There's more than one possible problem.
First suggestion: Even if it's a good idea to obfuscate the real configuration ... your editings to the configuration and log files render them useless, because no one can see possible format errors anymore. If you have post some of them later again, try to substitute the real values with more readable replacements preserving the structure. The value "
[email protected]" looks like an IP address and a domain name, "%IP@something%" is gibberish (I'd assume, IP is "257.10.11.987", is this correct ?).
Reading your StrongSwan log file I get the impression, that your FRITZ!Box is using a dynamic address and your StrongSwan installation is unable to locate the correct pre-shared key in main mode. Try to use aggressive mode, if the originator is using a dynamic IP address.
You have to initiate the IPSec connection from the dynamic address in this case and it looks like your StrongSwan installation is unable to find the right key, because in main mode only the originating IP address (or a certificate, but that's not supported by AVM's firmware) can be used as a key to find the correct PSK value. In aggressive mode this information is submitted within the first packet and the key may be found. I'm using another IPSec implementation, therefore I'm unsure, if StrongSwan can accept aggressive mode as responder ... but afaik, there's a good manual, which should answer the question.
An additional pitfall could be the difference between "native" IPSec and "NAT traversal". If your Ubuntu system is not using a public IP address (that means, it is not connected to the internet directly), set your StrongSwan installation to "mandatory NAT-T mode". The final result is the limitation to a single UDP port (4500) for the whole IPSec traffic. The last line of your StrongSwan log shows, that the two systems try to communicate over UDP port 500, which would require an additional ESP channel (proto 50) and can render some additional problems in a scenario, where the Ubuntu system is located behind a (NAT) router.
The third question is, if it's possible to merged phase1 authentications (ipaddr on one and fqdn on the other side). These settings aren't real "addresses", the values are used as lookup keys to find the correct settings on each side and there's no reason to mix them up like you did. Here I'm unsure, if it's possible ... but I would not try it as first attempt.
And last, but not least ... why is your "left subnet" not really set ? First you should try to install a working connection and later you can expand it to suit your needs.
Your intention looks a little bit curious ... first you install a left subnet of 0/0 and later you try to limit the access over the IPSec tunnel to a single host (10.177.177.2) ? Publishing configuration and log files is a good decision ... but writing some lines of "context" (the idea, you want to realize) and to minimize the "masquerading" of real settings within the config and log files would be an even better one.