Cert cannot be imported on IOS13

Hi,

I had a IKEv2 Roadwarrior setup running, but due to various reasons including change of IP. I had to start from scratch.

I used the same guide as before but now my CA cert is not able to be imported on any IOS/MAC OS device.
Every time I try to import - it says it is not able to import the certificate due to an error.

The guide used is: https://mum.mikrotik.com/presentations/ID19/presentation_7168_1572420263.pdf

I use below code and after signing I import and export as PEM

/certificate add name=CA.rasmus.Kviknet2 country=DK common-name=my public IP subject-alt-nam
e=IP:my public IP key-size=2048 days-valid=799 trusted=yes key-usage=digital-signature,key-encipherment,data-encipherment
,key-cert-sign,crl-sign

What is wrong with this ?

Probably ran into the same issue I did, in that IOS changed some behaviour.
http://forum.mikrotik.com/t/ikev2-ios-cannot-connect/139389/13

I tried Step 1 and 2 and then tried to import that -crt file generated - still not possible :frowning:

Things have changed with iOS 13 and macOS 10.15. Study the link. You can use a tool like CertManEX to create these new types or openssl.

Well finally found the program XCA for Mac that allowed me to create CA and certificates that could be imported.

Now I think I am almost there, but I get a user Authentication error, however I cannot see what the error actually is. It seems like certificates are OK - also If I try to exchange the client certificate with another one, I get a different error.

Any clues ?

18:19:57 ipsec,debug ===== received 604 bytes from 10.10.10.121[500] to 123.456.789.10[500] 
18:19:57 ipsec -> ike2 request, exchange: SA_INIT:0 10.10.10.121[500] 688383669b21e7d0:0000000000000000 
18:19:57 ipsec ike2 respond 
18:19:57 ipsec payload seen: SA (220 bytes) 
18:19:57 ipsec payload seen: KE (264 bytes) 
18:19:57 ipsec payload seen: NONCE (20 bytes) 
18:19:57 ipsec payload seen: NOTIFY (8 bytes) 
18:19:57 ipsec payload seen: NOTIFY (28 bytes) 
18:19:57 ipsec payload seen: NOTIFY (28 bytes) 
18:19:57 ipsec payload seen: NOTIFY (8 bytes) 
18:19:57 ipsec processing payload: NONCE 
18:19:57 ipsec processing payload: SA 
18:19:57 ipsec IKE Protocol: IKE 
18:19:57 ipsec  proposal #1 
18:19:57 ipsec   enc: aes256-cbc 
18:19:57 ipsec   prf: hmac-sha256 
18:19:57 ipsec   auth: sha256 
18:19:57 ipsec   dh: modp2048 
18:19:57 ipsec  proposal #2 
18:19:57 ipsec   enc: aes256-cbc 
18:19:57 ipsec   prf: hmac-sha256 
18:19:57 ipsec   auth: sha256 
18:19:57 ipsec   dh: ecp256 
18:19:57 ipsec  proposal #3 
18:19:57 ipsec   enc: aes256-cbc 
18:19:57 ipsec   prf: hmac-sha256 
18:19:57 ipsec   auth: sha256 
18:19:57 ipsec   dh: modp1536 
18:19:57 ipsec  proposal #4 
18:19:57 ipsec   enc: aes128-cbc 
18:19:57 ipsec   prf: hmac-sha1 
18:19:57 ipsec   auth: sha1 
18:19:57 ipsec   dh: modp1024 
18:19:57 ipsec  proposal #5 
18:19:57 ipsec   enc: 3des-cbc 
18:19:57 ipsec   prf: hmac-sha1 
18:19:57 ipsec   auth: sha1 
18:19:57 ipsec   dh: modp1024 
18:19:57 ipsec matched proposal: 
18:19:57 ipsec  proposal #1 
18:19:57 ipsec   enc: aes256-cbc 
18:19:57 ipsec   prf: hmac-sha256 
18:19:57 ipsec   auth: sha256 
18:19:57 ipsec   dh: modp2048 
18:19:57 ipsec processing payload: KE 
18:19:58 ipsec,debug => shared secret (size 0x100) 
18:19:58 ipsec,debug 9a5f3f97 adcf2174 d18a05db 15355e9c 6d8c5334 16d2422e 736d1ba8 9d11d61a 
18:19:58 ipsec,debug 70c8b481 806c1025 015a0625 c77a60e0 dca712bf f7fba405 8ea40603 e4088414 
18:19:58 ipsec,debug dd99bcab a029df9f 2cb9cf55 6245b495 9247c27a 38534d72 ce489933 50975cf0 
18:19:58 ipsec,debug cd656f9d b3c1cd64 66af84ed a5a518c1 03b6a9f1 99eba689 3f68beb9 f900afb0 
18:19:58 ipsec,debug 129a2b6c 2dcdf24e 538b5e92 823c0a60 1276614e 32d139e2 bf9d7300 51a9ffec 
18:19:58 ipsec,debug 1b27775e 68a1a9b4 e8ba05d9 fa4b4318 3462889a b58cf96a 8551155a 2c21c5cf 
18:19:58 ipsec,debug e25e6990 10788175 994709a1 d7b5daa6 54f5c7b8 b27f14f9 410a2f0b c408c138 
18:19:58 ipsec,debug 953224fa 3dcb3a31 5f2c9140 4e976e36 ba1c7bfa b416a710 e4f868cf 229834ac 
18:19:58 ipsec adding payload: SA 
18:19:58 ipsec,debug => (size 0x30) 
18:19:58 ipsec,debug 00000030 0000002c 01010004 0300000c 0100000c 800e0100 03000008 02000005 
18:19:58 ipsec,debug 03000008 0300000c 00000008 0400000e 
18:19:58 ipsec adding payload: KE 
18:19:58 ipsec,debug => (first 0x100 of 0x108) 
18:19:58 ipsec,debug 00000108 000e0000 fb6d8e2e e0ffc0cb b79fa87f 321fe417 14c339ac 6ce6e1ab 
18:19:58 ipsec,debug 8d16aa25 f55f83f6 359a2a7f 5c402dcf b8e3b6d3 eff6b5b0 a196fa38 edb17e95 
18:19:58 ipsec,debug 4acf6e96 835175ae 6aec4533 de64fe78 2ffac57a 19491c22 f342f2e4 a28fc9fa 
18:19:58 ipsec,debug 9e967646 8543268b 568e9df0 d250c282 1b1f4da5 d0fc957b ca4b62be 0b4c47cb 
18:19:58 ipsec,debug 10bf02b5 9bb13389 57af1526 7d45dd70 729d0080 f5d7a5f6 cf695541 35111386 
18:19:58 ipsec,debug ac9a93de 24d5b4d8 11158322 4285fa76 c16b2573 374e1f67 44762ab0 4bcf41bf 
18:19:58 ipsec,debug 1c0a72b5 6e0a3b82 26a5dbf4 32bd9367 465070e4 8e19a872 5bc1fd6a cad34e79 
18:19:58 ipsec,debug 96aeb363 25a9ccf7 7dfebbe8 09228715 eb3627f2 7d443038 9659d8c5 10b1eb7d 
18:19:58 ipsec adding payload: NONCE 
18:19:58 ipsec,debug => (size 0x1c) 
18:19:58 ipsec,debug 0000001c 2040efec 558951ab 79b3059d 0a36b107 cf584a7e 8ad38c33 
18:19:58 ipsec adding notify: NAT_DETECTION_SOURCE_IP 
18:19:58 ipsec,debug => (size 0x1c) 
18:19:58 ipsec,debug 0000001c 00004004 dd613f6f bb053f98 8436395d c42d9347 1ed7dec5 
18:19:58 ipsec adding notify: NAT_DETECTION_DESTINATION_IP 
18:19:58 ipsec,debug => (size 0x1c) 
18:19:58 ipsec,debug 0000001c 00004005 9501d0f7 99ded462 11ca77ed e7150aa2 adf2da7e 
18:19:58 ipsec adding payload: CERTREQ 
18:19:58 ipsec,debug => (size 0x5) 
18:19:58 ipsec,debug 00000005 04 
18:19:58 ipsec <- ike2 reply, exchange: SA_INIT:0 10.10.10.121[500] 688383669b21e7d0:7aec38c2af1184e6 
18:19:58 ipsec,debug ===== sending 429 bytes from 123.456.789.10[500] to 10.10.10.121[500] 
18:19:58 ipsec,debug 1 times of 429 bytes message will be sent to 10.10.10.121[500] 
18:19:58 ipsec,debug => skeyseed (size 0x20) 
18:19:58 ipsec,debug bdd0f547 f92d686d 877bfe5e 2bf34199 2b000118 83de3b76 f1fe0f78 7a6113cc 
18:19:58 ipsec,debug => keymat (size 0x20) 
18:19:58 ipsec,debug 705cd243 113e3fbb fd8f1666 337aa650 9d0b87ba 09686908 b7ad8bc2 64b1a424 
18:19:58 ipsec,debug => SK_ai (size 0x20) 
18:19:58 ipsec,debug 3ad94323 fa7e3e67 73bb7bfb 6bae2f8e e3d008eb b9e3c63f 2eee36b6 29626454 
18:19:58 ipsec,debug => SK_ar (size 0x20) 
18:19:58 ipsec,debug e0236317 24f3a860 75e4a494 e7971811 3db25bf4 165e1814 f52a08f0 6bfb5e5a 
18:19:58 ipsec,debug => SK_ei (size 0x20) 
18:19:58 ipsec,debug 5b3744cb 08efa478 756ef3e5 1dcc0ea6 749b6ba3 4c6683a3 0c527280 22af9c45 
18:19:58 ipsec,debug => SK_er (size 0x20) 
18:19:58 ipsec,debug 68f71a93 f800e7b7 727eafca 2aa13e77 c344898a 663d8231 ab36c9fe 8f6cfedb 
18:19:58 ipsec,debug => SK_pi (size 0x20) 
18:19:58 ipsec,debug 011fe445 b49b226f 6b32aee7 939f2c3d 6029388a bee539c2 a7077499 dd0ec6fb 
18:19:58 ipsec,debug => SK_pr (size 0x20) 
18:19:58 ipsec,debug e580b5e2 8c7775e1 813a691b 693ef4df 2b3ba505 2aa46403 30acd220 b592eb43 
18:19:58 ipsec,info new ike2 SA (R): 123.456.789.10[500]-10.10.10.121[500] spi:7aec38c2af1184e6:688383669b21e7d0 
18:19:58 ipsec processing payloads: VID (none found) 
18:19:58 ipsec processing payloads: NOTIFY 
18:19:58 ipsec   notify: REDIRECT_SUPPORTED 
18:19:58 ipsec   notify: NAT_DETECTION_SOURCE_IP 
18:19:58 ipsec   notify: NAT_DETECTION_DESTINATION_IP 
18:19:58 ipsec   notify: IKEV2_FRAGMENTATION_SUPPORTED 
18:19:58 ipsec,debug ===== received 1648 bytes from 10.10.10.121[4500] to 212.237.183.55[4500] 
18:19:58 ipsec -> ike2 request, exchange: AUTH:1 10.10.10.121[4500] 688383669b21e7d0:7aec38c2af1184e6 
18:19:58 ipsec peer ports changed: 500 -> 4500 
18:19:58 ipsec payload seen: ENC (1620 bytes) 
18:19:58 ipsec processing payload: ENC 
18:19:58 ipsec,debug => iv (size 0x10) 
18:19:58 ipsec,debug 6de98fef 6ba17f20 b8f89af9 5a323164 
18:19:58 ipsec,debug => plain payload (trimmed) (first 0x100 of 0x62a) 
18:19:58 ipsec,debug 25000015 02000000 6d796970 61642e63 6c69656e 74290003 71043082 03683082 
18:19:58 ipsec,debug 0250a003 02010202 087d5194 d120e820 0a300d06 092a8648 86f70d01 010b0500 
18:19:58 ipsec,debug 3075310b 30090603 55040613 02444b31 0b300906 03550408 1302444b 310e300c 
18:19:58 ipsec,debug 06035504 07130556 656a656e 310f300d 06035504 0a130642 6f6a7365 6e311730 
18:19:58 ipsec,debug 15060355 0403130e 3231322e 3233372e 3138332e 3535311f 301d0609 2a864886 
18:19:58 ipsec,debug f70d0109 01161072 61736d75 7340626f 6a73656e 2e636e30 1e170d32 30303633 
18:19:58 ipsec,debug 30313631 3430305a 170d3232 30363235 31363134 30305a30 40310b30 09060355 
18:19:58 ipsec,debug 04061302 444b310b 30090603 55040813 02444b31 0e300c06 03550407 13055665 
18:19:58 ipsec,debug decrypted 
18:19:58 ipsec payload seen: ID_I (21 bytes) 
18:19:58 ipsec payload seen: CERT (881 bytes) 
18:19:58 ipsec payload seen: NOTIFY (8 bytes) 
18:19:58 ipsec payload seen: ID_R (12 bytes) 
18:19:58 ipsec payload seen: AUTH (264 bytes) 
18:19:58 ipsec payload seen: CONFIG (40 bytes) 
18:19:58 ipsec payload seen: NOTIFY (8 bytes) 
18:19:58 ipsec payload seen: NOTIFY (8 bytes) 
18:19:58 ipsec payload seen: SA (200 bytes) 
18:19:58 ipsec payload seen: TS_I (64 bytes) 
18:19:58 ipsec payload seen: TS_R (64 bytes) 
18:19:58 ipsec payload seen: NOTIFY (8 bytes) 
18:19:58 ipsec processing payloads: NOTIFY 
18:19:58 ipsec   notify: INITIAL_CONTACT 
18:19:58 ipsec   notify: ESP_TFC_PADDING_NOT_SUPPORTED 
18:19:58 ipsec   notify: NON_FIRST_FRAGMENTS_ALSO 
18:19:58 ipsec   notify: MOBIKE_SUPPORTED 
18:19:58 ipsec ike auth: respond 
18:19:58 ipsec processing payload: ID_I 
18:19:58 ipsec ID_I (FQDN): myipad.client 
18:19:58 ipsec processing payload: ID_R 
18:19:58 ipsec ID_R (ADDR4): 123.456.789.10 
18:19:58 ipsec processing payload: AUTH 
18:19:58 ipsec processing payload: CERT 
18:19:58 ipsec got CERT: CN=ipad.client,C=DK,ST=DK,L=Vejen,O=,OU=,SN= 
18:19:58 ipsec,debug => (size 0x36c) 
18:19:58 ipsec,debug 30820368 30820250 a0030201 0202087d 5194d120 e8200a30 0d06092a 864886f7 
18:19:58 ipsec,debug 0d01010b 05003075 310b3009 06035504 06130244 4b310b30 09060355 04081302 
18:19:58 ipsec,debug 444b310e 300c0603 55040713 0556656a 656e310f 300d0603 55040a13 06426f6a 
18:19:58 ipsec,debug 73656e31 17301506 03550403 130e3231 322e3233 372e3138 332e3535 311f301d 
18:19:58 ipsec,debug 06092a86 4886f70d 01090116 10726173 6d757340 626f6a73 656e2e63 6e301e17 
18:19:58 ipsec,debug 0d323030 36333031 36313430 305a170d 32323036 32353136 31343030 5a304031 
18:19:58 ipsec,debug 0b300906 03550406 1302444b 310b3009 06035504 08130244 4b310e30 0c060355 
18:19:58 ipsec,debug 04071305 56656a65 6e311430 12060355 0403130b 69706164 2e636c69 656e7430 
18:19:58 ipsec,debug 
18:19:58 ipsec,debug 82012230 0d06092a 864886f7 0d010101 05000382 010f0030 82010a02 82010100 
18:19:58 ipsec,debug a75431b1 6ac012f3 5df8429e 1d2b60f4 36963fff 21f49ba0 93463aa7 4d6d4bbe 
18:19:58 ipsec,debug c4746fc9 45c1cb05 5baf815b 72fa924a 8841f97f ba146eb2 e7969502 7c35d0ae 
18:19:58 ipsec,debug 1951a8d6 cf7889e1 4b5bb06a 25fa2fa0 7bc46d75 0571f77b deb513ef 76f0c8e5 
18:19:58 ipsec,debug e8d480c9 07f54d57 3908b73d 4000ccbf cb398c93 ba1c3dc7 983e3e3e c29ee824 
18:19:58 ipsec,debug edd7b7f5 96def9a6 54124aa0 fbd676c5 606095ef 3492c85e 35de7b64 4e16de3a 
18:19:58 ipsec,debug 375f82c1 10c788f4 3a9c5556 472d8d44 f95accd7 babc0529 80cdc160 5acccf83 
18:19:58 ipsec,debug eb792321 64d602aa c83edaf5 7c524f24 ce3c548f 3eb1ce13 a55c52c5 6e4b55df 
18:19:58 ipsec,debug 
18:19:58 ipsec,debug 54413948 391e7314 b7415b3e c3993378 244242e2 a306d77c 990f714a 8b92872f 
18:19:58 ipsec,debug 02030100 01a33130 2f301306 03551d25 040c300a 06082b06 01050507 03023018 
18:19:58 ipsec,debug 0603551d 11041130 0f820d6d 79697061 642e636c 69656e74 300d0609 2a864886 
18:19:58 ipsec,debug f70d0101 0b050003 82010100 657ec6c8 676f8776 fb9ee1b3 d0f0a5c0 652523da 
18:19:58 ipsec,debug 2c14e880 4542c898 d7dac36d 3e6bf6f2 4b26c313 6fdbec2c be86fee6 92a65aef 
18:19:58 ipsec,debug d7899376 e94e502f 65c0cd1f 4a63bd60 91118fa9 66972f2c ad036112 543d7d82 
18:19:58 ipsec,debug c650dfd5 3724ceef 071cfc1d 9eae492b 0bb60353 88df36dd 16ba8efd aa8a8e1b 
18:19:58 ipsec,debug abc6bd8b 67ed6a93 28755080 185754bd dc6ed566 2f983b8d ccda6288 534fb915 
18:19:58 ipsec,debug 
18:19:58 ipsec,debug 7bf66b90 fd85a789 be969143 26ea7c39 5af7a65c 1b9a7414 bf198c4a dd5d9ea7 
18:19:58 ipsec,debug 3da5997c b06de0fc 4eb1daf2 58123e69 430be24a ef4188e9 6214f02d a3829836 
18:19:58 ipsec,debug 513d6234 47362122 a6ee461d 4c82d4b2 862cadeb 16a4b660 439b4469 a814e42a 
18:19:58 ipsec,debug 93ec1b43 a0be1f78 96fa8bac 
18:19:58 ipsec processing payloads: NOTIFY 
18:19:58 ipsec   notify: INITIAL_CONTACT 
18:19:58 ipsec   notify: ESP_TFC_PADDING_NOT_SUPPORTED 
18:19:58 ipsec   notify: NON_FIRST_FRAGMENTS_ALSO 
18:19:58 ipsec   notify: MOBIKE_SUPPORTED 
18:19:58 ipsec processing payload: AUTH 
18:19:58 ipsec requested auth method: RSA 
18:19:58 ipsec,debug => peer's auth (size 0x100) 
18:19:58 ipsec,debug 9bbdbd55 0773e6c6 6bf7abd1 b138a8a3 aa99d52a 85be6ad7 5830fe03 8d81076e 
18:19:58 ipsec,debug ba813826 97d1e5dd 1c81ef79 58686c56 53577994 1b69b14b c5460067 2b8887fb 
18:19:58 ipsec,debug a98badcc fdf5d128 adb925e3 6ea71aad d6bbb352 82a04a81 8fbc6ee4 eb504600 
18:19:58 ipsec,debug a0719671 12cfa3b6 daf7685f f1d170b4 7726ad23 cd724fce 904357ab 7d7d5414 
18:19:58 ipsec,debug 5ed156cd 8da547e0 1d62abc4 277e60eb bd50b48b e63bc2c1 61d5c8b8 60f89207 
18:19:58 ipsec,debug fd56f95c ef6f58bc b56a357e fcd143e3 6bfefc7d 8e9418fc f5976019 4fe95209 
18:19:58 ipsec,debug bbf55b03 36803cf9 efb14b71 1fec05bb 4f139472 78185df1 53614771 459ae997 
18:19:58 ipsec,debug 027c8ad2 38fc72ac 61f69ed8 492cd095 a48a7b05 90356ef7 2005e752 b8f0d362 
18:19:58 ipsec,debug checking SAN: myipad.client 
18:19:58 ipsec,debug => auth nonce (size 0x18) 
18:19:58 ipsec,debug 2040efec 558951ab 79b3059d 0a36b107 cf584a7e 8ad38c33 
18:19:58 ipsec,debug => SK_p (size 0x20) 
18:19:58 ipsec,debug 011fe445 b49b226f 6b32aee7 939f2c3d 6029388a bee539c2 a7077499 dd0ec6fb 
18:19:58 ipsec,debug => idhash (size 0x20) 
18:19:58 ipsec,debug 6ba3ad43 c6cd18b5 9ec3081f 7f23ed4e 8ed5652c 8edd5585 967f70b3 9580a283 
18:19:58 ipsec,info,account peer authorized: 123.456.789.10[4500]-10.10.10.121[4500] spi:7aec38c2af1184e6:688383669b21e7d0 
18:19:58 ipsec initial contact 
18:19:58 ipsec processing payloads: NOTIFY 
18:19:58 ipsec   notify: INITIAL_CONTACT 
18:19:58 ipsec   notify: ESP_TFC_PADDING_NOT_SUPPORTED 
18:19:58 ipsec   notify: NON_FIRST_FRAGMENTS_ALSO 
18:19:58 ipsec   notify: MOBIKE_SUPPORTED 
18:19:58 ipsec peer wants tunnel mode 
18:19:58 ipsec processing payload: CONFIG 
18:19:58 ipsec   attribute: internal IPv4 address 
18:19:58 ipsec   attribute: internal IPv4 netmask 
18:19:58 ipsec   attribute: internal IPv4 DHCP 
18:19:58 ipsec   attribute: internal IPv4 DNS 
18:19:58 ipsec   attribute: internal IPv6 address 
18:19:58 ipsec   attribute: internal IPv6 DHCP 
18:19:58 ipsec   attribute: internal IPv6 DNS 
18:19:58 ipsec   attribute: internal DNS domain 
18:19:58 ipsec,info acquired 10.10.12.25 address for 10.10.10.121, myipad.client 
18:19:58 ipsec processing payload: TS_I 
18:19:58 ipsec 0.0.0.0/0 
18:19:58 ipsec [::/0] 
18:19:58 ipsec processing payload: TS_R 
18:19:58 ipsec 0.0.0.0/0 
18:19:58 ipsec [::/0] 
18:19:58 ipsec TSi in tunnel mode replaced with config address: 10.10.12.25 
18:19:58 ipsec TSr in tunnel mode replaced with split subnet: 0.0.0.0/0 
18:19:58 ipsec canditate selectors: 0.0.0.0/0 <=> 10.10.12.25 
18:19:58 ipsec canditate selectors: [::/0] <=> [::/0] 
18:19:58 ipsec processing payload: SA 
18:19:58 ipsec IKE Protocol: ESP 
18:19:58 ipsec  proposal #1 
18:19:58 ipsec   enc: aes256-cbc 
18:19:58 ipsec   auth: sha256 
18:19:58 ipsec  proposal #2 
18:19:58 ipsec   enc: aes256-cbc 
18:19:58 ipsec   auth: sha256 
18:19:58 ipsec  proposal #3 
18:19:58 ipsec   enc: aes256-cbc 
18:19:58 ipsec   auth: sha256 
18:19:58 ipsec  proposal #4 
18:19:58 ipsec   enc: aes128-cbc 
18:19:58 ipsec   auth: sha1 
18:19:58 ipsec  proposal #5 
18:19:58 ipsec   enc: 3des-cbc 
18:19:58 ipsec   auth: sha1 
18:19:58 ipsec searching for policy for selector: 0.0.0.0/0 <=> 10.10.12.25 
18:19:58 ipsec generating policy 
18:19:58 ipsec matched proposal: 
18:19:58 ipsec  proposal #1 
18:19:58 ipsec   enc: aes256-cbc 
18:19:58 ipsec   auth: sha256 
18:19:58 ipsec ike auth: finish 
18:19:58 ipsec ID_R (FQDN): mymikrotik.server 
18:19:58 ipsec processing payload: NONCE 
18:19:58 ipsec,debug => auth nonce (size 0x10) 
18:19:58 ipsec,debug d153912e dc22b4e0 38168c8b 0347c54c 
18:19:58 ipsec,debug => SK_p (size 0x20) 
18:19:58 ipsec,debug e580b5e2 8c7775e1 813a691b 693ef4df 2b3ba505 2aa46403 30acd220 b592eb43 
18:19:58 ipsec,debug => idhash (size 0x20) 
18:19:58 ipsec,debug 44752e2a 719328af 00c52b8b 79ccfe25 a3f2380f 7089d81a fc30c5b2 26aa9cc6 
18:19:58 ipsec,debug => my auth (size 0x100) 
18:19:58 ipsec,debug 8b027bfa b291ed57 fe081d2d 2199676c f107e4a5 3661f23e d30e83d9 2023ccb7 
18:19:58 ipsec,debug f9ed28dd e8fe3606 c65d844c 3277ac36 fcafe51b 56a28b05 ab536d03 e1737866 
18:19:58 ipsec,debug 1efaff11 4e4c074c 9c0e0bf5 3aabdd4c 136ae226 f3272631 a87350fc 2a73353f 
18:19:58 ipsec,debug 1f9a6378 b60c13ff e8bd73ce 86cff818 e4e8e758 0437d9cd f6c567bf a4f81e48 
18:19:58 ipsec,debug 0b671b5c f21f9de3 d13f7f23 07bd46ee f9028284 a808cf13 02d646da 5cbeecc3 
18:19:58 ipsec,debug a17d05db 19a9802b 1d12597c c46be14f 7ed51019 035b721c 3e83a90e f0d28286 
18:19:58 ipsec,debug 51ca82ea 0f4cc984 f59126e7 befb5adb 75417493 9f05b617 d7c22fdc 001daa51 
18:19:58 ipsec,debug 135e3302 b9b27501 73e38e0e fc3622e9 31b72ce8 724ffdee 9d04ba7b a30e4466 
18:19:58 ipsec cert: CN=mikrotik.vpn.server,C=DK,ST=DK,L=Vejen,O=,OU=,SN= 
18:19:58 ipsec adding payload: CERT 
18:19:58 ipsec,debug => (first 0x100 of 0x39d) 
18:19:58 ipsec,debug 0000039d 04308203 94308202 7ca00302 01020208 7d626975 55727615 300d0609 
18:19:58 ipsec,debug 2a864886 f70d0101 0b050030 75310b30 09060355 04061302 444b310b 30090603 
18:19:58 ipsec,debug 55040813 02444b31 0e300c06 03550407 13055665 6a656e31 0f300d06 0355040a 
18:19:58 ipsec,debug 1306426f 6a73656e 31173015 06035504 03130e32 31322e32 33372e31 38332e35 
18:19:58 ipsec,debug 35311f30 1d06092a 864886f7 0d010901 16107261 736d7573 40626f6a 73656e2e 
18:19:58 ipsec,debug 636e301e 170d3230 30363330 31363135 30305a17 0d323230 36323931 36313530 
18:19:58 ipsec,debug 305a3048 310b3009 06035504 06130244 4b310b30 09060355 04081302 444b310e 
18:19:58 ipsec,debug 300c0603 55040713 0556656a 656e311c 301a0603 55040313 136d696b 726f7469 
18:19:58 ipsec adding payload: ID_R 
18:19:58 ipsec,debug => (size 0x19) 
18:19:58 ipsec,debug 00000019 02000000 6d796d69 6b726f74 696b2e73 65727665 72 
18:19:58 ipsec adding payload: AUTH 
18:19:58 ipsec,debug => (first 0x100 of 0x108) 
18:19:58 ipsec,debug 00000108 01000000 8b027bfa b291ed57 fe081d2d 2199676c f107e4a5 3661f23e 
18:19:58 ipsec,debug d30e83d9 2023ccb7 f9ed28dd e8fe3606 c65d844c 3277ac36 fcafe51b 56a28b05 
18:19:58 ipsec,debug ab536d03 e1737866 1efaff11 4e4c074c 9c0e0bf5 3aabdd4c 136ae226 f3272631 
18:19:58 ipsec,debug a87350fc 2a73353f 1f9a6378 b60c13ff e8bd73ce 86cff818 e4e8e758 0437d9cd 
18:19:58 ipsec,debug f6c567bf a4f81e48 0b671b5c f21f9de3 d13f7f23 07bd46ee f9028284 a808cf13 
18:19:58 ipsec,debug 02d646da 5cbeecc3 a17d05db 19a9802b 1d12597c c46be14f 7ed51019 035b721c 
18:19:58 ipsec,debug 3e83a90e f0d28286 51ca82ea 0f4cc984 f59126e7 befb5adb 75417493 9f05b617 
18:19:58 ipsec,debug d7c22fdc 001daa51 135e3302 b9b27501 73e38e0e fc3622e9 31b72ce8 724ffdee 
18:19:58 ipsec preparing internal IPv4 address 
18:19:58 ipsec preparing internal IPv4 netmask 
18:19:58 ipsec preparing internal IPv6 subnet 
18:19:58 ipsec preparing internal IPv4 DNS 
18:19:58 ipsec adding payload: CONFIG 
18:19:58 ipsec,debug => (size 0x2c) 
18:19:58 ipsec,debug 0000002c 02000000 00010004 0a0a0c19 00020004 ffffffff 000d0008 00000000 
18:19:58 ipsec,debug 00000000 00030004 0a0a0a1d 
18:19:58 ipsec initiator selector: 10.10.12.25 
18:19:58 ipsec adding payload: TS_I 
18:19:58 ipsec,debug => (size 0x18) 
18:19:58 ipsec,debug 00000018 01000000 07000010 0000ffff 0a0a0c19 0a0a0c19 
18:19:58 ipsec responder selector: 0.0.0.0/0 
18:19:58 ipsec adding payload: TS_R 
18:19:58 ipsec,debug => (size 0x18) 
18:19:58 ipsec,debug 00000018 01000000 07000010 0000ffff 00000000 ffffffff 
18:19:58 ipsec adding payload: SA 
18:19:58 ipsec,debug => (size 0x2c) 
18:19:58 ipsec,debug 0000002c 00000028 01030403 0ca3a8b2 0300000c 0100000c 800e0100 03000008 
18:19:58 ipsec,debug 0300000c 00000008 05000000 
18:19:58 ipsec <- ike2 reply, exchange: AUTH:1 10.10.10.121[4500] 688383669b21e7d0:7aec38c2af1184e6 
18:19:58 ipsec,debug ===== sending 1472 bytes from 123.456.789.10[4500] to 10.10.10.121[4500] 
18:19:58 ipsec,debug 1 times of 1476 bytes message will be sent to 10.10.10.121[4500] 
18:19:58 ipsec,debug => child keymat (size 0x80) 
18:19:58 ipsec,debug 7840a0fe dcca8e0f e239c305 e73c8064 85c71f2c 6a323097 b8fc5f08 ba895ad7 
18:19:58 ipsec,debug b69faaf3 3dd2fc2b 195359f1 925d7ab9 6fb32917 656e386a cfa70e01 648dd5ec 
18:19:58 ipsec,debug 0e548f5e a4d6613d 785f5d98 e58697f6 faa2dbf8 d1ff843e 6970841b 062375c5 
18:19:58 ipsec,debug efa516ca f057d655 3e3f2eb2 e5b92c81 6966935a 8eb628fe 77e7d9fc fe369470 
18:19:58 ipsec IPsec-SA established: 10.10.10.121[4500]->212.237.183.55[4500] spi=0xca3a8b2 
18:19:58 ipsec IPsec-SA established: 123.456.789.10[4500]->10.10.10.121[4500] spi=0x2783a0 
18:20:04 ipsec,debug ===== received 76 bytes from 84.17.36.150[4500] to 212.237.183.55[4500] 
18:20:04 ipsec -> ike2 request, exchange: INFORMATIONAL:164 84.17.36.150[4500] f6931d7e9a5afab5:ea92a01fceb55d3c 
18:20:04 ipsec payload seen: ENC (48 bytes) 
18:20:04 ipsec processing payload: ENC 
18:20:04 ipsec,debug => iv (size 0x10) 
18:20:04 ipsec,debug 57f7341e 8b84953e a4922a92 bb535c1d 
18:20:04 ipsec,debug => plain payload (trimmed) (size 0x0) 
18:20:04 ipsec,debug decrypted 
18:20:04 ipsec respond: info 
18:20:04 ipsec,debug sending empty reply 
18:20:04 ipsec <- ike2 reply, exchange: INFORMATIONAL:164 84.17.36.150[4500] f6931d7e9a5afab5:ea92a01fceb55d3c 
18:20:04 ipsec,debug ===== sending 124 bytes from 123.456.789.10[4500] to 84.17.36.150[4500] 
18:20:04 ipsec,debug 1 times of 128 bytes message will be sent to 84.17.36.150[4500]