Получена явная ошибка eap 0x50005

  • Hi cshsysadmin,

    >>Explicit Eap failure received

    There are many reasons could cause “Explicit EAP failure received”. Usually we will first to collect the wireless logs by enabling logging with command “netsh ras set tracing * enable” and “netsh wlan set tracing mode=yes” at client when this issue
    be reproduced and analyze entries in its corresponding logging file.And post the complet logs to us,it will be helpful to analyze.

    >>I did notice her pc certificate is pointing to our old certificate authority but has not expired. Could it be a certificate issue?

    It could be.Please try to give her certificate from the server you are using.

    In addition,which authentication methods did you  set to use in network or connection request policies that you defined in NPS server ? what OS is running on client ??

    Here is some link for your reference:

    A Support Guide for Wireless Diagnostics and Troubleshooting

    http://technet.microsoft.com/en-us/library/bb457018.aspx

    Authentication Problem on a 802.1x Wireless Network

    http://blogs.technet.com/b/yuridiogenes/archive/2008/04/18/authentication-problem-on-a-802-1x-wireless-network.aspx

    Best Regards,

    Cartman

    Please remember to mark the replies as answers if they help and unmark them if they provide
    no help. If you have feedback for TechNet Support, contact
    tnmff@microsoft.com.

    • Помечено в качестве ответа
      rdprice_cshco.com
      28 марта 2016 г. 15:24

  • I’m back on this now Christmas is out of the way :slightly_smiling_face:

    I had some default policies still enabled on my 2016 NPS Server, which I’ve disabled. They were:

    Connection Request Policies > Use Windows authentication for all users.

    Network Policies > Connections to other access servers.

    Network Policies > Connections to Microsoft Routing and Remote Access server.

    With those 3 disabled, I’m no longer getting the following Information level event logged in Event Viewer:

    Reason code: 66

    Reason: The user attempted to use an authentication method that is not enabled on the matching network policy.

    Instead, I am now getting:

    Reason code: 48

    Reason: The connection request did not match any configured network policy.

    I have 3 conditions set for the Staff WiFi Network Policy:

    Condition: NAS Port Type, Value: Wireless — IEEE 802.11 OR Wireless — Other

    Condition: User Groups, Value: MYDOMAINMeraki Staff Group

    Condition: Machine Groups, Value: MYDOMAINMeraki Computer Group

    The laptop I’m testing on is a member of the Meraki Computer Group, and the user account I’m logged on with belongs to the Meraki Staff Group.

    I get a ‘Reason Code: 48’ event logged twice each time I try to connect; first for the user, then 10 seconds later for the machine:

    ————————————————————————————————————-

    Network Policy Server denied access to a user.

    Contact the Network Policy Server administrator for more information.

    User:
         Security ID: MYDOMAINElectroDan
         Account Name: MYDOMAINElectroDan
         Account Domain: MYDOMAIN
         Fully Qualified Account Name: MYDOMAINElectroDan

    Client Machine:
         Security ID: NULL SID
         Account Name: —
         Fully Qualified Account Name: —
         Called Station Identifier: 9A-15-54-AB-52-67:Radius_Test
         Calling Station Identifier: 84-3A-4B-56-F4-5C

    NAS:
         NAS IPv4 Address: 10.99.108.26
         NAS IPv6 Address: —
         NAS Identifier: —
         NAS Port-Type: Wireless — IEEE 802.11
         NAS Port: —

    RADIUS Client:
         Client Friendly Name: Meraki — Purchasing
         Client IP Address: 10.99.108.26

    Authentication Details:
         Connection Request Policy Name: WiFi_Staff
         Network Policy Name: —
         Authentication Provider: Windows
         Authentication Server: DC03.mydomain.local
         Authentication Type: EAP
         EAP Type: —
         Account Session Identifier: 41413346334133424138354636383335
         Logging Results: Accounting information was written to the local log file.
         Reason Code: 48
         Reason: The connection request did not match any configured network policy.

    ————————————————————————————————————-

    Network Policy Server denied access to a user.

    Contact the Network Policy Server administrator for more information.

    User:
         Security ID: MYDOMAINITSPARE01$
         Account Name: host/ITSPARE01.mydomain.local
         Account Domain: MYDOMAIN
         Fully Qualified Account Name: MYDOMAINITSPARE01$

    Client Machine:
         Security ID: NULL SID
         Account Name: —
         Fully Qualified Account Name: —
         Called Station Identifier: 9A-15-54-AB-56-2D:Radius_Test
         Calling Station Identifier: 84-3A-4B-56-F4-5C

    NAS:
         NAS IPv4 Address: 10.99.108.25
         NAS IPv6 Address: —
         NAS Identifier: —
         NAS Port-Type: Wireless — IEEE 802.11
         NAS Port: —

    RADIUS Client:
         Client Friendly Name: Meraki — Accounts
         Client IP Address: 10.99.108.25

    Authentication Details:
         Connection Request Policy Name: WiFi_Staff
         Network Policy Name: —
         Authentication Provider: Windows
         Authentication Server: DC03.mydomain.local
         Authentication Type: EAP
         EAP Type: —
         Account Session Identifier: 41433342464337434233394535444334
         Logging Results: Accounting information was written to the local log file.
         Reason Code: 48
         Reason: The connection request did not match any configured network policy.

    ————————————————————————————————————-

    A couple of things I’ve noticed.

    1) The machine account (MYDOMAINITSPARE01$) is being listed in the User section, and the Client Machine section is empty.

    2) The 2nd entry (for MYDOMAINITSPARE01$) is registering via a different AP (Meraki — Accounts). Both AP’s are within range of my test laptop.

    Fun.

    Not.

    I am trying to get NPS (Running Windows Server 2008 R2) setup as a RADIUS server to authenticate my wireless clients (running Windows 7 Enterprise). When attempting this, I get the following in the event log on the DC/NPS:

    — System

      — Provider

       [ Name]  Schannel
       [ Guid]  {1F678132-5938-4686-9FDC-C8FF68F15C85}

     
       EventID 36888

     
       Version 0

     
       Level 2

     
       Task 0

     
       Opcode 0

     
       Keywords 0x8000000000000000

     
      — TimeCreated

       [ SystemTime]  2009-08-17T20:27:15.913829000Z

     
       EventRecordID 136791

     
       Correlation

     
      — Execution

       [ ProcessID]  540
       [ ThreadID]  1748

     
       Channel System

     
       Computer DOMAINCONTROLLER.domain

     
      — Security

       [ UserID]  S-1-5-18

    — EventData

      AlertDesc 20
      ErrorState 960

    And the following in the NPS log:
    «DOMAINCONTROLLER»,»IAS»,08/18/2009,09:13:28,1,»DOMAINUSER»,»DOMAINuser»,»001c1011af08″,»001bfcb1bd23″,,,»001c1011af08″,»WAP IP»,47,0,»WAP IP»,»WAP Hostname»,,,19,,,,11,»Secure Wireless Connections»,0,»311 1 DOMAINCONTROLLERIP 08/17/2009 16:55:48 120″,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,»Secure Wireless Connections»,1,,,,
    «DOMAINCONTROLLER»,»IAS»,08/18/2009,09:13:28,3,,»DOMAINuser»,,,,,,,,0,»WAP IP»,»WAP Hostname»,,,,,,,11,»Secure Wireless Connections»,23,»311 1 DOMAINCONTROLLERIP 08/17/2009 16:55:48 120″,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,»Secure Wireless Connections»,1,,,,

    And the following in the client security log:
    Log Name:      Security
    Source:        Microsoft-Windows-Security-Auditing
    Date:          8/18/2009 9:13:28 AM
    Event ID:      5632
    Task Category: Other Logon/Logoff Events
    Level:         Information
    Keywords:      Audit Failure
    User:          N/A
    Computer:      LAPTOP.domain
    Description:
    A request was made to authenticate to a wireless network.

    Subject:
          Security ID:            DOMAINuser
          Account Name:            user
          Account Domain:            DOMAIN
          Logon ID:            0x23e79

    Network Information:
          Name (SSID):            DOMAIN-wlan
          Interface GUID:            {90952a3d-ac07-4f0d-9598-50afdea22da8}
          Local MAC Address:      00:1B:FC:B1:BD:23
          Peer MAC Address:      00:1C:10:11:AF:08

    Additional Information:
          Reason Code:            Explicit Eap failure received (0x50005)
          Error Code:            0x0
          EAP Reason Code:      0x0
          EAP Root Cause String:      
          EAP Error Code:            0x0

    The client is receiving the root certificate that has an intended purpose of <All> according to the certificate MMC snap-in. Is there some other kind of certificate I need to issue, and if so, how? Also, if I’m reading the NPS log correctly I’m getting authentication type 11 and Result Code 23 neither of which show up in http://technet.microsoft.com/en-us/library/cc771748%28WS.10%29.aspx.

    Very confused.

    [SOLVED | See edit #2]

    I saw another user have that issue on their school network back on build 10240, but I’m seeing it happen to me on the new fast ring build, 10565. Can anyone else confirm this? My event viewer is riddled with these errors after failing to connect:

    Authentication failed for EAP method type 25. The error was 0x54F    
    

    and

    EapHostPeerGetResult returned a failure.
    Eap Method Friendly Name: Microsoft: Protected EAP (PEAP)
    Reason code: 0
    Root Cause String: NULL
    Repair String: NULL
    

    The guest network is fine, since there’s no authentication (obviously)

    Is there a fix for this somewhere or will I have to resort to using ethernet/guest networking for the while?

    (I hope MS fixes this soon… this is enterprise-breaking levels of bad)

    Edit: Posted in the wrong sub, can someone help me fix this please? Made a new post linking to here for now: https://www.reddit.com/r/windowsinsiders/comments/3ort8f/8021x_peap_is_broken_with_wpa2enterprise_windows10/


    Edit #2: I GOT IT! A Software Lead Designer at MS contacted me and he walked through the issue. The fix was to add a registry key:

    reg add HKLMSYSTEMCurrentControlSetServicesRasManPPPEAP13  /v TlsVersion /t REG_DWORD /d 0xc0
    

    following that, restart and try connecting again. Hopefully this helps someone else


  • Hi cshsysadmin,

    >>Explicit Eap failure received

    There are many reasons could cause “Explicit EAP failure received”. Usually we will first to collect the wireless logs by enabling logging with command “netsh ras set tracing * enable” and “netsh wlan set tracing mode=yes” at client when this issue
    be reproduced and analyze entries in its corresponding logging file.And post the complet logs to us,it will be helpful to analyze.

    >>I did notice her pc certificate is pointing to our old certificate authority but has not expired. Could it be a certificate issue?

    It could be.Please try to give her certificate from the server you are using.

    In addition,which authentication methods did you  set to use in network or connection request policies that you defined in NPS server ? what OS is running on client ??

    Here is some link for your reference:

    A Support Guide for Wireless Diagnostics and Troubleshooting

    http://technet.microsoft.com/en-us/library/bb457018.aspx

    Authentication Problem on a 802.1x Wireless Network

    http://blogs.technet.com/b/yuridiogenes/archive/2008/04/18/authentication-problem-on-a-802-1x-wireless-network.aspx

    Best Regards,

    Cartman

    Please remember to mark the replies as answers if they help and unmark them if they provide
    no help. If you have feedback for TechNet Support, contact
    tnmff@microsoft.com.

    • Marked as answer by
      rdprice_cshco.com
      Monday, March 28, 2016 3:24 PM

  • I’m back on this now Christmas is out of the way :slightly_smiling_face:

    I had some default policies still enabled on my 2016 NPS Server, which I’ve disabled. They were:

    Connection Request Policies > Use Windows authentication for all users.

    Network Policies > Connections to other access servers.

    Network Policies > Connections to Microsoft Routing and Remote Access server.

    With those 3 disabled, I’m no longer getting the following Information level event logged in Event Viewer:

    Reason code: 66

    Reason: The user attempted to use an authentication method that is not enabled on the matching network policy.

    Instead, I am now getting:

    Reason code: 48

    Reason: The connection request did not match any configured network policy.

    I have 3 conditions set for the Staff WiFi Network Policy:

    Condition: NAS Port Type, Value: Wireless — IEEE 802.11 OR Wireless — Other

    Condition: User Groups, Value: MYDOMAINMeraki Staff Group

    Condition: Machine Groups, Value: MYDOMAINMeraki Computer Group

    The laptop I’m testing on is a member of the Meraki Computer Group, and the user account I’m logged on with belongs to the Meraki Staff Group.

    I get a ‘Reason Code: 48’ event logged twice each time I try to connect; first for the user, then 10 seconds later for the machine:

    ————————————————————————————————————-

    Network Policy Server denied access to a user.

    Contact the Network Policy Server administrator for more information.

    User:
         Security ID: MYDOMAINElectroDan
         Account Name: MYDOMAINElectroDan
         Account Domain: MYDOMAIN
         Fully Qualified Account Name: MYDOMAINElectroDan

    Client Machine:
         Security ID: NULL SID
         Account Name: —
         Fully Qualified Account Name: —
         Called Station Identifier: 9A-15-54-AB-52-67:Radius_Test
         Calling Station Identifier: 84-3A-4B-56-F4-5C

    NAS:
         NAS IPv4 Address: 10.99.108.26
         NAS IPv6 Address: —
         NAS Identifier: —
         NAS Port-Type: Wireless — IEEE 802.11
         NAS Port: —

    RADIUS Client:
         Client Friendly Name: Meraki — Purchasing
         Client IP Address: 10.99.108.26

    Authentication Details:
         Connection Request Policy Name: WiFi_Staff
         Network Policy Name: —
         Authentication Provider: Windows
         Authentication Server: DC03.mydomain.local
         Authentication Type: EAP
         EAP Type: —
         Account Session Identifier: 41413346334133424138354636383335
         Logging Results: Accounting information was written to the local log file.
         Reason Code: 48
         Reason: The connection request did not match any configured network policy.

    ————————————————————————————————————-

    Network Policy Server denied access to a user.

    Contact the Network Policy Server administrator for more information.

    User:
         Security ID: MYDOMAINITSPARE01$
         Account Name: host/ITSPARE01.mydomain.local
         Account Domain: MYDOMAIN
         Fully Qualified Account Name: MYDOMAINITSPARE01$

    Client Machine:
         Security ID: NULL SID
         Account Name: —
         Fully Qualified Account Name: —
         Called Station Identifier: 9A-15-54-AB-56-2D:Radius_Test
         Calling Station Identifier: 84-3A-4B-56-F4-5C

    NAS:
         NAS IPv4 Address: 10.99.108.25
         NAS IPv6 Address: —
         NAS Identifier: —
         NAS Port-Type: Wireless — IEEE 802.11
         NAS Port: —

    RADIUS Client:
         Client Friendly Name: Meraki — Accounts
         Client IP Address: 10.99.108.25

    Authentication Details:
         Connection Request Policy Name: WiFi_Staff
         Network Policy Name: —
         Authentication Provider: Windows
         Authentication Server: DC03.mydomain.local
         Authentication Type: EAP
         EAP Type: —
         Account Session Identifier: 41433342464337434233394535444334
         Logging Results: Accounting information was written to the local log file.
         Reason Code: 48
         Reason: The connection request did not match any configured network policy.

    ————————————————————————————————————-

    A couple of things I’ve noticed.

    1) The machine account (MYDOMAINITSPARE01$) is being listed in the User section, and the Client Machine section is empty.

    2) The 2nd entry (for MYDOMAINITSPARE01$) is registering via a different AP (Meraki — Accounts). Both AP’s are within range of my test laptop.

    Fun.

    Not.

    I am trying to get NPS (Running Windows Server 2008 R2) setup as a RADIUS server to authenticate my wireless clients (running Windows 7 Enterprise). When attempting this, I get the following in the event log on the DC/NPS:

    — System

      — Provider

       [ Name]  Schannel
       [ Guid]  {1F678132-5938-4686-9FDC-C8FF68F15C85}

     
       EventID 36888

     
       Version 0

     
       Level 2

     
       Task 0

     
       Opcode 0

     
       Keywords 0x8000000000000000

     
      — TimeCreated

       [ SystemTime]  2009-08-17T20:27:15.913829000Z

     
       EventRecordID 136791

     
       Correlation

     
      — Execution

       [ ProcessID]  540
       [ ThreadID]  1748

     
       Channel System

     
       Computer DOMAINCONTROLLER.domain

     
      — Security

       [ UserID]  S-1-5-18

    — EventData

      AlertDesc 20
      ErrorState 960

    And the following in the NPS log:
    «DOMAINCONTROLLER»,»IAS»,08/18/2009,09:13:28,1,»DOMAINUSER»,»DOMAINuser»,»001c1011af08″,»001bfcb1bd23″,,,»001c1011af08″,»WAP IP»,47,0,»WAP IP»,»WAP Hostname»,,,19,,,,11,»Secure Wireless Connections»,0,»311 1 DOMAINCONTROLLERIP 08/17/2009 16:55:48 120″,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,»Secure Wireless Connections»,1,,,,
    «DOMAINCONTROLLER»,»IAS»,08/18/2009,09:13:28,3,,»DOMAINuser»,,,,,,,,0,»WAP IP»,»WAP Hostname»,,,,,,,11,»Secure Wireless Connections»,23,»311 1 DOMAINCONTROLLERIP 08/17/2009 16:55:48 120″,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,»Secure Wireless Connections»,1,,,,

    And the following in the client security log:
    Log Name:      Security
    Source:        Microsoft-Windows-Security-Auditing
    Date:          8/18/2009 9:13:28 AM
    Event ID:      5632
    Task Category: Other Logon/Logoff Events
    Level:         Information
    Keywords:      Audit Failure
    User:          N/A
    Computer:      LAPTOP.domain
    Description:
    A request was made to authenticate to a wireless network.

    Subject:
          Security ID:            DOMAINuser
          Account Name:            user
          Account Domain:            DOMAIN
          Logon ID:            0x23e79

    Network Information:
          Name (SSID):            DOMAIN-wlan
          Interface GUID:            {90952a3d-ac07-4f0d-9598-50afdea22da8}
          Local MAC Address:      00:1B:FC:B1:BD:23
          Peer MAC Address:      00:1C:10:11:AF:08

    Additional Information:
          Reason Code:            Explicit Eap failure received (0x50005)
          Error Code:            0x0
          EAP Reason Code:      0x0
          EAP Root Cause String:      
          EAP Error Code:            0x0

    The client is receiving the root certificate that has an intended purpose of <All> according to the certificate MMC snap-in. Is there some other kind of certificate I need to issue, and if so, how? Also, if I’m reading the NPS log correctly I’m getting authentication type 11 and Result Code 23 neither of which show up in http://technet.microsoft.com/en-us/library/cc771748%28WS.10%29.aspx.

    Very confused.

    [SOLVED | See edit #2]

    I saw another user have that issue on their school network back on build 10240, but I’m seeing it happen to me on the new fast ring build, 10565. Can anyone else confirm this? My event viewer is riddled with these errors after failing to connect:

    Authentication failed for EAP method type 25. The error was 0x54F    
    

    and

    EapHostPeerGetResult returned a failure.
    Eap Method Friendly Name: Microsoft: Protected EAP (PEAP)
    Reason code: 0
    Root Cause String: NULL
    Repair String: NULL
    

    The guest network is fine, since there’s no authentication (obviously)

    Is there a fix for this somewhere or will I have to resort to using ethernet/guest networking for the while?

    (I hope MS fixes this soon… this is enterprise-breaking levels of bad)

    Edit: Posted in the wrong sub, can someone help me fix this please? Made a new post linking to here for now: https://www.reddit.com/r/windowsinsiders/comments/3ort8f/8021x_peap_is_broken_with_wpa2enterprise_windows10/


    Edit #2: I GOT IT! A Software Lead Designer at MS contacted me and he walked through the issue. The fix was to add a registry key:

    reg add HKLMSYSTEMCurrentControlSetServicesRasManPPPEAP13  /v TlsVersion /t REG_DWORD /d 0xc0
    

    following that, restart and try connecting again. Hopefully this helps someone else


    Despite following a tutorial on how to get Strongswan to run on my Ubuntu machine, I am unable to get it to work on my Debian machine. I replicated all the steps from the tutorial except the firewall configuration at the bottom, which I omitted as it is not available on my server.

    Upon attempting to establish a connection to my server, an error message indicating incorrect user data is displayed. Despite creating and installing three unique certificates and testing various user credentials, the same error message persists. I am uncertain of what error I am committing.

    I assigned «My Debian Server IP» to the variable name MYIPADDRESS. Additionally, to differentiate each of the cert files I generated, I included the suffix «-vpn2» in their names.

    ipsec statusall:

    Status of IKE charon daemon (strongSwan 5.5.1, Linux 3.10.0-957.1.3.el7.x86_64, x86_64):
      uptime: 42 seconds, since Sep 23 03:30:26 2019
      malloc: sbrk 2699264, mmap 0, used 455168, free 2244096
      worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 1
      loaded plugins: charon aesni aes rc2 sha2 sha1 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf gmp agent xcbc hmac gcm attr kernel-netlink resolve socket-default connmark stroke updown
    Virtual IP pools (size/online/offline):
      10.10.10.0/24: 254/0/0
    Listening IP addresses:
      MYIPADDRESS
    Connections:
       ikev2-vpn:  %any...%any  IKEv2, dpddelay=300s
       ikev2-vpn:   local:  [MYIPADDRESS] uses public key authentication
       ikev2-vpn:    cert:  "CN=MYIPADDRESS"
       ikev2-vpn:   remote: uses EAP_MSCHAPV2 authentication with EAP identity '%any'
       ikev2-vpn:   child:  0.0.0.0/0 === dynamic TUNNEL, dpdaction=clear
    Security Associations (0 up, 0 connecting):
      none
    

    ipsec.secrets:

    # This file holds shared secrets or RSA private keys for authentication.
    # RSA private key for this host, authenticating it to any other host
    # which knows the public part.
    # this file is managed with debconf and will contain the automatically created $
    #include /var/lib/strongswan/ipsec.secrets.inc
    : RSA "server-key-vpn2.pem"
    user1 : EAP "hallo1234"
    user2 : EAP "hallo1234"
    

    ipsec.conf:

    config setup
        charondebug="ike 1, knl 1, cfg 2"
        uniqueids=no
    conn ikev2-vpn
        auto=add
        compress=no
        type=tunnel
        keyexchange=ikev2
        fragmentation=yes
        forceencaps=yes
        dpdaction=clear
        dpddelay=300s
        rekey=no
        left=%any
        leftid=MYIPADDRESS
        leftcert=server-cert-vpn2.pem
        leftsendcert=always
        leftsubnet=0.0.0.0/0
        right=%any
        rightid=%any
        rightauth=eap-mschapv2
        rightsourceip=10.10.10.0/24
        rightdns=8.8.8.8,8.8.4.4
        rightsendcert=never
        eap_identity=%identity
    

    Exportet Cert:

     cat /etc/ipsec.d/cacerts/ca-cert-vpn2.pem 
    

    The record retrieved is from the strongswan Android app, which was used by a user with the username «user2» and the password «hallo1234».

    Sep 23 09:43:37 00[DMN] +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    Sep 23 09:43:37 00[DMN] Starting IKE service (strongSwan 5.8.0dr2, Android 9 - PKQ1.181121.001/2019-08-01, Mi 9T Pro - Xiaomi/raphael_eea/Xiaomi, Linux 4.14.83-perf-g7723fb1, aarch64)
    Sep 23 09:43:37 00[LIB] loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls x509
    Sep 23 09:43:37 00[JOB] spawning 16 worker threads
    Sep 23 09:43:37 07[IKE] initiating IKE_SA android[15] to MYIPADDRESS
    Sep 23 09:43:37 07[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
    Sep 23 09:43:37 07[NET] sending packet: from 10.105.74.60[44288] to MYIPADDRESS[500] (716 bytes)
    Sep 23 09:43:37 10[NET] received packet: from MYIPADDRESS[500] to 10.105.74.60[44288] (38 bytes)
    Sep 23 09:43:37 10[ENC] parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
    Sep 23 09:43:37 10[IKE] peer didn't accept DH group ECP_256, it requested MODP_3072
    Sep 23 09:43:37 10[IKE] initiating IKE_SA android[15] to MYIPADDRESS
    Sep 23 09:43:37 10[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
    Sep 23 09:43:37 10[NET] sending packet: from 10.105.74.60[44288] to MYIPADDRESS[500] (1036 bytes)
    Sep 23 09:43:38 12[NET] received packet: from MYIPADDRESS[500] to 10.105.74.60[44288] (592 bytes)
    Sep 23 09:43:38 12[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
    Sep 23 09:43:38 12[CFG] selected proposal: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_3072
    Sep 23 09:43:38 12[IKE] local host is behind NAT, sending keep alives
    Sep 23 09:43:38 12[IKE] remote host is behind NAT
    Sep 23 09:43:38 12[IKE] sending cert request for "CN=VPN root CA"
    Sep 23 09:43:38 12[IKE] establishing CHILD_SA android{15}
    Sep 23 09:43:38 12[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
    Sep 23 09:43:38 12[NET] sending packet: from 10.105.74.60[45106] to MYIPADDRESS[4500] (464 bytes)
    Sep 23 09:43:38 08[NET] received packet: from MYIPADDRESS[4500] to 10.105.74.60[45106] (96 bytes)
    Sep 23 09:43:38 08[ENC] parsed IKE_AUTH response 1 [ IDr EAP/FAIL ]
    Sep 23 09:43:38 08[IKE] received EAP_FAILURE, EAP authentication failed
    Sep 23 09:43:38 08[ENC] generating INFORMATIONAL request 2 [ N(AUTH_FAILED) ]
    Sep 23 09:43:38 08[NET] sending packet: from 10.105.74.60[45106] to MYIPADDRESS[4500] (80 bytes)
    

    Edit:

    I just tried this command:

    ipsec up ikev2-vpn

    unable to resolve %any, initiate aborted
    tried to checkin and delete nonexisting IKE_SA
    establishing connection 'ikev2-vpn' failed
    

    car /var/log/syslog

    Sep 23 04:17:42 Minecraft charon: 07[NET] received packet: from 195.37.108.234[38454] to MYIPADDRESS[500] (716 bytes)
    Sep 23 04:17:42 Minecraft charon: 07[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
    Sep 23 04:17:42 Minecraft charon: 07[IKE] 195.37.108.234 is initiating an IKE_SA
    Sep 23 04:17:42 Minecraft charon: 07[IKE] remote host is behind NAT
    Sep 23 04:17:42 Minecraft charon: 07[IKE] DH group ECP_256 inacceptable, requesting MODP_3072
    Sep 23 04:17:42 Minecraft charon: 07[ENC] generating IKE_SA_INIT response 0 [ N(INVAL_KE) ]
    Sep 23 04:17:42 Minecraft charon: 07[NET] sending packet: from MYIPADDRESS[500] to 195.37.108.234[38454] (38 bytes)
    Sep 23 04:17:42 Minecraft charon: 16[NET] received packet: from 195.37.108.234[38454] to MYIPADDRESS[500] (1036 bytes)
    Sep 23 04:17:42 Minecraft charon: 16[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
    Sep 23 04:17:42 Minecraft charon: 16[IKE] 195.37.108.234 is initiating an IKE_SA
    Sep 23 04:17:42 Minecraft charon: 16[IKE] remote host is behind NAT
    Sep 23 04:17:42 Minecraft charon: 16[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
    Sep 23 04:17:42 Minecraft charon: 16[NET] sending packet: from MYIPADDRESS[500] to 195.37.108.234[38454] (592 bytes)
    Sep 23 04:17:42 Minecraft charon: 05[NET] received packet: from 195.37.108.234[41118] to MYIPADDRESS[4500] (464 bytes)
    Sep 23 04:17:42 Minecraft charon: 05[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
    Sep 23 04:17:42 Minecraft charon: 05[IKE] received cert request for "CN=VPN root CA"
    Sep 23 04:17:42 Minecraft charon: 05[CFG] looking for peer configs matching MYIPADDRESS[%any]...195.37.108.234[user]
    Sep 23 04:17:42 Minecraft charon: 05[CFG] selected peer config 'ikev2-vpn'
    Sep 23 04:17:42 Minecraft charon: 05[IKE] EAP-Identity request configured, but not supported
    Sep 23 04:17:42 Minecraft charon: 05[IKE] loading EAP_MSCHAPV2 method failed
    Sep 23 04:17:42 Minecraft charon: 05[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
    Sep 23 04:17:42 Minecraft charon: 05[IKE] peer supports MOBIKE
    Sep 23 04:17:42 Minecraft charon: 05[ENC] generating IKE_AUTH response 1 [ IDr EAP/FAIL ]
    Sep 23 04:17:42 Minecraft charon: 05[NET] sending packet: from MYIPADDRESS[4500] to 195.37.108.234[41118] (96 bytes)
    

    cat /var/log/auth.log

    Sep 23 03:55:13 Minecraft ipsec_starter[25750]: Starting strongSwan 5.5.1 IPsec [starter]...
    Sep 23 03:55:13 Minecraft ipsec_starter[25750]: charon is already running (/var/run/charon.pid exists) -- skipping daemon start
    Sep 23 03:55:13 Minecraft ipsec_starter[25750]: no netkey IPsec stack detected
    Sep 23 03:55:13 Minecraft ipsec_starter[25750]: no KLIPS IPsec stack detected
    Sep 23 03:55:13 Minecraft ipsec_starter[25750]: no known IPsec stack detected, ignoring!
    Sep 23 03:55:13 Minecraft ipsec_starter[25750]: starter is already running (/var/run/starter.charon.pid exists) -- no fork done
    Sep 23 03:55:57 Minecraft charon: 04[IKE] 195.37.108.234 is initiating an IKE_SA
    Sep 23 03:55:59 Minecraft charon: 15[IKE] 195.37.108.234 is initiating an IKE_SA
    Sep 23 03:55:59 Minecraft charon: 06[IKE] 195.37.108.234 is initiating an IKE_SA
    Sep 23 03:57:10 Minecraft charon: 12[IKE] 195.37.108.234 is initiating an IKE_SA
    Sep 23 03:57:10 Minecraft charon: 11[IKE] 195.37.108.234 is initiating an IKE_SA
    Sep 23 03:57:15 Minecraft charon: 16[IKE] 195.37.108.234 is initiating an IKE_SA
    Sep 23 03:57:15 Minecraft charon: 05[IKE] 195.37.108.234 is initiating an IKE_SA
    Sep 23 03:57:20 Minecraft charon: 06[IKE] 195.37.108.234 is initiating an IKE_SA
    Sep 23 03:57:20 Minecraft charon: 10[IKE] 195.37.108.234 is initiating an IKE_SA
    Sep 23 03:57:26 Minecraft charon: 12[IKE] 195.37.108.234 is initiating an IKE_SA
    Sep 23 03:57:26 Minecraft charon: 11[IKE] 195.37.108.234 is initiating an IKE_SA
    Sep 23 04:17:42 Minecraft charon: 07[IKE] 195.37.108.234 is initiating an IKE_SA
    Sep 23 04:17:42 Minecraft charon: 16[IKE] 195.37.108.234 is initiating an IKE_SA
    

    A line in the server log has been edited and it states:

    At 04:17:42 on September 23rd, Minecraft’s charon reported a failure in loading the EAP_MSCHAPV2 method for authentication using IKE.

    It appears to me that this is the cause. Does anyone have a solution to resolve this issue?


    After editing, I modified the strongswan.conf file to include an additional line.

    load = aes des sha1 sha2 md4 md5 pem pkcs1 gmp random nonce x509 curl revocation hmac xcbc stroke kernel-netlink socket-default fips-prf eap-mschapv2 eap-identity updown
    

    Upon loading the ipsec statusall, I observed the EAP_MSCHAPV2 plugin, however, my attempt to connect resulted in the following message appearing in my syslog.

    Sep 23 05:03:44 Minecraft charon: 14[NET] received packet: from 195.37.108.234[46425] to MYIPADDRESS[500] (716 bytes)
    Sep 23 05:03:44 Minecraft charon: 14[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
    Sep 23 05:03:44 Minecraft charon: 14[IKE] 195.37.108.234 is initiating an IKE_SA
    Sep 23 05:03:44 Minecraft charon: 14[IKE] remote host is behind NAT
    Sep 23 05:03:44 Minecraft charon: 14[IKE] DH group ECP_256 inacceptable, requesting MODP_3072
    Sep 23 05:03:44 Minecraft charon: 14[ENC] generating IKE_SA_INIT response 0 [ N(INVAL_KE) ]
    Sep 23 05:03:44 Minecraft charon: 14[NET] sending packet: from MYIPADDRESS[500] to 195.37.108.234[46425] (38 bytes)
    Sep 23 05:03:44 Minecraft charon: 15[NET] received packet: from 195.37.108.234[46425] to MYIPADDRESS[500] (1036 bytes)
    Sep 23 05:03:44 Minecraft charon: 15[ENC] parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
    Sep 23 05:03:44 Minecraft charon: 15[IKE] 195.37.108.234 is initiating an IKE_SA
    Sep 23 05:03:44 Minecraft charon: 15[IKE] remote host is behind NAT
    Sep 23 05:03:44 Minecraft charon: 15[ENC] generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
    Sep 23 05:03:44 Minecraft charon: 15[NET] sending packet: from MYIPADDRESS[500] to 195.37.108.234[46425] (592 bytes)
    Sep 23 05:03:44 Minecraft charon: 10[NET] received packet: from 195.37.108.234[39639] to MYIPADDRESS[4500] (464 bytes)
    Sep 23 05:03:44 Minecraft charon: 10[ENC] parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
    Sep 23 05:03:44 Minecraft charon: 10[IKE] received cert request for "CN=VPN root CA"
    Sep 23 05:03:44 Minecraft charon: 10[CFG] looking for peer configs matching MYIPADDRESS[%any]...195.37.108.234[user1]
    Sep 23 05:03:44 Minecraft charon: 10[CFG] selected peer config 'ikev2-vpn'
    Sep 23 05:03:44 Minecraft charon: 10[IKE] initiating EAP_IDENTITY method (id 0x00)
    Sep 23 05:03:44 Minecraft charon: 10[IKE] received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
    Sep 23 05:03:44 Minecraft charon: 10[IKE] peer supports MOBIKE
    Sep 23 05:03:44 Minecraft charon: 10[IKE] authentication of 'MYIPADDRESS' (myself) with RSA_EMSA_PKCS1_SHA2_384 successful
    Sep 23 05:03:44 Minecraft charon: 10[IKE] sending end entity cert "CN=MYIPADDRESS"
    Sep 23 05:03:44 Minecraft charon: 10[ENC] generating IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ]
    Sep 23 05:03:44 Minecraft charon: 10[ENC] splitting IKE message with length of 1920 bytes into 2 fragments
    Sep 23 05:03:44 Minecraft charon: 10[ENC] generating IKE_AUTH response 1 [ EF(1/2) ]
    Sep 23 05:03:44 Minecraft charon: 10[ENC] generating IKE_AUTH response 1 [ EF(2/2) ]
    Sep 23 05:03:44 Minecraft charon: 10[NET] sending packet: from MYIPADDRESS[4500] to 195.37.108.234[39639] (1236 bytes)
    Sep 23 05:03:44 Minecraft charon: 10[NET] sending packet: from MYIPADDRESS[4500] to 195.37.108.234[39639] (756 bytes)
    Sep 23 05:03:44 Minecraft charon: 06[NET] received packet: from 195.37.108.234[39639] to MYIPADDRESS[4500] (80 bytes)
    Sep 23 05:03:44 Minecraft charon: 06[ENC] parsed IKE_AUTH request 2 [ EAP/RES/ID ]
    Sep 23 05:03:44 Minecraft charon: 06[IKE] received EAP identity 'user1'
    Sep 23 05:03:44 Minecraft charon: 06[IKE] initiating EAP_MSCHAPV2 method (id 0xEC)
    Sep 23 05:03:44 Minecraft charon: 06[ENC] generating IKE_AUTH response 2 [ EAP/REQ/MSCHAPV2 ]
    Sep 23 05:03:44 Minecraft charon: 06[NET] sending packet: from MYIPADDRESS[4500] to 195.37.108.234[39639] (112 bytes)
    Sep 23 05:03:45 Minecraft charon: 04[NET] received packet: from 195.37.108.234[39639] to MYIPADDRESS[4500] (144 bytes)
    Sep 23 05:03:45 Minecraft charon: 04[ENC] parsed IKE_AUTH request 3 [ EAP/RES/MSCHAPV2 ]
    Sep 23 05:03:45 Minecraft charon: 04[IKE] no EAP key found for hosts 'MYIPADDRESS' - 'user1'
    Sep 23 05:03:45 Minecraft charon: 04[IKE] EAP-MS-CHAPv2 verification failed, retry (1)
    Sep 23 05:03:47 Minecraft charon: 04[ENC] generating IKE_AUTH response 3 [ EAP/REQ/MSCHAPV2 ]
    Sep 23 05:03:47 Minecraft charon: 04[NET] sending packet: from MYIPADDRESS[4500] to 195.37.108.234[39639] (128 bytes)
    Sep 23 05:03:47 Minecraft charon: 05[NET] received packet: from 195.37.108.234[39639] to MYIPADDRESS[4500] (144 bytes)
    Sep 23 05:03:47 Minecraft charon: 05[ENC] parsed IKE_AUTH request 3 [ EAP/RES/MSCHAPV2 ]
    Sep 23 05:03:47 Minecraft charon: 05[IKE] received retransmit of request with ID 3, retransmitting response
    Sep 23 05:03:47 Minecraft charon: 05[NET] sending packet: from MYIPADDRESS[4500] to 195.37.108.234[39639] (128 bytes)
    Sep 23 05:03:47 Minecraft charon: 07[NET] received packet: from 195.37.108.234[39639] to MYIPADDRESS[4500] (80 bytes)
    Sep 23 05:03:47 Minecraft charon: 07[ENC] parsed INFORMATIONAL request 4 [ N(AUTH_FAILED) ]
    Sep 23 05:03:47 Minecraft charon: 07[ENC] generating INFORMATIONAL response 4 [ N(AUTH_FAILED) ]
    Sep 23 05:03:47 Minecraft charon: 07[NET] sending packet: from MYIPADDRESS[4500] to 195.37.108.234[39639] (80 bytes)
    

    where the row

    At 05:03:45 on September 23, Minecraft’s charon reported that there was no EAP key available for ‘user1’ at ‘MYIPADDRESS’.

    It feels peculiar as this file is confidential.

    # This file holds shared secrets or RSA private keys for authentication.
    # RSA private key for this host, authenticating it to any other host
    # which knows the public part.
    # this file is managed with debconf and will contain the automatically created $
    #include /var/lib/strongswan/ipsec.secrets.inc
    : RSA "server-key-vpn2.pem"
    user1: EAP "1234"
    user2 : EAP "hallo1234"
    

    Following every configuration file modification, I execute

    sudo systemctl restart strongswan

    and

    ipsec restart

    .

    New android log:

    Sep 23 11:07:57 00[DMN] +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    Sep 23 11:07:57 00[DMN] Starting IKE service (strongSwan 5.8.0dr2, Android 9 - PKQ1.181121.001/2019-08-01, Mi 9T Pro - Xiaomi/raphael_eea/Xiaomi, Linux 4.14.83-perf-g7723fb1, aarch64)
    Sep 23 11:07:57 00[LIB] loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls x509
    Sep 23 11:07:57 00[JOB] spawning 16 worker threads
    Sep 23 11:07:57 11[IKE] initiating IKE_SA android[29] to MYIPADDRESS
    Sep 23 11:07:57 11[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
    Sep 23 11:07:57 11[NET] sending packet: from 10.105.74.60[49105] to MYIPADDRESS[500] (716 bytes)
    Sep 23 11:07:57 12[NET] received packet: from MYIPADDRESS[500] to 10.105.74.60[49105] (38 bytes)
    Sep 23 11:07:57 12[ENC] parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
    Sep 23 11:07:57 12[IKE] peer didn't accept DH group ECP_256, it requested MODP_3072
    Sep 23 11:07:57 12[IKE] initiating IKE_SA android[29] to MYIPADDRESS
    Sep 23 11:07:57 12[ENC] generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
    Sep 23 11:07:57 12[NET] sending packet: from 10.105.74.60[49105] to MYIPADDRESS[500] (1036 bytes)
    Sep 23 11:07:57 07[NET] received packet: from MYIPADDRESS[500] to 10.105.74.60[49105] (592 bytes)
    Sep 23 11:07:57 07[ENC] parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
    Sep 23 11:07:57 07[CFG] selected proposal: IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_3072
    Sep 23 11:07:57 07[IKE] local host is behind NAT, sending keep alives
    Sep 23 11:07:57 07[IKE] remote host is behind NAT
    Sep 23 11:07:57 07[IKE] sending cert request for "CN=VPN root CA"
    Sep 23 11:07:57 07[IKE] establishing CHILD_SA android{29}
    Sep 23 11:07:57 07[ENC] generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
    Sep 23 11:07:57 07[NET] sending packet: from 10.105.74.60[49611] to MYIPADDRESS[4500] (464 bytes)
    Sep 23 11:07:58 14[NET] received packet: from MYIPADDRESS[4500] to 10.105.74.60[49611] (1236 bytes)
    Sep 23 11:07:58 14[ENC] parsed IKE_AUTH response 1 [ EF(1/2) ]
    Sep 23 11:07:58 14[ENC] received fragment #1 of 2, waiting for complete IKE message
    Sep 23 11:07:58 15[NET] received packet: from MYIPADDRESS[4500] to 10.105.74.60[49611] (756 bytes)
    Sep 23 11:07:58 15[ENC] parsed IKE_AUTH response 1 [ EF(2/2) ]
    Sep 23 11:07:58 15[ENC] received fragment #2 of 2, reassembled fragmented IKE message (1920 bytes)
    Sep 23 11:07:58 15[ENC] parsed IKE_AUTH response 1 [ IDr CERT AUTH EAP/REQ/ID ]
    Sep 23 11:07:58 15[IKE] received end entity cert "CN=MYIPADDRESS"
    Sep 23 11:07:58 15[CFG]   using certificate "CN=MYIPADDRESS"
    Sep 23 11:07:58 15[CFG]   using trusted ca certificate "CN=VPN root CA"
    Sep 23 11:07:58 15[CFG] checking certificate status of "CN=MYIPADDRESS"
    Sep 23 11:07:58 15[CFG] certificate status is not available
    Sep 23 11:07:58 15[CFG]   reached self-signed root ca with a path length of 0
    Sep 23 11:07:58 15[IKE] authentication of 'MYIPADDRESS' with RSA_EMSA_PKCS1_SHA2_384 successful
    Sep 23 11:07:58 15[IKE] server requested EAP_IDENTITY (id 0x00), sending 'user1'
    Sep 23 11:07:58 15[ENC] generating IKE_AUTH request 2 [ EAP/RES/ID ]
    Sep 23 11:07:58 15[NET] sending packet: from 10.105.74.60[49611] to MYIPADDRESS[4500] (80 bytes)
    Sep 23 11:07:58 11[NET] received packet: from MYIPADDRESS[4500] to 10.105.74.60[49611] (112 bytes)
    Sep 23 11:07:58 11[ENC] parsed IKE_AUTH response 2 [ EAP/REQ/MSCHAPV2 ]
    Sep 23 11:07:58 11[IKE] server requested EAP_MSCHAPV2 authentication (id 0x3C)
    Sep 23 11:07:58 11[ENC] generating IKE_AUTH request 3 [ EAP/RES/MSCHAPV2 ]
    Sep 23 11:07:58 11[NET] sending packet: from 10.105.74.60[49611] to MYIPADDRESS[4500] (144 bytes)
    Sep 23 11:08:00 13[IKE] retransmit 1 of request with message ID 3
    Sep 23 11:08:00 13[NET] sending packet: from 10.105.74.60[49611] to MYIPADDRESS[4500] (144 bytes)
    Sep 23 11:08:00 07[NET] received packet: from MYIPADDRESS[4500] to 10.105.74.60[49611] (128 bytes)
    Sep 23 11:08:00 07[ENC] parsed IKE_AUTH response 3 [ EAP/REQ/MSCHAPV2 ]
    Sep 23 11:08:00 07[IKE] EAP-MS-CHAPv2 failed with error ERROR_AUTHENTICATION_FAILURE: '(null)'
    Sep 23 11:08:00 07[IKE] EAP_MSCHAPV2 method failed
    Sep 23 11:08:00 07[ENC] generating INFORMATIONAL request 4 [ N(AUTH_FAILED) ]
    Sep 23 11:08:00 07[NET] sending packet: from 10.105.74.60[49611] to MYIPADDRESS[4500] (80 bytes)
    

    Понравилась статья? Поделить с друзьями:

    Интересное по теме:

  • Пользовательская ошибка 1 freshtunes
  • Получить победу речевая ошибка
  • Получена ошибка при проверке подключения ldap и rpc
  • Получить ошибку pdo
  • Пользователь уже существует код ошибки

  • Добавить комментарий

    ;-) :| :x :twisted: :smile: :shock: :sad: :roll: :razz: :oops: :o :mrgreen: :lol: :idea: :grin: :evil: :cry: :cool: :arrow: :???: :?: :!: