- Mitglied seit
- 14 Sep 2004
- Beiträge
- 3,272
- Punkte für Reaktionen
- 29
- Punkte
- 48
Hallo,
pünktlich zum morgen beginnenden Urlaub funktionieren die VPN-Verbindungen mit Shrew Soft zu sämtlichen Fritzboxen (Myfritz, DynDNS, direkte Eingabe der IP-Adresse) bei allen (Win10-) Rechnern an verschiedenen Standorten nicht mehr, egal, von welchem Anschluß aus. (Auch mit einem älteren Systemimage, mit dem es immer ging, ist das jetzt so.)
Weil ich nicht glaube, dass ich als Einziger betroffen bin, wollte ich mal fragen, ob jemand schon eine Lösung gefunden hat.
Auf den Fritzboxen (7490) ist Firmware 7.01 oder 7.11 installiert.
Das Problem sieht in Shrewsoft so aus:
bringing up tunnel ...
negotiation timout occurred
tunnel disabled
Ein VPN Trace bringt diese Meldung, jetzt die ausführliche Version (siehe #2).
Mit Android (6.0) kann ich immer noch ganz normal die VPN-Verbindung zu den Fritzboxen aufbauen.
Ich gehe davon aus, dass das Problem an Shrew Soft liegt (Zertifikat abgelaufen?).
Mit dem AVM-Fernzugang bin ich nicht weit gekommen, weil er Bluescreens (W10-x64-1903) erzeugt. Damit kann ich erst nach dem Urlaub weiter experimentieren.
Danke für die Zeit, die ich Euch mit dem Lesen meines Problems stehlen durfte.
pünktlich zum morgen beginnenden Urlaub funktionieren die VPN-Verbindungen mit Shrew Soft zu sämtlichen Fritzboxen (Myfritz, DynDNS, direkte Eingabe der IP-Adresse) bei allen (Win10-) Rechnern an verschiedenen Standorten nicht mehr, egal, von welchem Anschluß aus. (Auch mit einem älteren Systemimage, mit dem es immer ging, ist das jetzt so.)
Weil ich nicht glaube, dass ich als Einziger betroffen bin, wollte ich mal fragen, ob jemand schon eine Lösung gefunden hat.
Auf den Fritzboxen (7490) ist Firmware 7.01 oder 7.11 installiert.
Das Problem sieht in Shrewsoft so aus:
bringing up tunnel ...
negotiation timout occurred
tunnel disabled
Ein VPN Trace bringt diese Meldung, jetzt die ausführliche Version (siehe #2).
Code:
19/06/07 11:26:06 ## : IKE Daemon, ver 2.2.2
19/06/07 11:26:06 ## : Copyright 2013 Shrew Soft Inc.
19/06/07 11:26:06 ## : This product linked OpenSSL 1.0.1c 10 May 2012
19/06/07 11:26:06 ii : opened 'C:\Program Files\ShrewSoft\VPN Client\debug\iked.log'
19/06/07 11:26:06 ii : rebuilding vnet device list ...
19/06/07 11:26:06 ii : device ROOT\VNET\0000 disabled
19/06/07 11:26:06 ii : network process thread begin ...
19/06/07 11:26:06 ii : pfkey process thread begin ...
19/06/07 11:26:06 ii : ipc server process thread begin ...
19/06/07 11:26:09 !! : unable to connect to pfkey interface
19/06/07 11:26:26 ii : ipc client process thread begin ...
19/06/07 11:26:26 <A : peer config add message
19/06/07 11:26:26 <A : proposal config message
19/06/07 11:26:26 <A : proposal config message
19/06/07 11:26:26 <A : client config message
19/06/07 11:26:26 <A : xauth username message
19/06/07 11:26:26 <A : xauth password message
19/06/07 11:26:26 <A : local id 'Finanzen' message
19/06/07 11:26:26 <A : preshared key message
19/06/07 11:26:26 <A : remote resource message
19/06/07 11:26:26 <A : peer tunnel enable message
19/06/07 11:26:26 DB : peer added ( obj count = 1 )
19/06/07 11:26:26 ii : local address 192.168.178.222 selected for peer
19/06/07 11:26:26 DB : tunnel added ( obj count = 1 )
19/06/07 11:26:26 DB : new phase1 ( ISAKMP initiator )
19/06/07 11:26:26 DB : exchange type is aggressive
19/06/07 11:26:26 DB : 192.168.178.222:500 <-> 84.58.XXX.XXX:500
19/06/07 11:26:26 DB : a97f0c39595f7feb:0000000000000000
19/06/07 11:26:26 DB : phase1 added ( obj count = 1 )
19/06/07 11:26:26 >> : security association payload
19/06/07 11:26:26 >> : - proposal #1 payload
19/06/07 11:26:26 >> : -- transform #1 payload
19/06/07 11:26:26 >> : -- transform #2 payload
19/06/07 11:26:26 >> : -- transform #3 payload
19/06/07 11:26:26 >> : -- transform #4 payload
19/06/07 11:26:26 >> : -- transform #5 payload
19/06/07 11:26:26 >> : -- transform #6 payload
19/06/07 11:26:26 >> : -- transform #7 payload
19/06/07 11:26:26 >> : -- transform #8 payload
19/06/07 11:26:26 >> : -- transform #9 payload
19/06/07 11:26:26 >> : -- transform #10 payload
19/06/07 11:26:26 >> : -- transform #11 payload
19/06/07 11:26:26 >> : -- transform #12 payload
19/06/07 11:26:26 >> : -- transform #13 payload
19/06/07 11:26:26 >> : -- transform #14 payload
19/06/07 11:26:26 >> : -- transform #15 payload
19/06/07 11:26:26 >> : -- transform #16 payload
19/06/07 11:26:26 >> : -- transform #17 payload
19/06/07 11:26:26 >> : -- transform #18 payload
19/06/07 11:26:26 >> : key exchange payload
19/06/07 11:26:26 >> : nonce payload
19/06/07 11:26:26 >> : identification payload
19/06/07 11:26:26 >> : vendor id payload
19/06/07 11:26:26 ii : local supports XAUTH
19/06/07 11:26:26 >> : vendor id payload
19/06/07 11:26:26 ii : local supports nat-t ( draft v00 )
19/06/07 11:26:26 >> : vendor id payload
19/06/07 11:26:26 ii : local supports nat-t ( draft v01 )
19/06/07 11:26:26 >> : vendor id payload
19/06/07 11:26:26 ii : local supports nat-t ( draft v02 )
19/06/07 11:26:26 >> : vendor id payload
19/06/07 11:26:26 ii : local supports nat-t ( draft v03 )
19/06/07 11:26:26 >> : vendor id payload
19/06/07 11:26:26 ii : local supports nat-t ( rfc )
19/06/07 11:26:26 >> : vendor id payload
19/06/07 11:26:26 ii : local supports FRAGMENTATION
19/06/07 11:26:26 >> : vendor id payload
19/06/07 11:26:26 >> : vendor id payload
19/06/07 11:26:26 ii : local supports DPDv1
19/06/07 11:26:26 >> : vendor id payload
19/06/07 11:26:26 ii : local is SHREW SOFT compatible
19/06/07 11:26:26 >> : vendor id payload
19/06/07 11:26:26 ii : local is NETSCREEN compatible
19/06/07 11:26:26 >> : vendor id payload
19/06/07 11:26:26 ii : local is SIDEWINDER compatible
19/06/07 11:26:26 >> : vendor id payload
19/06/07 11:26:26 ii : local is CISCO UNITY compatible
19/06/07 11:26:26 >= : cookies a97f0c39595f7feb:0000000000000000
19/06/07 11:26:26 >= : message 00000000
19/06/07 11:26:26 -> : send IKE packet 192.168.178.222:500 -> 84.58.XXX.XXX:500 ( 1204 bytes )
19/06/07 11:26:26 DB : phase1 resend event scheduled ( ref count = 2 )
19/06/07 11:26:31 -> : resend 1 phase1 packet(s) [0/2] 192.168.178.222:500 -> 84.58.XXX.XXX:500
19/06/07 11:26:36 -> : resend 1 phase1 packet(s) [1/2] 192.168.178.222:500 -> 84.58.XXX.XXX:500
19/06/07 11:26:41 -> : resend 1 phase1 packet(s) [2/2] 192.168.178.222:500 -> 84.58.XXX.XXX:500
19/06/07 11:26:46 ii : resend limit exceeded for phase1 exchange
19/06/07 11:26:46 ii : phase1 removal before expire time
19/06/07 11:26:46 DB : phase1 deleted ( obj count = 0 )
19/06/07 11:26:46 DB : policy not found
19/06/07 11:26:46 DB : policy not found
19/06/07 11:26:46 DB : policy not found
19/06/07 11:26:46 DB : policy not found
19/06/07 11:26:46 DB : policy not found
19/06/07 11:26:46 DB : policy not found
19/06/07 11:26:46 DB : removing tunnel config references
19/06/07 11:26:46 DB : removing tunnel phase2 references
19/06/07 11:26:46 DB : removing tunnel phase1 references
19/06/07 11:26:46 DB : tunnel deleted ( obj count = 0 )
19/06/07 11:26:46 DB : removing all peer tunnel references
19/06/07 11:26:46 DB : peer deleted ( obj count = 0 )
19/06/07 11:26:46 ii : ipc client process thread exit ...
19/06/07 11:28:03 ii : ipc client process thread begin ...
19/06/07 11:28:03 <A : peer config add message
19/06/07 11:28:03 <A : proposal config message
19/06/07 11:28:03 <A : proposal config message
19/06/07 11:28:03 <A : client config message
19/06/07 11:28:03 <A : xauth username message
19/06/07 11:28:03 <A : xauth password message
19/06/07 11:28:03 <A : local id 'Finanzen' message
19/06/07 11:28:03 <A : preshared key message
19/06/07 11:28:03 <A : remote resource message
19/06/07 11:28:03 <A : peer tunnel enable message
19/06/07 11:28:03 DB : peer added ( obj count = 1 )
19/06/07 11:28:03 ii : local address 192.168.178.222 selected for peer
19/06/07 11:28:03 DB : tunnel added ( obj count = 1 )
19/06/07 11:28:03 DB : new phase1 ( ISAKMP initiator )
19/06/07 11:28:03 DB : exchange type is aggressive
19/06/07 11:28:03 DB : 192.168.178.222:500 <-> 84.58.XXX.XXX:500
19/06/07 11:28:03 DB : a0ee30bb42443d9a:0000000000000000
19/06/07 11:28:03 DB : phase1 added ( obj count = 1 )
19/06/07 11:28:03 >> : security association payload
19/06/07 11:28:03 >> : - proposal #1 payload
19/06/07 11:28:03 >> : -- transform #1 payload
19/06/07 11:28:03 >> : -- transform #2 payload
19/06/07 11:28:03 >> : -- transform #3 payload
19/06/07 11:28:03 >> : -- transform #4 payload
19/06/07 11:28:03 >> : -- transform #5 payload
19/06/07 11:28:03 >> : -- transform #6 payload
19/06/07 11:28:03 >> : -- transform #7 payload
19/06/07 11:28:03 >> : -- transform #8 payload
19/06/07 11:28:03 >> : -- transform #9 payload
19/06/07 11:28:03 >> : -- transform #10 payload
19/06/07 11:28:03 >> : -- transform #11 payload
19/06/07 11:28:03 >> : -- transform #12 payload
19/06/07 11:28:03 >> : -- transform #13 payload
19/06/07 11:28:03 >> : -- transform #14 payload
19/06/07 11:28:03 >> : -- transform #15 payload
19/06/07 11:28:03 >> : -- transform #16 payload
19/06/07 11:28:03 >> : -- transform #17 payload
19/06/07 11:28:03 >> : -- transform #18 payload
19/06/07 11:28:03 >> : key exchange payload
19/06/07 11:28:03 >> : nonce payload
19/06/07 11:28:03 >> : identification payload
19/06/07 11:28:03 >> : vendor id payload
19/06/07 11:28:03 ii : local supports XAUTH
19/06/07 11:28:03 >> : vendor id payload
19/06/07 11:28:03 ii : local supports nat-t ( draft v00 )
19/06/07 11:28:03 >> : vendor id payload
19/06/07 11:28:03 ii : local supports nat-t ( draft v01 )
19/06/07 11:28:03 >> : vendor id payload
19/06/07 11:28:03 ii : local supports nat-t ( draft v02 )
19/06/07 11:28:03 >> : vendor id payload
19/06/07 11:28:03 ii : local supports nat-t ( draft v03 )
19/06/07 11:28:03 >> : vendor id payload
19/06/07 11:28:03 ii : local supports nat-t ( rfc )
19/06/07 11:28:03 >> : vendor id payload
19/06/07 11:28:03 ii : local supports FRAGMENTATION
19/06/07 11:28:03 >> : vendor id payload
19/06/07 11:28:03 >> : vendor id payload
19/06/07 11:28:03 ii : local supports DPDv1
19/06/07 11:28:03 >> : vendor id payload
19/06/07 11:28:03 ii : local is SHREW SOFT compatible
19/06/07 11:28:03 >> : vendor id payload
19/06/07 11:28:03 ii : local is NETSCREEN compatible
19/06/07 11:28:03 >> : vendor id payload
19/06/07 11:28:03 ii : local is SIDEWINDER compatible
19/06/07 11:28:03 >> : vendor id payload
19/06/07 11:28:03 ii : local is CISCO UNITY compatible
19/06/07 11:28:03 >= : cookies a0ee30bb42443d9a:0000000000000000
19/06/07 11:28:03 >= : message 00000000
19/06/07 11:28:03 -> : send IKE packet 192.168.178.222:500 -> 84.58.XXX.XXX:500 ( 1204 bytes )
19/06/07 11:28:03 DB : phase1 resend event scheduled ( ref count = 2 )
19/06/07 11:28:08 -> : resend 1 phase1 packet(s) [0/2] 192.168.178.222:500 -> 84.58.XXX.XXX:500
19/06/07 11:28:13 -> : resend 1 phase1 packet(s) [1/2] 192.168.178.222:500 -> 84.58.XXX.XXX:500
19/06/07 11:28:18 -> : resend 1 phase1 packet(s) [2/2] 192.168.178.222:500 -> 84.58.XXX.XXX:500
19/06/07 11:28:23 ii : resend limit exceeded for phase1 exchange
19/06/07 11:28:23 ii : phase1 removal before expire time
19/06/07 11:28:23 DB : phase1 deleted ( obj count = 0 )
19/06/07 11:28:23 DB : policy not found
19/06/07 11:28:23 DB : policy not found
19/06/07 11:28:23 DB : policy not found
19/06/07 11:28:23 DB : policy not found
19/06/07 11:28:23 DB : policy not found
19/06/07 11:28:23 DB : policy not found
19/06/07 11:28:23 DB : removing tunnel config references
19/06/07 11:28:23 DB : removing tunnel phase2 references
19/06/07 11:28:23 DB : removing tunnel phase1 references
19/06/07 11:28:23 DB : tunnel deleted ( obj count = 0 )
19/06/07 11:28:23 DB : removing all peer tunnel references
19/06/07 11:28:23 DB : peer deleted ( obj count = 0 )
19/06/07 11:28:23 ii : ipc client process thread exit ...
19/06/07 11:28:47 ii : ipc client process thread begin ...
19/06/07 11:28:47 <A : peer config add message
19/06/07 11:28:47 <A : proposal config message
19/06/07 11:28:47 <A : proposal config message
19/06/07 11:28:47 <A : client config message
19/06/07 11:28:47 <A : xauth username message
19/06/07 11:28:47 <A : xauth password message
19/06/07 11:28:47 <A : local id 'XXXXXX' message
19/06/07 11:28:47 <A : preshared key message
19/06/07 11:28:47 <A : remote resource message
19/06/07 11:28:47 <A : peer tunnel enable message
19/06/07 11:28:47 DB : peer added ( obj count = 1 )
19/06/07 11:28:47 ii : local address 192.168.178.222 selected for peer
19/06/07 11:28:47 DB : tunnel added ( obj count = 1 )
19/06/07 11:28:47 DB : new phase1 ( ISAKMP initiator )
19/06/07 11:28:47 DB : exchange type is aggressive
19/06/07 11:28:47 DB : 192.168.178.222:500 <-> 84.58.XXX.XXX:500
19/06/07 11:28:47 DB : cb67f7244aeea508:0000000000000000
19/06/07 11:28:47 DB : phase1 added ( obj count = 1 )
19/06/07 11:28:47 >> : security association payload
19/06/07 11:28:47 >> : - proposal #1 payload
19/06/07 11:28:47 >> : -- transform #1 payload
19/06/07 11:28:47 >> : -- transform #2 payload
19/06/07 11:28:47 >> : -- transform #3 payload
19/06/07 11:28:47 >> : -- transform #4 payload
19/06/07 11:28:47 >> : -- transform #5 payload
19/06/07 11:28:47 >> : -- transform #6 payload
19/06/07 11:28:47 >> : -- transform #7 payload
19/06/07 11:28:47 >> : -- transform #8 payload
19/06/07 11:28:47 >> : -- transform #9 payload
19/06/07 11:28:47 >> : -- transform #10 payload
19/06/07 11:28:47 >> : -- transform #11 payload
19/06/07 11:28:47 >> : -- transform #12 payload
19/06/07 11:28:47 >> : -- transform #13 payload
19/06/07 11:28:47 >> : -- transform #14 payload
19/06/07 11:28:47 >> : -- transform #15 payload
19/06/07 11:28:47 >> : -- transform #16 payload
19/06/07 11:28:47 >> : -- transform #17 payload
19/06/07 11:28:47 >> : -- transform #18 payload
19/06/07 11:28:47 >> : key exchange payload
19/06/07 11:28:47 >> : nonce payload
19/06/07 11:28:47 >> : identification payload
19/06/07 11:28:47 >> : vendor id payload
19/06/07 11:28:47 ii : local supports XAUTH
19/06/07 11:28:47 >> : vendor id payload
19/06/07 11:28:47 ii : local supports nat-t ( draft v00 )
19/06/07 11:28:47 >> : vendor id payload
19/06/07 11:28:47 ii : local supports nat-t ( draft v01 )
19/06/07 11:28:47 >> : vendor id payload
19/06/07 11:28:47 ii : local supports nat-t ( draft v02 )
19/06/07 11:28:47 >> : vendor id payload
19/06/07 11:28:47 ii : local supports nat-t ( draft v03 )
19/06/07 11:28:47 >> : vendor id payload
19/06/07 11:28:47 ii : local supports nat-t ( rfc )
19/06/07 11:28:47 >> : vendor id payload
19/06/07 11:28:47 ii : local supports FRAGMENTATION
19/06/07 11:28:47 >> : vendor id payload
19/06/07 11:28:47 >> : vendor id payload
19/06/07 11:28:47 ii : local supports DPDv1
19/06/07 11:28:47 >> : vendor id payload
19/06/07 11:28:47 ii : local is SHREW SOFT compatible
19/06/07 11:28:47 >> : vendor id payload
19/06/07 11:28:47 ii : local is NETSCREEN compatible
19/06/07 11:28:47 >> : vendor id payload
19/06/07 11:28:47 ii : local is SIDEWINDER compatible
19/06/07 11:28:47 >> : vendor id payload
19/06/07 11:28:47 ii : local is CISCO UNITY compatible
19/06/07 11:28:47 >= : cookies cb67f7244aeea508:0000000000000000
19/06/07 11:28:47 >= : message 00000000
19/06/07 11:28:47 -> : send IKE packet 192.168.178.222:500 -> 84.58.XXX.XXX:500 ( 1204 bytes )
19/06/07 11:28:47 DB : phase1 resend event scheduled ( ref count = 2 )
19/06/07 11:28:52 -> : resend 1 phase1 packet(s) [0/2] 192.168.178.222:500 -> 84.58.XXX.XXX:500
19/06/07 11:28:57 -> : resend 1 phase1 packet(s) [1/2] 192.168.178.222:500 -> 84.58.XXX.XXX:500
19/06/07 11:29:02 -> : resend 1 phase1 packet(s) [2/2] 192.168.178.222:500 -> 84.58.XXX.XXX:500
19/06/07 11:29:07 ii : resend limit exceeded for phase1 exchange
19/06/07 11:29:07 ii : phase1 removal before expire time
19/06/07 11:29:07 DB : phase1 deleted ( obj count = 0 )
19/06/07 11:29:07 DB : policy not found
19/06/07 11:29:07 DB : policy not found
19/06/07 11:29:07 DB : policy not found
19/06/07 11:29:07 DB : policy not found
19/06/07 11:29:07 DB : policy not found
19/06/07 11:29:07 DB : policy not found
19/06/07 11:29:07 DB : removing tunnel config references
19/06/07 11:29:07 DB : removing tunnel phase2 references
19/06/07 11:29:07 DB : removing tunnel phase1 references
19/06/07 11:29:07 DB : tunnel deleted ( obj count = 0 )
19/06/07 11:29:07 DB : removing all peer tunnel references
19/06/07 11:29:07 DB : peer deleted ( obj count = 0 )
19/06/07 11:29:07 ii : ipc client process thread exit ...
Mit Android (6.0) kann ich immer noch ganz normal die VPN-Verbindung zu den Fritzboxen aufbauen.
Ich gehe davon aus, dass das Problem an Shrew Soft liegt (Zertifikat abgelaufen?).
Mit dem AVM-Fernzugang bin ich nicht weit gekommen, weil er Bluescreens (W10-x64-1903) erzeugt. Damit kann ich erst nach dem Urlaub weiter experimentieren.
Danke für die Zeit, die ich Euch mit dem Lesen meines Problems stehlen durfte.
Zuletzt bearbeitet: