: | [5 is 3DES_CBC]
    2020:07:01-13:42:18 sg105w pluto[30112]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-13:42:18 sg105w pluto[30112]: | af+type: OAKLEY_HASH_ALGORITHM
    2020:07:01-13:42:18 sg105w pluto[30112]: | length/value: 2
    2020:07:01-13:42:18 sg105w pluto[30112]: | [2 is HMAC_SHA1]
    2020:07:01-13:42:18 sg105w pluto[30112]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-13:42:18 sg105w pluto[30112]: | af+type: OAKLEY_AUTHENTICATION_METHOD
    2020:07:01-13:42:18 sg105w pluto[30112]: | length/value: 1
    2020:07:01-13:42:18 sg105w pluto[30112]: | [1 is pre-shared key]
    2020:07:01-13:42:18 sg105w pluto[30112]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-13:42:18 sg105w pluto[30112]: | af+type: OAKLEY_GROUP_DESCRIPTION
    2020:07:01-13:42:18 sg105w pluto[30112]: | length/value: 2
    2020:07:01-13:42:18 sg105w pluto[30112]: | [2 is MODP_1024]
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting length of ISAKMP Proposal Payload: 40
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting length of ISAKMP Security Association Payload: 52
    2020:07:01-13:42:18 sg105w pluto[30112]: | out_vendorid(): sending [strongSwan]
    2020:07:01-13:42:18 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:42:18 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:42:18 sg105w pluto[30112]: | V_ID 88 2f e5 6d 6f d2 0d bc 22 51 61 3b 2e be 5b eb
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-13:42:18 sg105w pluto[30112]: | out_vendorid(): sending [Cisco-Unity]
    2020:07:01-13:42:18 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:42:18 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:42:18 sg105w pluto[30112]: | V_ID 12 f5 f2 8c 45 71 68 a9 70 2d 9f e2 74 cc 01 00
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-13:42:18 sg105w pluto[30112]: | out_vendorid(): sending [XAUTH]
    2020:07:01-13:42:18 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:42:18 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting 8 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:42:18 sg105w pluto[30112]: | V_ID 09 00 26 89 df d6 b7 12
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 12
    2020:07:01-13:42:18 sg105w pluto[30112]: | out_vendorid(): sending [Dead Peer Detection]
    2020:07:01-13:42:18 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:42:18 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:42:18 sg105w pluto[30112]: | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-13:42:18 sg105w pluto[30112]: | out_vendorid(): sending [RFC 3947]
    2020:07:01-13:42:18 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:42:18 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:42:18 sg105w pluto[30112]: | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-13:42:18 sg105w pluto[30112]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:01-13:42:18 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:42:18 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:42:18 sg105w pluto[30112]: | V_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-13:42:18 sg105w pluto[30112]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-02]
    2020:07:01-13:42:18 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:42:18 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:42:18 sg105w pluto[30112]: | V_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-13:42:18 sg105w pluto[30112]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:01-13:42:18 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:42:18 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:42:18 sg105w pluto[30112]: | V_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-13:42:18 sg105w pluto[30112]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-00]
    2020:07:01-13:42:18 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:42:18 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_NONE
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:42:18 sg105w pluto[30112]: | V_ID 44 85 15 2d 18 b6 bb cd 0b e8 a8 46 95 79 dd cc
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-13:42:18 sg105w pluto[30112]: | emitting length of ISAKMP Message: 252
    2020:07:01-13:42:18 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #1
    2020:07:01-13:42:18 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 10 seconds for #1
    2020:07:01-13:42:28 sg105w pluto[30112]: |
    2020:07:01-13:42:28 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:42:28 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 3590 seconds
    2020:07:01-13:42:28 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:42:28 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 20 seconds for #1
    2020:07:01-13:42:28 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 20 seconds for #1
    2020:07:01-13:42:48 sg105w pluto[30112]: |
    2020:07:01-13:42:48 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:42:48 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 3570 seconds
    2020:07:01-13:42:48 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:42:48 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:42:48 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:43:28 sg105w pluto[30112]: |
    2020:07:01-13:43:28 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:43:28 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 3530 seconds
    2020:07:01-13:43:28 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:43:28 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:43:28 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:44:08 sg105w pluto[30112]: |
    2020:07:01-13:44:08 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:44:08 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 3490 seconds
    2020:07:01-13:44:08 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:44:08 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:44:08 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:44:48 sg105w pluto[30112]: |
    2020:07:01-13:44:48 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:44:48 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 3450 seconds
    2020:07:01-13:44:48 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:44:48 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:44:48 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:45:28 sg105w pluto[30112]: |
    2020:07:01-13:45:28 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:45:28 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 3410 seconds
    2020:07:01-13:45:28 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:45:28 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:45:28 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:46:08 sg105w pluto[30112]: |
    2020:07:01-13:46:08 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:46:08 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 3370 seconds
    2020:07:01-13:46:08 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:46:08 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:46:08 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:46:48 sg105w pluto[30112]: |
    2020:07:01-13:46:48 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:46:48 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 3330 seconds
    2020:07:01-13:46:48 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:46:48 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:46:48 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:47:28 sg105w pluto[30112]: |
    2020:07:01-13:47:28 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:47:28 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 3290 seconds
    2020:07:01-13:47:28 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:47:28 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:47:28 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:48:08 sg105w pluto[30112]: |
    2020:07:01-13:48:08 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:48:08 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 3250 seconds
    2020:07:01-13:48:08 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:48:08 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:48:08 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:48:48 sg105w pluto[30112]: |
    2020:07:01-13:48:48 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:48:48 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 3210 seconds
    2020:07:01-13:48:48 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:48:48 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:48:48 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:49:28 sg105w pluto[30112]: |
    2020:07:01-13:49:28 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:49:28 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 3170 seconds
    2020:07:01-13:49:28 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:49:28 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:49:28 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:50:08 sg105w pluto[30112]: |
    2020:07:01-13:50:08 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:50:08 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 3130 seconds
    2020:07:01-13:50:08 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:50:08 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:50:08 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:50:48 sg105w pluto[30112]: |
    2020:07:01-13:50:48 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:50:48 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 3090 seconds
    2020:07:01-13:50:48 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:50:48 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:50:48 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:51:03 sg105w pluto[30112]: |
    2020:07:01-13:51:03 sg105w pluto[30112]: | *received whack message
    2020:07:01-13:51:03 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 25 seconds for #1
    2020:07:01-13:51:03 sg105w pluto[30112]: |
    2020:07:01-13:51:03 sg105w pluto[30112]: | *received whack message
    2020:07:01-13:51:03 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 25 seconds for #1
    2020:07:01-13:51:28 sg105w pluto[30112]: |
    2020:07:01-13:51:28 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:51:28 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 3050 seconds
    2020:07:01-13:51:28 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:51:28 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:51:28 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:52:09 sg105w pluto[30112]: |
    2020:07:01-13:52:09 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:52:09 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 3009 seconds
    2020:07:01-13:52:09 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:52:09 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:52:09 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:52:49 sg105w pluto[30112]: |
    2020:07:01-13:52:49 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:52:49 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 2969 seconds
    2020:07:01-13:52:49 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:52:49 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:52:49 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:53:29 sg105w pluto[30112]: |
    2020:07:01-13:53:29 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:53:29 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 2929 seconds
    2020:07:01-13:53:29 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:53:29 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:53:29 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:54:09 sg105w pluto[30112]: |
    2020:07:01-13:54:09 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:54:09 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 2889 seconds
    2020:07:01-13:54:09 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:54:09 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:54:09 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:54:49 sg105w pluto[30112]: |
    2020:07:01-13:54:49 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:54:49 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 2849 seconds
    2020:07:01-13:54:49 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:54:49 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #1
    2020:07:01-13:54:49 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #1
    2020:07:01-13:55:29 sg105w pluto[30112]: |
    2020:07:01-13:55:29 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:55:29 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 2809 seconds
    2020:07:01-13:55:29 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #1
    2020:07:01-13:55:29 sg105w pluto[30112]: "S_Fritz!Box_Michi_IN" #1: max number of retransmissions (20) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
    2020:07:01-13:55:29 sg105w pluto[30112]: "S_Fritz!Box_Michi_IN" #1: starting keying attempt 2 of an unlimited number
    2020:07:01-13:55:29 sg105w pluto[30112]: | creating state object #2 at 0x94cfd50
    2020:07:01-13:55:29 sg105w pluto[30112]: | ICOOKIE: d7 c6 0c c2 05 8b 84 5e
    2020:07:01-13:55:29 sg105w pluto[30112]: | RCOOKIE: 00 00 00 00 00 00 00 00
    2020:07:01-13:55:29 sg105w pluto[30112]: | peer: 4f fa 96 61
    2020:07:01-13:55:29 sg105w pluto[30112]: | state hash entry 17
    2020:07:01-13:55:29 sg105w pluto[30112]: | inserting event EVENT_SO_DISCARD, timeout in 0 seconds for #2
    2020:07:01-13:55:29 sg105w pluto[30112]: "S_Fritz!Box_Michi_IN" #2: initiating Main Mode to replace #1
    2020:07:01-13:55:29 sg105w pluto[30112]: | **emit ISAKMP Message:
    2020:07:01-13:55:29 sg105w pluto[30112]: | initiator cookie:
    2020:07:01-13:55:29 sg105w pluto[30112]: | d7 c6 0c c2 05 8b 84 5e
    2020:07:01-13:55:29 sg105w pluto[30112]: | responder cookie:
    2020:07:01-13:55:29 sg105w pluto[30112]: | 00 00 00 00 00 00 00 00
    2020:07:01-13:55:29 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_SA
    2020:07:01-13:55:29 sg105w pluto[30112]: | ISAKMP version: ISAKMP Version 1.0
    2020:07:01-13:55:29 sg105w pluto[30112]: | exchange type: ISAKMP_XCHG_IDPROT
    2020:07:01-13:55:29 sg105w pluto[30112]: | flags: none
    2020:07:01-13:55:29 sg105w pluto[30112]: | message ID: 00 00 00 00
    2020:07:01-13:55:29 sg105w pluto[30112]: | ***emit ISAKMP Security Association Payload:
    2020:07:01-13:55:29 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:55:29 sg105w pluto[30112]: | DOI: ISAKMP_DOI_IPSEC
    2020:07:01-13:55:29 sg105w pluto[30112]: | ****emit IPsec DOI SIT:
    2020:07:01-13:55:29 sg105w pluto[30112]: | IPsec DOI SIT: SIT_IDENTITY_ONLY
    2020:07:01-13:55:29 sg105w pluto[30112]: | ike proposal: 3DES_CBC/HMAC_SHA1/MODP_1024, strict
    2020:07:01-13:55:29 sg105w pluto[30112]: | ****emit ISAKMP Proposal Payload:
    2020:07:01-13:55:29 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_NONE
    2020:07:01-13:55:29 sg105w pluto[30112]: | proposal number: 0
    2020:07:01-13:55:29 sg105w pluto[30112]: | protocol ID: PROTO_ISAKMP
    2020:07:01-13:55:29 sg105w pluto[30112]: | SPI size: 0
    2020:07:01-13:55:29 sg105w pluto[30112]: | number of transforms: 1
    2020:07:01-13:55:29 sg105w pluto[30112]: | *****emit ISAKMP Transform Payload (ISAKMP):
    2020:07:01-13:55:29 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_NONE
    2020:07:01-13:55:29 sg105w pluto[30112]: | transform number: 0
    2020:07:01-13:55:29 sg105w pluto[30112]: | transform ID: KEY_IKE
    2020:07:01-13:55:29 sg105w pluto[30112]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-13:55:29 sg105w pluto[30112]: | af+type: OAKLEY_LIFE_TYPE
    2020:07:01-13:55:29 sg105w pluto[30112]: | length/value: 1
    2020:07:01-13:55:29 sg105w pluto[30112]: | [1 is OAKLEY_LIFE_SECONDS]
    2020:07:01-13:55:29 sg105w pluto[30112]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-13:55:29 sg105w pluto[30112]: | af+type: OAKLEY_LIFE_DURATION
    2020:07:01-13:55:29 sg105w pluto[30112]: | length/value: 3600
    2020:07:01-13:55:29 sg105w pluto[30112]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-13:55:29 sg105w pluto[30112]: | af+type: OAKLEY_ENCRYPTION_ALGORITHM
    2020:07:01-13:55:29 sg105w pluto[30112]: | length/value: 5
    2020:07:01-13:55:29 sg105w pluto[30112]: | [5 is 3DES_CBC]
    2020:07:01-13:55:29 sg105w pluto[30112]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-13:55:29 sg105w pluto[30112]: | af+type: OAKLEY_HASH_ALGORITHM
    2020:07:01-13:55:29 sg105w pluto[30112]: | length/value: 2
    2020:07:01-13:55:29 sg105w pluto[30112]: | [2 is HMAC_SHA1]
    2020:07:01-13:55:29 sg105w pluto[30112]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-13:55:29 sg105w pluto[30112]: | af+type: OAKLEY_AUTHENTICATION_METHOD
    2020:07:01-13:55:29 sg105w pluto[30112]: | length/value: 1
    2020:07:01-13:55:29 sg105w pluto[30112]: | [1 is pre-shared key]
    2020:07:01-13:55:29 sg105w pluto[30112]: | ******emit ISAKMP Oakley attribute:
    2020:07:01-13:55:29 sg105w pluto[30112]: | af+type: OAKLEY_GROUP_DESCRIPTION
    2020:07:01-13:55:29 sg105w pluto[30112]: | length/value: 2
    2020:07:01-13:55:29 sg105w pluto[30112]: | [2 is MODP_1024]
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting length of ISAKMP Transform Payload (ISAKMP): 32
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting length of ISAKMP Proposal Payload: 40
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting length of ISAKMP Security Association Payload: 52
    2020:07:01-13:55:29 sg105w pluto[30112]: | out_vendorid(): sending [strongSwan]
    2020:07:01-13:55:29 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:55:29 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:55:29 sg105w pluto[30112]: | V_ID 88 2f e5 6d 6f d2 0d bc 22 51 61 3b 2e be 5b eb
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-13:55:29 sg105w pluto[30112]: | out_vendorid(): sending [Cisco-Unity]
    2020:07:01-13:55:29 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:55:29 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:55:29 sg105w pluto[30112]: | V_ID 12 f5 f2 8c 45 71 68 a9 70 2d 9f e2 74 cc 01 00
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-13:55:29 sg105w pluto[30112]: | out_vendorid(): sending [XAUTH]
    2020:07:01-13:55:29 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:55:29 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting 8 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:55:29 sg105w pluto[30112]: | V_ID 09 00 26 89 df d6 b7 12
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 12
    2020:07:01-13:55:29 sg105w pluto[30112]: | out_vendorid(): sending [Dead Peer Detection]
    2020:07:01-13:55:29 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:55:29 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:55:29 sg105w pluto[30112]: | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-13:55:29 sg105w pluto[30112]: | out_vendorid(): sending [RFC 3947]
    2020:07:01-13:55:29 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:55:29 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:55:29 sg105w pluto[30112]: | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-13:55:29 sg105w pluto[30112]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:01-13:55:29 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:55:29 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:55:29 sg105w pluto[30112]: | V_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-13:55:29 sg105w pluto[30112]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-02]
    2020:07:01-13:55:29 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:55:29 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:55:29 sg105w pluto[30112]: | V_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-13:55:29 sg105w pluto[30112]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:01-13:55:29 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:55:29 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_VID
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:55:29 sg105w pluto[30112]: | V_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-13:55:29 sg105w pluto[30112]: | out_vendorid(): sending [draft-ietf-ipsec-nat-t-ike-00]
    2020:07:01-13:55:29 sg105w pluto[30112]: | ***emit ISAKMP Vendor ID Payload:
    2020:07:01-13:55:29 sg105w pluto[30112]: | next payload type: ISAKMP_NEXT_NONE
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload
    2020:07:01-13:55:29 sg105w pluto[30112]: | V_ID 44 85 15 2d 18 b6 bb cd 0b e8 a8 46 95 79 dd cc
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting length of ISAKMP Vendor ID Payload: 20
    2020:07:01-13:55:29 sg105w pluto[30112]: | emitting length of ISAKMP Message: 252
    2020:07:01-13:55:29 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 10 seconds for #2
    2020:07:01-13:55:29 sg105w pluto[30112]: | ICOOKIE: 39 8a 40 38 31 d6 35 f3
    2020:07:01-13:55:29 sg105w pluto[30112]: | RCOOKIE: 00 00 00 00 00 00 00 00
    2020:07:01-13:55:29 sg105w pluto[30112]: | peer: 4f fa 96 61
    2020:07:01-13:55:29 sg105w pluto[30112]: | state hash entry 0
    2020:07:01-13:55:29 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 10 seconds for #2
    2020:07:01-13:55:39 sg105w pluto[30112]: |
    2020:07:01-13:55:39 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:55:39 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 2799 seconds
    2020:07:01-13:55:39 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #2
    2020:07:01-13:55:39 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 20 seconds for #2
    2020:07:01-13:55:39 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 20 seconds for #2
    2020:07:01-13:55:59 sg105w pluto[30112]: |
    2020:07:01-13:55:59 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:55:59 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 2779 seconds
    2020:07:01-13:55:59 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #2
    2020:07:01-13:55:59 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #2
    2020:07:01-13:55:59 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #2
    2020:07:01-13:56:39 sg105w pluto[30112]: |
    2020:07:01-13:56:39 sg105w pluto[30112]: | *time to handle event
    2020:07:01-13:56:39 sg105w pluto[30112]: | event after this is EVENT_REINIT_SECRET in 2739 seconds
    2020:07:01-13:56:39 sg105w pluto[30112]: | handling event EVENT_RETRANSMIT for 79.XXX.YYY.97 "S_Fritz!Box_Michi_IN" #2
    2020:07:01-13:56:39 sg105w pluto[30112]: | inserting event EVENT_RETRANSMIT, timeout in 40 seconds for #2
    2020:07:01-13:56:39 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 40 seconds for #2
    2020:07:01-13:56:51 sg105w pluto[30112]: |
    2020:07:01-13:56:51 sg105w pluto[30112]: | *received whack message
    2020:07:01-13:56:51 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 28 seconds for #2
    2020:07:01-13:56:51 sg105w pluto[30112]: |
    2020:07:01-13:56:51 sg105w pluto[30112]: | *received whack message
    2020:07:01-13:56:51 sg105w pluto[30112]: | next event EVENT_RETRANSMIT in 28 seconds for #2

    Vielen Dank

    Mit freundlichen Grüßen

    Michael

  • Was ist auf der SG als "eigene VPN-ID" eingestellt?

    Die FB erwartet wohl einen FQDN. Evtl. sendet die SG aber "VPN ID: 192.168.8.3"

    Site-to-site-vpn/IPSec/Advanced

    Gibt es auch logs auf der FB?


    Dirk

    Systema Gesellschaft für angewandte Datentechnik mbH  // Sophos Platinum Partner
    Sophos Solution Partner since 2003
    If a post solves your question, click the 'Verify Answer' link at this post.

  • Hallo Michael,

    When you have Debug enabled, the logs are impossible to read.  In 13+ years, I've never seen a problem solved here that required enabling Debug, also, bitte, stelle IKE-Fehlersuche aus.

    Until we've identified the problem, don't use 'Stricte richtlinie'.  I would also set the IKE-SA- Lebensdauer in the UTM and the FB to 7800.

    Having said all that, I think your real problem is that your UTM is behind a NAT.  If possible, configure the FB to NOT initiate a connection.  If that can't be done, then, on the 'Erweitert' tab, configure 'VPN-ID' to be your public IP that the UTM doesn't have.  'Probing' only needs to be enabled if you have more than one IPsec VPN PSK.

    MfG - Bob (Bitte auf Deutsch weiterhin.)

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Reply
  • Hallo Michael,

    When you have Debug enabled, the logs are impossible to read.  In 13+ years, I've never seen a problem solved here that required enabling Debug, also, bitte, stelle IKE-Fehlersuche aus.

    Until we've identified the problem, don't use 'Stricte richtlinie'.  I would also set the IKE-SA- Lebensdauer in the UTM and the FB to 7800.

    Having said all that, I think your real problem is that your UTM is behind a NAT.  If possible, configure the FB to NOT initiate a connection.  If that can't be done, then, on the 'Erweitert' tab, configure 'VPN-ID' to be your public IP that the UTM doesn't have.  'Probing' only needs to be enabled if you have more than one IPsec VPN PSK.

    MfG - Bob (Bitte auf Deutsch weiterhin.)

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Children
  • Hallo Bob,

    deinen Post habe ich gerade gar nicht gesehen... komisch, egal!

    Der Tip mit der IP in der VPN-ID ist anscheinend einen Schritt weiter.

    Plötzlich wird es gesprächig, hier mal das Log:

    Live-Protokoll: IPsec-VPN
    Filter:
    Autoscroll
    Reload
    2020:07:02-15:20:57 sg105w pluto[21164]: shutting down interface eth1/eth1 192.168.8.3
    2020:07:02-15:20:57 sg105w pluto[21164]: shutting down interface eth1/eth1 192.168.8.3
    2020:07:02-15:20:57 sg105w pluto[21164]: shutting down interface wlan1/wlan1 192.168.29.1
    2020:07:02-15:20:57 sg105w pluto[21164]: shutting down interface wlan1/wlan1 192.168.29.1
    2020:07:02-15:20:57 sg105w pluto[21164]: shutting down interface wlan0/wlan0 192.168.28.1
    2020:07:02-15:20:57 sg105w pluto[21164]: shutting down interface wlan0/wlan0 192.168.28.1
    2020:07:02-15:20:57 sg105w pluto[21164]: shutting down interface tun0/tun0 10.242.2.1
    2020:07:02-15:20:57 sg105w pluto[21164]: shutting down interface tun0/tun0 10.242.2.1
    2020:07:02-15:20:57 sg105w ipsec_starter[21157]: pluto stopped after 60 ms
    2020:07:02-15:20:58 sg105w ipsec_starter[21157]: ipsec starter stopped
    2020:07:02-15:21:35 sg105w ipsec_starter[21983]: Starting strongSwan 4.4.1git20100610 IPsec [starter]...
    2020:07:02-15:21:35 sg105w pluto[21998]: Starting IKEv1 pluto daemon (strongSwan 4.4.1git20100610) THREADS VENDORID CISCO_QUIRKS
    2020:07:02-15:21:35 sg105w ipsec_starter[21989]: pluto (21998) started after 20 ms
    2020:07:02-15:21:35 sg105w pluto[21998]: loaded plugins: curl ldap aes des blowfish serpent twofish sha1 sha2 md5 random x509 pubkey pkcs1 pgp dnskey pem sqlite hmac gmp xauth attr attr-sql resolve
    2020:07:02-15:21:35 sg105w pluto[21998]: including NAT-Traversal patch (Version 0.6c)
    2020:07:02-15:21:35 sg105w pluto[21998]: Using Linux 2.6 IPsec interface code
    2020:07:02-15:21:35 sg105w pluto[21998]: loading ca certificates from '/etc/ipsec.d/cacerts'
    2020:07:02-15:21:35 sg105w pluto[21998]: loaded ca certificate from '/etc/ipsec.d/cacerts/VPN Signing CA.pem'
    2020:07:02-15:21:35 sg105w pluto[21998]: loading aa certificates from '/etc/ipsec.d/aacerts'
    2020:07:02-15:21:35 sg105w pluto[21998]: loading ocsp certificates from '/etc/ipsec.d/ocspcerts'
    2020:07:02-15:21:35 sg105w pluto[21998]: Changing to directory '/etc/ipsec.d/crls'
    2020:07:02-15:21:35 sg105w pluto[21998]: loading attribute certificates from '/etc/ipsec.d/acerts'
    2020:07:02-15:21:35 sg105w pluto[21998]: adding interface tun0/tun0 10.242.2.1:500
    2020:07:02-15:21:35 sg105w pluto[21998]: adding interface tun0/tun0 10.242.2.1:4500
    2020:07:02-15:21:35 sg105w pluto[21998]: adding interface wlan0/wlan0 192.168.28.1:500
    2020:07:02-15:21:35 sg105w pluto[21998]: adding interface wlan0/wlan0 192.168.28.1:4500
    2020:07:02-15:21:35 sg105w pluto[21998]: adding interface wlan1/wlan1 192.168.29.1:500
    2020:07:02-15:21:35 sg105w pluto[21998]: adding interface wlan1/wlan1 192.168.29.1:4500
    2020:07:02-15:21:35 sg105w pluto[21998]: adding interface eth1/eth1 192.168.8.3:500
    2020:07:02-15:21:35 sg105w pluto[21998]: adding interface eth1/eth1 192.168.8.3:4500
    2020:07:02-15:21:35 sg105w pluto[21998]: adding interface eth0/eth0 192.168.1.1:500
    2020:07:02-15:21:35 sg105w pluto[21998]: adding interface eth0/eth0 192.168.1.1:4500
    2020:07:02-15:21:35 sg105w pluto[21998]: adding interface lo/lo 127.0.0.1:500
    2020:07:02-15:21:35 sg105w pluto[21998]: adding interface lo/lo 127.0.0.1:4500
    2020:07:02-15:21:35 sg105w pluto[21998]: adding interface lo/lo ::1:500
    2020:07:02-15:21:35 sg105w pluto[21998]: loading secrets from "/etc/ipsec.secrets"
    2020:07:02-15:21:35 sg105w pluto[21998]: loaded PSK secret for 93.XXX.YYY.15 remote.XXXXXXX.XX
    2020:07:02-15:21:35 sg105w pluto[21998]: listening for IKE messages
    2020:07:02-15:21:35 sg105w pluto[21998]: added connection description "S_Michi"
    2020:07:02-15:21:35 sg105w pluto[21998]: "S_Michi" #1: initiating Main Mode
    2020:07:02-15:21:36 sg105w pluto[21998]: "S_Michi" #1: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:36 sg105w pluto[21998]: "S_Michi" #1: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:36 sg105w pluto[21998]: "S_Michi" #1: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:36 sg105w pluto[21998]: "S_Michi" #1: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:36 sg105w pluto[21998]: "S_Michi" #1: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:36 sg105w pluto[21998]: "S_Michi" #1: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:36 sg105w pluto[21998]: "S_Michi" #1: enabling possible NAT-traversal with method 3
    2020:07:02-15:21:36 sg105w pluto[21998]: "S_Michi" #1: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:42 sg105w pluto[21998]: "S_Michi" #2: responding to Main Mode
    2020:07:02-15:21:42 sg105w pluto[21998]: "S_Michi" #2: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:42 sg105w pluto[21998]: "S_Michi" #2: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:42 sg105w pluto[21998]: "S_Michi" #2: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:42 sg105w pluto[21998]: "S_Michi" #2: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:42 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:42 sg105w pluto[21998]: "S_Michi" #2: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:42 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:42 sg105w pluto[21998]: "S_Michi" #2: ignoring informational payload, type IPSEC_INITIAL_CONTACT
    2020:07:02-15:21:42 sg105w pluto[21998]: "S_Michi" #2: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:42 sg105w pluto[21998]: "S_Michi" #2: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:42 sg105w pluto[21998]: "S_Michi" #2: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:42 sg105w pluto[21998]: "S_Michi" #3: responding to Main Mode
    2020:07:02-15:21:42 sg105w pluto[21998]: "S_Michi" #3: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:42 sg105w pluto[21998]: "S_Michi" #3: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:42 sg105w pluto[21998]: "S_Michi" #3: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:42 sg105w pluto[21998]: "S_Michi" #3: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:42 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #3: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:43 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #3: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #3: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #3: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #4: responding to Main Mode
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #4: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #4: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #4: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #4: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:43 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #4: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:43 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #4: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #4: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #4: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #5: responding to Main Mode
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #5: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #5: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #5: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:43 sg105w pluto[21998]: "S_Michi" #5: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:43 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #5: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:44 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #5: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #5: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #5: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:44 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:44 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:44 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:44 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:44 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:44 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #6: responding to Main Mode
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #6: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #6: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #6: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #6: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:44 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #6: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:44 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #6: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #6: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #6: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:44 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:44 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:44 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:44 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:44 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:44 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #7: responding to Main Mode
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #7: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #7: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #7: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #7: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:44 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:44 sg105w pluto[21998]: "S_Michi" #7: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:45 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #7: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #7: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #7: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:45 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:45 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:45 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:45 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:45 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:45 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #8: responding to Main Mode
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #8: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #8: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #8: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #8: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:45 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #8: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:45 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #8: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #8: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #8: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:45 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:45 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:45 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:45 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:45 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:45 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #9: responding to Main Mode
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #9: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #9: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #9: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #9: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:45 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:45 sg105w pluto[21998]: "S_Michi" #9: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:46 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #9: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #9: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #9: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:46 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:46 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:46 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:46 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:46 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:46 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #10: responding to Main Mode
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #10: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #10: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #10: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #10: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:46 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #10: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:46 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #10: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #10: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #10: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:46 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:46 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:46 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:46 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:46 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:46 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #11: responding to Main Mode
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #11: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #11: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #11: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:46 sg105w pluto[21998]: "S_Michi" #11: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:46 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #11: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:47 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #11: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #11: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #11: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:47 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:47 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:47 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:47 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:47 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:47 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #12: responding to Main Mode
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #12: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #12: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #12: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #12: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:47 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #12: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:47 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #12: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #12: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #12: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:47 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:47 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:47 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:47 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:47 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:47 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #13: responding to Main Mode
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #13: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #13: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #13: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:47 sg105w pluto[21998]: "S_Michi" #13: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:47 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #13: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:48 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #13: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #13: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #13: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:48 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:48 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:48 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:48 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:48 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:48 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #14: responding to Main Mode
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #14: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #14: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #14: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #14: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:48 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #14: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:48 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #14: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #14: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #14: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:48 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:48 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:48 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:48 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:48 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:48 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #15: responding to Main Mode
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #15: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #15: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #15: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:48 sg105w pluto[21998]: "S_Michi" #15: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:48 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #15: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:49 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #15: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #15: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #15: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:49 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:49 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:49 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:49 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:49 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:49 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #16: responding to Main Mode
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #16: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #16: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #16: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #16: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:49 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #16: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:49 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #16: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #16: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #16: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:49 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:49 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:49 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:49 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:49 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:49 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #17: responding to Main Mode
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #17: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #17: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #17: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:49 sg105w pluto[21998]: "S_Michi" #17: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:49 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #17: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:50 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #17: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #17: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #17: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:50 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:50 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:50 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:50 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:50 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:50 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #18: responding to Main Mode
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #18: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #18: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #18: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #18: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:50 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #18: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:50 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #18: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #18: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #18: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:50 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:50 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:50 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:50 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:50 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:50 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #19: responding to Main Mode
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #19: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #19: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #19: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:50 sg105w pluto[21998]: "S_Michi" #19: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:50 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #19: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:51 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #19: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #19: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #19: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:51 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:51 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:51 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:51 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:51 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:51 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #20: responding to Main Mode
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #20: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #20: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #20: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #20: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:51 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #20: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:51 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #20: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #20: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #20: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:51 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:51 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:51 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:51 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:51 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:51 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #21: responding to Main Mode
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #21: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #21: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #21: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #21: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:51 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:51 sg105w pluto[21998]: "S_Michi" #21: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:52 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #21: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #21: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #21: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:52 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #21: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:21:52 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:52 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:52 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:52 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:52 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:52 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #22: responding to Main Mode
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #22: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #22: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #22: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #22: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #22: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:52 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #22: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #22: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #22: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:52 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:52 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:52 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:52 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:52 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:52 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #23: responding to Main Mode
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #23: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #23: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #23: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #23: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:52 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:52 sg105w pluto[21998]: "S_Michi" #23: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:53 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #23: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #23: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #23: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:53 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:53 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:53 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:53 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:53 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:53 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #24: responding to Main Mode
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #24: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #24: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #24: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #24: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:53 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #24: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:53 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #24: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #24: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #24: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:53 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:53 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:53 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:53 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:53 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:53 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #25: responding to Main Mode
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #25: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #25: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #25: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #25: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:53 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:53 sg105w pluto[21998]: "S_Michi" #25: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:54 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #25: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #25: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #25: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:54 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:54 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:54 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:54 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:54 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:54 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #26: responding to Main Mode
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #26: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #26: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #26: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #26: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:54 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #26: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:54 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #26: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #26: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #26: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:54 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:54 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:54 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:54 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:54 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:54 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #27: responding to Main Mode
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #27: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #27: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #27: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:54 sg105w pluto[21998]: "S_Michi" #27: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:54 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #27: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:55 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #27: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #27: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #27: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:55 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #27: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #27: next payload type of ISAKMP Hash Payload has an unknown value: 150
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #27: malformed payload in packet
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #27: next payload type of ISAKMP Hash Payload has an unknown value: 151
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #27: malformed payload in packet
    2020:07:02-15:21:55 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:55 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:55 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:55 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:55 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:55 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #28: responding to Main Mode
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #28: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #28: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #28: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #28: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #28: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:55 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #28: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #28: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #28: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:55 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:55 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:55 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:55 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:55 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:55 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #29: responding to Main Mode
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #29: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #29: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #29: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:55 sg105w pluto[21998]: "S_Michi" #29: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:55 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #29: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:56 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #29: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #29: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #29: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:56 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #29: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:21:56 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:56 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:56 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:56 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:56 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:56 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #30: responding to Main Mode
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #30: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #30: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #30: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #30: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #30: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:56 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #30: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #30: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #30: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:56 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:56 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:56 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:56 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:56 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:56 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #31: responding to Main Mode
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #31: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #31: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #31: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:56 sg105w pluto[21998]: "S_Michi" #31: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:56 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #31: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:57 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #31: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #31: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #31: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:57 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #31: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #31: next payload type of ISAKMP Hash Payload has an unknown value: 143
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #31: malformed payload in packet
    2020:07:02-15:21:57 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:57 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:57 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:57 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:57 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:57 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #32: responding to Main Mode
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #32: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #32: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #32: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #32: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #32: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:57 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #32: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #32: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #32: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:57 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:57 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:57 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:57 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:57 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:57 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #33: responding to Main Mode
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #33: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #33: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #33: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:57 sg105w pluto[21998]: "S_Michi" #33: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:57 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #33: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:58 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #33: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #33: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #33: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:58 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #33: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #33: next payload type of ISAKMP Hash Payload has an unknown value: 230
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #33: malformed payload in packet
    2020:07:02-15:21:58 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:58 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:58 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:58 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:58 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:58 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #34: responding to Main Mode
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #34: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #34: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #34: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #34: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #34: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:58 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #34: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #34: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #34: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:58 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:58 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:58 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:58 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:58 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:58 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #35: responding to Main Mode
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #35: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #35: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #35: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:58 sg105w pluto[21998]: "S_Michi" #35: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:58 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #35: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:59 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #35: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #35: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #35: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:59 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #35: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #35: next payload type of ISAKMP Hash Payload has an unknown value: 102
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #35: malformed payload in packet
    2020:07:02-15:21:59 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:59 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:59 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:59 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:59 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:59 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #36: responding to Main Mode
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #36: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #36: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #36: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #36: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #36: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:21:59 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #36: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #36: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #36: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:21:59 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:21:59 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:21:59 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:21:59 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:21:59 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:21:59 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #37: responding to Main Mode
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #37: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #37: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #37: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:59 sg105w pluto[21998]: "S_Michi" #37: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:21:59 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #37: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:00 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #37: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #37: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #37: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:00 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #37: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #37: next payload type of ISAKMP Hash Payload has an unknown value: 29
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #37: malformed payload in packet
    2020:07:02-15:22:00 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:00 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:00 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:00 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:00 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:00 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #38: responding to Main Mode
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #38: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #38: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #38: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #38: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #38: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:00 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #38: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #38: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #38: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:00 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:00 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:00 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:00 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:00 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:00 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #39: responding to Main Mode
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #39: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #39: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #39: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #39: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:00 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:00 sg105w pluto[21998]: "S_Michi" #39: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:01 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #39: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #39: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #39: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:01 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #39: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #39: next payload type of ISAKMP Hash Payload has an unknown value: 56
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #39: malformed payload in packet
    2020:07:02-15:22:01 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:01 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:01 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:01 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:01 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:01 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #40: responding to Main Mode
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #40: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #40: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #40: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #40: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #40: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:01 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #40: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #40: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #40: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:01 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:01 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:01 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:01 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:01 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:01 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #41: responding to Main Mode
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #41: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #41: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #41: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #41: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:01 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:01 sg105w pluto[21998]: "S_Michi" #41: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:02 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #41: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #41: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #41: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:02 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #41: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #41: next payload type of ISAKMP Hash Payload has an unknown value: 60
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #41: malformed payload in packet
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #41: next payload type of ISAKMP Hash Payload has an unknown value: 77
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #41: malformed payload in packet
    2020:07:02-15:22:02 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:02 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:02 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:02 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:02 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:02 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #42: responding to Main Mode
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #42: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #42: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #42: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #42: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #42: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:02 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #42: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #42: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #42: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:02 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:02 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:02 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:02 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:02 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:02 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #43: responding to Main Mode
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #43: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #43: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #43: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #43: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:02 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:02 sg105w pluto[21998]: "S_Michi" #43: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:03 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #43: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #43: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #43: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:03 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:03 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:03 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:03 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:03 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:03 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #44: responding to Main Mode
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #44: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #44: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #44: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #44: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:03 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #44: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:03 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #44: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #44: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #44: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:03 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:03 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:03 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:03 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:03 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:03 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #45: responding to Main Mode
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #45: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #45: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #45: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #45: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:03 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:03 sg105w pluto[21998]: "S_Michi" #45: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:04 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #45: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #45: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #45: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:04 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:04 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:04 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:04 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:04 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:04 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #46: responding to Main Mode
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #46: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #46: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #46: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #46: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:04 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #46: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:04 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #46: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #46: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #46: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:04 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:04 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:04 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:04 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:04 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:04 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #47: responding to Main Mode
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #47: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #47: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #47: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #47: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:04 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:04 sg105w pluto[21998]: "S_Michi" #47: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:05 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #47: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #47: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #47: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:05 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:05 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:05 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:05 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:05 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:05 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #48: responding to Main Mode
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #48: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #48: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #48: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #48: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:05 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #48: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:05 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #48: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #48: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #48: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:05 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:05 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:05 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:05 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:05 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:05 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #49: responding to Main Mode
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #49: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #49: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #49: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #49: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:05 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:05 sg105w pluto[21998]: "S_Michi" #49: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:06 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #49: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #49: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #49: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:06 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:06 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:06 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:06 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:06 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:06 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #50: responding to Main Mode
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #50: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #50: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #50: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #50: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:06 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #50: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:06 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #50: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #50: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #50: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:06 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:06 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:06 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:06 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:06 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:06 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #51: responding to Main Mode
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #51: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #51: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #51: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #51: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:06 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:06 sg105w pluto[21998]: "S_Michi" #51: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:07 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #51: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #51: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #51: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:07 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:07 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:07 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:07 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:07 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:07 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #52: responding to Main Mode
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #52: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #52: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #52: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #52: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:07 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #52: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:07 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #52: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #52: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #52: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:07 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:07 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:07 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:07 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:07 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:07 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #53: responding to Main Mode
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #53: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #53: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #53: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #53: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:07 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:07 sg105w pluto[21998]: "S_Michi" #53: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:08 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #53: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #53: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #53: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:08 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:08 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:08 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:08 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:08 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:08 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #54: responding to Main Mode
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #54: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #54: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #54: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #54: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:08 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #54: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:08 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #54: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #54: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #54: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:08 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:08 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:08 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:08 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:08 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:08 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #55: responding to Main Mode
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #55: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #55: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #55: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #55: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:08 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:08 sg105w pluto[21998]: "S_Michi" #55: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:09 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #55: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #55: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #55: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:09 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:09 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:09 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:09 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:09 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:09 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #56: responding to Main Mode
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #56: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #56: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #56: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #56: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:09 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #56: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:09 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #56: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #56: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #56: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:09 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:09 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:09 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:09 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:09 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:09 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #57: responding to Main Mode
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #57: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #57: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #57: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #57: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:09 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:09 sg105w pluto[21998]: "S_Michi" #57: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:10 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #57: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #57: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #57: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:10 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:10 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:10 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:10 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:10 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:10 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #58: responding to Main Mode
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #58: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #58: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #58: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #58: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:10 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #58: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:10 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #58: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #58: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #58: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:10 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:10 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:10 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:10 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:10 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:10 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #59: responding to Main Mode
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #59: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #59: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #59: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #59: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:10 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #59: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:10 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #59: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #59: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:10 sg105w pluto[21998]: "S_Michi" #59: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #60: responding to Main Mode
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #60: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #60: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #60: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #60: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:11 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #60: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:11 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #60: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #60: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #60: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #61: responding to Main Mode
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #61: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #61: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #61: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #61: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:11 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #61: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:11 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #61: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #61: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #61: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:11 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #62: responding to Main Mode
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #62: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #62: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #62: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:11 sg105w pluto[21998]: "S_Michi" #62: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:11 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #62: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:12 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #62: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #62: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #62: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:12 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #62: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #62: byte 2 of ISAKMP Hash Payload must be zero, but is not
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #62: malformed payload in packet
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #62: next payload type of ISAKMP Hash Payload has an unknown value: 199
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #62: malformed payload in packet
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #62: next payload type of ISAKMP Hash Payload has an unknown value: 153
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #62: malformed payload in packet
    2020:07:02-15:22:12 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:12 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:12 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:12 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:12 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:12 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #63: responding to Main Mode
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #63: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #63: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #63: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #63: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #63: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:12 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #63: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #63: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #63: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:12 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:12 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:12 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:12 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:12 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:12 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #64: responding to Main Mode
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #64: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #64: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #64: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:12 sg105w pluto[21998]: "S_Michi" #64: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:12 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #64: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:13 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #64: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #64: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #64: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:13 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #64: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #64: next payload type of ISAKMP Hash Payload has an unknown value: 90
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #64: malformed payload in packet
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #64: next payload type of ISAKMP Hash Payload has an unknown value: 241
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #64: malformed payload in packet
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #64: next payload type of ISAKMP Hash Payload has an unknown value: 251
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #64: malformed payload in packet
    2020:07:02-15:22:13 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:13 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:13 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:13 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:13 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:13 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #65: responding to Main Mode
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #65: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #65: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #65: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #65: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #65: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:13 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #65: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #65: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #65: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:13 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:13 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:13 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:13 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:13 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:13 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #66: responding to Main Mode
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #66: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #66: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #66: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:13 sg105w pluto[21998]: "S_Michi" #66: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:13 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #66: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:14 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #66: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #66: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #66: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:14 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #66: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #66: next payload type of ISAKMP Hash Payload has an unknown value: 250
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #66: malformed payload in packet
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #66: next payload type of ISAKMP Hash Payload has an unknown value: 214
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #66: malformed payload in packet
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #66: next payload type of ISAKMP Hash Payload has an unknown value: 220
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #66: malformed payload in packet
    2020:07:02-15:22:14 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:14 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:14 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:14 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:14 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:14 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #67: responding to Main Mode
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #67: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #67: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #67: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #67: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #67: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:14 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #67: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #67: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #67: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:14 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:14 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:14 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:14 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:14 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:14 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #68: responding to Main Mode
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #68: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #68: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #68: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:14 sg105w pluto[21998]: "S_Michi" #68: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:14 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #68: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:15 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #68: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #68: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #68: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:15 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #68: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #68: byte 2 of ISAKMP Hash Payload must be zero, but is not
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #68: malformed payload in packet
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #68: next payload type of ISAKMP Hash Payload has an unknown value: 104
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #68: malformed payload in packet
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #68: next payload type of ISAKMP Hash Payload has an unknown value: 166
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #68: malformed payload in packet
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #68: next payload type of ISAKMP Hash Payload has an unknown value: 192
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #68: malformed payload in packet
    2020:07:02-15:22:15 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:15 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:15 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:15 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:15 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:15 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #69: responding to Main Mode
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #69: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #69: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #69: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #69: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #69: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:15 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #69: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #69: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #69: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:15 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:15 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:15 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:15 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:15 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:15 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #70: responding to Main Mode
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #70: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #70: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #70: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:15 sg105w pluto[21998]: "S_Michi" #70: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:15 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #70: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:16 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #70: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #70: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #70: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:16 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #70: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #70: next payload type of ISAKMP Hash Payload has an unknown value: 67
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #70: malformed payload in packet
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #70: next payload type of ISAKMP Hash Payload has an unknown value: 210
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #70: malformed payload in packet
    2020:07:02-15:22:16 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:16 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:16 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:16 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:16 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:16 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #71: responding to Main Mode
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #71: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #71: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #71: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #71: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #71: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:16 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #71: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #71: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #71: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:16 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:16 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:16 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:16 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:16 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:16 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #72: responding to Main Mode
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #72: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #72: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #72: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:16 sg105w pluto[21998]: "S_Michi" #72: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:16 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #72: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:17 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #72: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #72: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #72: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:17 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #72: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #72: next payload type of ISAKMP Hash Payload has an unknown value: 157
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #72: malformed payload in packet
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #72: next payload type of ISAKMP Hash Payload has an unknown value: 65
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #72: malformed payload in packet
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #72: next payload type of ISAKMP Hash Payload has an unknown value: 254
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #72: malformed payload in packet
    2020:07:02-15:22:17 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:17 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:17 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:17 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:17 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:17 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #73: responding to Main Mode
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #73: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #73: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #73: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #73: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #73: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:17 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #73: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #73: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #73: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:17 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:17 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:17 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:17 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:17 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:17 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #74: responding to Main Mode
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #74: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #74: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #74: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #74: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:17 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:17 sg105w pluto[21998]: "S_Michi" #74: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:18 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #74: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #74: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #74: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:18 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:18 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:18 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:18 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:18 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:18 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #75: responding to Main Mode
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #75: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #75: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #75: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #75: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:18 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #75: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:18 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #75: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #75: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #75: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:18 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:18 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:18 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:18 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:18 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:18 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #76: responding to Main Mode
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #76: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #76: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #76: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #76: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:18 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:18 sg105w pluto[21998]: "S_Michi" #76: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:19 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #76: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #76: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #76: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:19 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:19 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:19 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:19 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:19 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:19 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #77: responding to Main Mode
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #77: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #77: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #77: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #77: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:19 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #77: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:19 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #77: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #77: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #77: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:19 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:19 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:19 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:19 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:19 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:19 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #78: responding to Main Mode
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #78: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #78: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #78: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #78: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:19 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:19 sg105w pluto[21998]: "S_Michi" #78: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:20 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #78: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #78: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #78: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:20 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:20 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:20 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:20 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:20 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:20 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #79: responding to Main Mode
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #79: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #79: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #79: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #79: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:20 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #79: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:20 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #79: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #79: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #79: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:20 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:20 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:20 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:20 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:20 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:20 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #80: responding to Main Mode
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #80: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #80: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #80: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #80: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:20 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:20 sg105w pluto[21998]: "S_Michi" #80: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:21 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #80: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #80: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #80: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:21 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:21 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:21 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:21 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:21 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:21 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #81: responding to Main Mode
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #81: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #81: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #81: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #81: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:21 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #81: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:21 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #81: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #81: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #81: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:21 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:21 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:21 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:21 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:21 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:21 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #82: responding to Main Mode
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #82: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #82: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #82: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #82: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:21 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:21 sg105w pluto[21998]: "S_Michi" #82: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:22 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #82: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #82: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #82: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:22 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:22 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:22 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:22 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:22 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:22 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #83: responding to Main Mode
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #83: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #83: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #83: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #83: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:22 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #83: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:22 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #83: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #83: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #83: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:22 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:22 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:22 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:22 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:22 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:22 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #84: responding to Main Mode
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #84: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #84: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #84: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #84: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:22 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:22 sg105w pluto[21998]: "S_Michi" #84: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:23 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #84: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #84: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #84: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:23 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:23 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:23 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:23 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:23 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:23 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #85: responding to Main Mode
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #85: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #85: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #85: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #85: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:23 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #85: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:23 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #85: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #85: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #85: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:23 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:23 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:23 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:23 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:23 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:23 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #86: responding to Main Mode
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #86: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #86: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #86: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #86: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:23 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:23 sg105w pluto[21998]: "S_Michi" #86: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:24 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #86: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #86: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #86: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:24 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:24 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:24 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:24 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:24 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:24 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #87: responding to Main Mode
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #87: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #87: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #87: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #87: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:24 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #87: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:24 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #87: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #87: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #87: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:24 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:24 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:24 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:24 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:24 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:24 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #88: responding to Main Mode
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #88: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #88: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #88: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #88: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:24 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #88: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:24 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #88: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #88: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:24 sg105w pluto[21998]: "S_Michi" #88: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #89: responding to Main Mode
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #89: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #89: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #89: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #89: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:25 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #89: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:25 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #89: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #89: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #89: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #90: responding to Main Mode
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #90: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #90: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #90: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #90: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:25 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #90: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:25 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #90: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #90: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #90: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:25 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #91: responding to Main Mode
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #91: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #91: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #91: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:25 sg105w pluto[21998]: "S_Michi" #91: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:25 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #91: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:26 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #91: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #91: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #91: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:26 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #91: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #91: next payload type of ISAKMP Hash Payload has an unknown value: 198
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #91: malformed payload in packet
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #91: next payload type of ISAKMP Hash Payload has an unknown value: 177
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #91: malformed payload in packet
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #91: next payload type of ISAKMP Hash Payload has an unknown value: 193
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #91: malformed payload in packet
    2020:07:02-15:22:26 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:26 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:26 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:26 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:26 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:26 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #92: responding to Main Mode
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #92: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #92: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #92: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #92: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #92: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:26 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #92: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #92: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #92: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:26 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:26 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:26 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:26 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:26 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:26 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #93: responding to Main Mode
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #93: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #93: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #93: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:26 sg105w pluto[21998]: "S_Michi" #93: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:26 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #93: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:27 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #93: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #93: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #93: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:27 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #93: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #93: next payload type of ISAKMP Hash Payload has an unknown value: 167
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #93: malformed payload in packet
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #93: next payload type of ISAKMP Hash Payload has an unknown value: 47
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #93: malformed payload in packet
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #93: next payload type of ISAKMP Hash Payload has an unknown value: 151
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #93: malformed payload in packet
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #93: next payload type of ISAKMP Hash Payload has an unknown value: 203
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #93: malformed payload in packet
    2020:07:02-15:22:27 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:27 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:27 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:27 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:27 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:27 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #94: responding to Main Mode
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #94: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #94: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #94: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #94: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #94: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:27 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #94: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #94: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #94: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:27 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:27 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:27 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:27 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:27 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:27 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #95: responding to Main Mode
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #95: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #95: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #95: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:27 sg105w pluto[21998]: "S_Michi" #95: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:27 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #95: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:28 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #95: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #95: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #95: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:28 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #95: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #95: next payload type of ISAKMP Hash Payload has an unknown value: 164
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #95: malformed payload in packet
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #95: byte 2 of ISAKMP Hash Payload must be zero, but is not
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #95: malformed payload in packet
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #95: next payload type of ISAKMP Hash Payload has an unknown value: 158
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #95: malformed payload in packet
    2020:07:02-15:22:28 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:28 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:28 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:28 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:28 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:28 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #96: responding to Main Mode
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #96: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #96: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #96: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #96: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #96: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:28 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #96: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #96: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #96: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:28 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:28 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:28 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:28 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:28 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:28 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #97: responding to Main Mode
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #97: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #97: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #97: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:28 sg105w pluto[21998]: "S_Michi" #97: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:28 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #97: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:29 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #97: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #97: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #97: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:29 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #97: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #97: next payload type of ISAKMP Hash Payload has an unknown value: 225
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #97: malformed payload in packet
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #97: next payload type of ISAKMP Hash Payload has an unknown value: 88
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #97: malformed payload in packet
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #97: next payload type of ISAKMP Hash Payload has an unknown value: 193
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #97: malformed payload in packet
    2020:07:02-15:22:29 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:29 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:29 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:29 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:29 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:29 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #98: responding to Main Mode
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #98: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #98: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #98: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #98: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #98: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:29 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #98: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #98: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #98: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:29 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:29 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:29 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:29 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:29 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:29 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #99: responding to Main Mode
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #99: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #99: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #99: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:29 sg105w pluto[21998]: "S_Michi" #99: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:29 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #99: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:30 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #99: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #99: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #99: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:30 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #99: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #99: next payload type of ISAKMP Hash Payload has an unknown value: 86
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #99: malformed payload in packet
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #99: next payload type of ISAKMP Hash Payload has an unknown value: 149
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #99: malformed payload in packet
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #99: next payload type of ISAKMP Hash Payload has an unknown value: 211
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #99: malformed payload in packet
    2020:07:02-15:22:30 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:30 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:30 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:30 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:30 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:30 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #100: responding to Main Mode
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #100: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #100: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #100: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #100: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #100: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:30 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #100: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #100: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #100: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:30 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:30 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:30 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:30 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:30 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:30 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #101: responding to Main Mode
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #101: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #101: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #101: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:30 sg105w pluto[21998]: "S_Michi" #101: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:30 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #101: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:31 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #101: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #101: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #101: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:31 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #101: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #101: next payload type of ISAKMP Hash Payload has an unknown value: 43
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #101: malformed payload in packet
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #101: byte 2 of ISAKMP Hash Payload must be zero, but is not
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #101: malformed payload in packet
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #101: next payload type of ISAKMP Hash Payload has an unknown value: 52
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #101: malformed payload in packet
    2020:07:02-15:22:31 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:31 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:31 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:31 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:31 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:31 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #102: responding to Main Mode
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #102: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #102: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #102: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #102: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #102: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:31 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #102: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #102: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #102: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:31 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:31 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:31 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:31 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:31 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:31 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #103: responding to Main Mode
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #103: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #103: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #103: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #103: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:31 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:31 sg105w pluto[21998]: "S_Michi" #103: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:32 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #103: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #103: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #103: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:32 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #103: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #103: byte 2 of ISAKMP Hash Payload must be zero, but is not
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #103: malformed payload in packet
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #103: next payload type of ISAKMP Hash Payload has an unknown value: 63
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #103: malformed payload in packet
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #103: next payload type of ISAKMP Hash Payload has an unknown value: 237
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #103: malformed payload in packet
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #103: next payload type of ISAKMP Hash Payload has an unknown value: 220
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #103: malformed payload in packet
    2020:07:02-15:22:32 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:32 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:32 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:32 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:32 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:32 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #104: responding to Main Mode
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #104: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #104: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #104: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #104: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #104: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:32 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #104: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #104: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #104: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:32 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:32 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:32 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:32 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:32 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:32 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #105: responding to Main Mode
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #105: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #105: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #105: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #105: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:32 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:32 sg105w pluto[21998]: "S_Michi" #105: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:33 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #105: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #105: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #105: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:33 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #105: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #105: next payload type of ISAKMP Hash Payload has an unknown value: 34
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #105: malformed payload in packet
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #105: byte 2 of ISAKMP Hash Payload must be zero, but is not
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #105: malformed payload in packet
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #105: next payload type of ISAKMP Hash Payload has an unknown value: 136
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #105: malformed payload in packet
    2020:07:02-15:22:33 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:33 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:33 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:33 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:33 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:33 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #106: responding to Main Mode
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #106: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #106: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #106: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #106: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #106: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:33 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #106: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #106: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #106: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:33 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:33 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:33 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:33 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:33 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:33 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #107: responding to Main Mode
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #107: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #107: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #107: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #107: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:33 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:33 sg105w pluto[21998]: "S_Michi" #107: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:34 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #107: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #107: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #107: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:34 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:34 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:34 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:34 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:34 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:34 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #108: responding to Main Mode
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #108: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #108: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #108: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #108: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:34 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #108: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:34 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #108: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #108: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #108: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:34 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:34 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:34 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:34 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:34 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:34 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #109: responding to Main Mode
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #109: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #109: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #109: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #109: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:34 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:34 sg105w pluto[21998]: "S_Michi" #109: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:35 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #109: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #109: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #109: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:35 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:35 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:35 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:35 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:35 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:35 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #110: responding to Main Mode
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #110: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #110: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #110: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #110: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:35 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #110: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:35 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #110: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #110: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #110: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:35 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:35 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:35 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:35 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:35 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:35 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #111: responding to Main Mode
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #111: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #111: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #111: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #111: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:35 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:35 sg105w pluto[21998]: "S_Michi" #111: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:36 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #111: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #111: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #111: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:36 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:36 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:36 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:36 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:36 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:36 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #112: responding to Main Mode
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #112: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #112: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #112: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #112: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:36 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #112: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:36 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #112: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #112: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #112: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:36 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:36 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:36 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:36 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:36 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:36 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #113: responding to Main Mode
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #113: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #113: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #113: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #113: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:36 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:36 sg105w pluto[21998]: "S_Michi" #113: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:37 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #113: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #113: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #113: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:37 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:37 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:37 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:37 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:37 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:37 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #114: responding to Main Mode
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #114: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #114: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #114: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #114: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:37 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #114: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:37 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #114: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #114: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #114: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:37 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:37 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:37 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:37 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:37 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:37 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #115: responding to Main Mode
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #115: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #115: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #115: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #115: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:37 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:37 sg105w pluto[21998]: "S_Michi" #115: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:38 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #115: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #115: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #115: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:38 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:38 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:38 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:38 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:38 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:38 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #116: responding to Main Mode
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #116: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #116: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #116: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #116: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:38 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #116: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:38 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #116: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #116: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #116: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:38 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:38 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:38 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:38 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:38 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:38 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #117: responding to Main Mode
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #117: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #117: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #117: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #117: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:38 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:38 sg105w pluto[21998]: "S_Michi" #117: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:39 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #117: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #117: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #117: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:39 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:39 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:39 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:39 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:39 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:39 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #118: responding to Main Mode
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #118: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #118: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #118: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #118: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:39 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #118: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:39 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #118: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #118: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #118: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:39 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:39 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:39 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:39 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:39 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:39 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #119: responding to Main Mode
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #119: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #119: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #119: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #119: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:39 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:39 sg105w pluto[21998]: "S_Michi" #119: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:40 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #119: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #119: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #119: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:40 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:40 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:40 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:40 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:40 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:40 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #120: responding to Main Mode
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #120: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #120: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #120: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #120: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:40 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #120: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:40 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #120: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #120: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #120: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:40 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:40 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:40 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:40 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:40 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:40 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #121: responding to Main Mode
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #121: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #121: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #121: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #121: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:40 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:40 sg105w pluto[21998]: "S_Michi" #121: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:41 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #121: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #121: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #121: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:41 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:41 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:41 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:41 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:41 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:41 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #122: responding to Main Mode
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #122: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #122: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #122: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #122: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:41 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #122: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:41 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #122: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #122: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #122: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:41 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:41 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:41 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:41 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:41 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:41 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #123: responding to Main Mode
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #123: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #123: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #123: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #123: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:41 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #123: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:41 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #123: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #123: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:41 sg105w pluto[21998]: "S_Michi" #123: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #124: responding to Main Mode
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #124: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #124: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #124: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #124: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:42 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #124: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:42 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #124: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #124: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #124: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #125: responding to Main Mode
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #125: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #125: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #125: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #125: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:42 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #125: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:42 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #125: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #125: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #125: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:42 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #126: responding to Main Mode
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #126: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #126: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #126: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:42 sg105w pluto[21998]: "S_Michi" #126: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:42 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #126: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:43 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #126: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #126: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #126: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:43 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #126: ignoring Delete SA payload: ISAKMP SA not established
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #126: next payload type of ISAKMP Hash Payload has an unknown value: 201
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #126: malformed payload in packet
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #126: next payload type of ISAKMP Hash Payload has an unknown value: 126
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #126: malformed payload in packet
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #126: next payload type of ISAKMP Hash Payload has an unknown value: 175
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #126: malformed payload in packet
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #126: next payload type of ISAKMP Hash Payload has an unknown value: 57
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #126: malformed payload in packet
    2020:07:02-15:22:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #127: responding to Main Mode
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #127: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #127: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #127: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #127: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #127: NAT-Traversal: Result using RFC 3947: i am NATed
    2020:07:02-15:22:43 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:500/4500)
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #127: Peer ID is ID_FQDN: 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #127: no suitable connection for peer 'x7ckv5XXXXXXX.myfritz.net'
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #127: sending encrypted notification INVALID_ID_INFORMATION to 93.XXX.YYY.204:4500
    2020:07:02-15:22:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [XAUTH]
    2020:07:02-15:22:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [Dead Peer Detection]
    2020:07:02-15:22:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: received Vendor ID payload [RFC 3947]
    2020:07:02-15:22:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
    2020:07:02-15:22:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
    2020:07:02-15:22:43 sg105w pluto[21998]: packet from 93.XXX.YYY.204:500: ignoring Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #128: responding to Main Mode
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #128: Oakley Transform [AES_CBC (256), HMAC_SHA2_512, MODP_1024] refused due to strict flag
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #128: Oakley Transform [AES_CBC (256), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #128: Oakley Transform [AES_CBC (192), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:43 sg105w pluto[21998]: "S_Michi" #128: Oakley Transform [AES_CBC (128), HMAC_SHA1, MODP_1024] refused due to strict flag
    2020:07:02-15:22:43 sg105w pluto[21998]: | NAT-T: new mapping 93.XXX.YYY.204:4500/500)
     
    Gruß Michael
  • JUHU!

    VPN-ID ist dein Freund ;-)

     

    aber noch kein Zugriff - wahrscheinlich noch eine NAT-Regel oder so..?

     

    Grüße Michael

  • Also mir wären da noch zu viele "abgelehnt wg. strict flag" meldungen.

    Evtl. kommt Phase 2 deswegen nicht hoch.

    In den IPSec-Settings ist irgendwo der Haken für "strict".

    ansonsten ... Nat sollte nicht nötig sein.

    Wenn FB und Sophos in beiden Netzen das Gateway sind... und keine weiteren Routing-Instanzen existieren....

    Guck mal unter support/advanced/route table ... steht das das netz hinder der FB drin?

    Pinge mal das Interface der FB in einem anderen Netz.

     


    Dirk

    Systema Gesellschaft für angewandte Datentechnik mbH  // Sophos Platinum Partner
    Sophos Solution Partner since 2003
    If a post solves your question, click the 'Verify Answer' link at this post.