I've just noticed that this only works on my android device, and isn't working in Mac.
Here is the /var/log/auth.log while trying to connect externally from my Mac.
Code: Select all
Jul 11 17:01:02 raspberrypi pluto[2204]: packet from 198.228.221.126:51368: received Vendor ID payload [RFC 3947] method set to=109
Jul 11 17:01:02 raspberrypi pluto[2204]: packet from 198.228.221.126:51368: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
Jul 11 17:01:02 raspberrypi pluto[2204]: packet from 198.228.221.126:51368: ignoring unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
Jul 11 17:01:02 raspberrypi pluto[2204]: packet from 198.228.221.126:51368: ignoring unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
Jul 11 17:01:02 raspberrypi pluto[2204]: packet from 198.228.221.126:51368: ignoring unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
Jul 11 17:01:02 raspberrypi pluto[2204]: packet from 198.228.221.126:51368: ignoring unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
Jul 11 17:01:02 raspberrypi pluto[2204]: packet from 198.228.221.126:51368: ignoring unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
Jul 11 17:01:02 raspberrypi pluto[2204]: packet from 198.228.221.126:51368: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 110
Jul 11 17:01:02 raspberrypi pluto[2204]: packet from 198.228.221.126:51368: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 110
Jul 11 17:01:02 raspberrypi pluto[2204]: packet from 198.228.221.126:51368: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 110
Jul 11 17:01:02 raspberrypi pluto[2204]: packet from 198.228.221.126:51368: ignoring Vendor ID payload [FRAGMENTATION 80000000]
Jul 11 17:01:02 raspberrypi pluto[2204]: packet from 198.228.221.126:51368: received Vendor ID payload [Dead Peer Detection]
Jul 11 17:01:02 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: responding to Main Mode from unknown peer 198.228.221.126
Jul 11 17:01:02 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: transition from state STATE_MAIN_R0 to state STATE_MAIN_R1
Jul 11 17:01:02 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: STATE_MAIN_R1: sent MR1, expecting MI2
Jul 11 17:01:02 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: NAT-Traversal: Result using draft-ietf-ipsec-nat-t-ike (MacOS X): both are NATed
Jul 11 17:01:02 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: transition from state STATE_MAIN_R1 to state STATE_MAIN_R2
Jul 11 17:01:02 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: STATE_MAIN_R2: sent MR2, expecting MI3
Jul 11 17:01:02 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: ignoring informational payload, type IPSEC_INITIAL_CONTACT msgid=00000000
Jul 11 17:01:02 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: Main mode peer ID is ID_IPV4_ADDR: '192.168.43.185'
Jul 11 17:01:02 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: transition from state STATE_MAIN_R2 to state STATE_MAIN_R3
Jul 11 17:01:02 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: new NAT mapping for #30, was 198.228.221.126:51368, now 198.228.221.126:44334
Jul 11 17:01:02 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: STATE_MAIN_R3: sent MR3, ISAKMP SA established {auth=OAKLEY_PRESHARED_KEY cipher=aes_256 prf=oakley_sha group=modp1024}
Jul 11 17:01:02 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: Dead Peer Detection (RFC 3706): enabled
Jul 11 17:01:03 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: Applying workaround for Mac OS X NAT-OA bug, ignoring proposed subnet
Jul 11 17:01:03 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: the peer proposed: 76.174.184.215/32:17/1701 -> 198.228.221.126/32:17/63904
Jul 11 17:01:03 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #31: responding to Quick Mode proposal {msgid:e199448a}
Jul 11 17:01:03 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #31: us: 192.168.0.121<192.168.0.121>[+S=C]:17/1701
Jul 11 17:01:03 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #31: them: 198.228.221.126[192.168.43.185,+S=C]:17/63904
Jul 11 17:01:03 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #31: transition from state STATE_QUICK_R0 to state STATE_QUICK_R1
Jul 11 17:01:03 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #31: STATE_QUICK_R1: sent QR1, inbound IPsec SA installed, expecting QI2
Jul 11 17:01:04 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #31: Dead Peer Detection (RFC 3706): enabled
Jul 11 17:01:04 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #31: transition from state STATE_QUICK_R1 to state STATE_QUICK_R2
Jul 11 17:01:04 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #31: STATE_QUICK_R2: IPsec SA established transport mode {ESP/NAT=>0x01cacf45 <0xf6b02309 xfrm=AES_256-HMAC_SHA1 NATOA=none NATD=198.228.221.126:44334 DPD=enabled}
Jul 11 17:01:05 raspberrypi pluto[2204]: initiate on demand from 192.168.0.121:1701 to 198.228.221.126:56672 proto=17 state: fos_start because: acquire
Jul 11 17:01:23 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: received Delete SA(0x01cacf45) payload: deleting IPSEC State #31
Jul 11 17:01:24 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: received and ignored informational message
Jul 11 17:01:24 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #30: received Delete SA payload: deleting ISAKMP State #30
Jul 11 17:01:24 raspberrypi pluto[2204]: packet from 198.228.221.126:44334: received and ignored informational message
Jul 11 17:01:57 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126 #29: max number of retransmissions (2) reached STATE_MAIN_I1. No response (or no acceptable response) to our first IKE message
Jul 11 17:01:57 raspberrypi pluto[2204]: "L2TP-PSK-NAT"[13] 198.228.221.126: deleting connection "L2TP-PSK-NAT" instance with peer 198.228.221.126 {isakmp=#0/ipsec=#0}