Dear Paul,

Thank you very much for the suggestion. Unfortunately the client doesn't have options for choosing the algorithms. I then added

   ike=3des-md5;modp1536,3des-sha1;modp1536,aes-sha1;modp1536,aes-md5;modp1536

to my ipsec.conf, but I am getting pretty much the same result in the log:

   NSS DB directory: sql:/var/lib/ipsec/nss
   Initializing NSS
   Opening NSS database "sql:/var/lib/ipsec/nss" read-only
   NSS initialized
   NSS crypto library initialized
   FIPS HMAC integrity support [disabled]
   libcap-ng support [enabled]
   Linux audit support [enabled]
   Linux audit activated
   Starting Pluto (Libreswan Version 3.29 XFRM(netkey) esp-hw-offload
   FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC
   SYSTEMD_WATCHDOG LABELED_IPSEC LIBCAP_NG LINUX_AUDIT XAUTH_PAM
   NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS)) pid:7125
   core dump dir: /run/pluto
   secrets file: /etc/ipsec.secrets
   leak-detective enabled
   NSS crypto [enabled]
   XAUTH PAM support [enabled]
   | libevent is using pluto's memory allocator
   Initializing libevent in pthreads mode: headers: 2.1.11-stable
   (2010b00); library: 2.1.11-stable (2010b00)
   | libevent_malloc: new ptr-libevent@0x55b964c91e18 size 40
   | libevent_malloc: new ptr-libevent@0x55b964c918a8 size 40
   | libevent_malloc: new ptr-libevent@0x55b964c91fc8 size 40
   | creating event base
   | libevent_malloc: new ptr-libevent@0x55b964c93238 size 56
   | libevent_malloc: new ptr-libevent@0x55b964cb53c8 size 664
   | libevent_malloc: new ptr-libevent@0x55b964cb5698 size 24
   | libevent_malloc: new ptr-libevent@0x55b964cb56e8 size 384
   | libevent_malloc: new ptr-libevent@0x55b964cb4f78 size 16
   | libevent_malloc: new ptr-libevent@0x55b964c94628 size 40
   | libevent_malloc: new ptr-libevent@0x55b964c91f38 size 48
   | libevent_realloc: new ptr-libevent@0x55b964c95f88 size 256
   | libevent_malloc: new ptr-libevent@0x55b964cb5898 size 16
   | libevent_free: release ptr-libevent@0x55b964c93238
   | libevent initialized
   | init_nat_traversal() initialized with keep_alive=0s
   NAT-Traversal support  [enabled]
   | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized
   | global one-shot timer EVENT_FREE_ROOT_CERTS initialized
   | libevent_realloc: new ptr-libevent@0x55b964c92cf8 size 64
   | global periodic timer EVENT_REINIT_SECRET enabled with interval of
   3600 seconds
   | global one-shot timer EVENT_REVIVE_CONNS initialized
   | global periodic timer EVENT_PENDING_DDNS enabled with interval of
   60 seconds
   | global periodic timer EVENT_PENDING_PHASE2 enabled with interval
   of 120 seconds
   Encryption algorithms:
      AES_CCM_16              IKEv1:     ESP     IKEv2:     ESP FIPS 
   {256,192,*128}  aes_ccm, aes_ccm_c
      AES_CCM_12              IKEv1:     ESP     IKEv2:     ESP FIPS 
   {256,192,*128}  aes_ccm_b
      AES_CCM_8               IKEv1:     ESP     IKEv2:     ESP FIPS 
   {256,192,*128}  aes_ccm_a
      3DES_CBC                IKEv1: IKE ESP     IKEv2: IKE ESP FIPS 
   [*192]  3des
      CAMELLIA_CTR            IKEv1:     ESP     IKEv2: ESP          
   {256,192,*128}
      CAMELLIA_CBC            IKEv1: IKE ESP     IKEv2: IKE
   ESP           {256,192,*128}  camellia
      AES_GCM_16              IKEv1:     ESP     IKEv2: IKE ESP FIPS 
   {256,192,*128}  aes_gcm, aes_gcm_c
      AES_GCM_12              IKEv1:     ESP     IKEv2: IKE ESP FIPS 
   {256,192,*128}  aes_gcm_b
      AES_GCM_8               IKEv1:     ESP     IKEv2: IKE ESP FIPS 
   {256,192,*128}  aes_gcm_a
      AES_CTR                 IKEv1: IKE ESP     IKEv2: IKE ESP FIPS 
   {256,192,*128}  aesctr
      AES_CBC                 IKEv1: IKE ESP     IKEv2: IKE ESP FIPS 
   {256,192,*128}  aes
      SERPENT_CBC             IKEv1: IKE ESP     IKEv2: IKE
   ESP           {256,192,*128}  serpent
      TWOFISH_CBC             IKEv1: IKE ESP     IKEv2: IKE
   ESP           {256,192,*128}  twofish
      TWOFISH_SSH             IKEv1: IKE         IKEv2: IKE
   ESP           {256,192,*128}  twofish_cbc_ssh
      NULL_AUTH_AES_GMAC      IKEv1:     ESP     IKEv2:     ESP FIPS 
   {256,192,*128}  aes_gmac
      NULL                    IKEv1:     ESP     IKEv2: ESP           []
      CHACHA20_POLY1305       IKEv1:             IKEv2: IKE
   ESP           [*256]  chacha20poly1305
   Hash algorithms:
      MD5                     IKEv1: IKE IKEv2:
      SHA1                    IKEv1: IKE         IKEv2: FIPS  sha
      SHA2_256                IKEv1: IKE         IKEv2: FIPS  sha2, sha256
      SHA2_384                IKEv1: IKE         IKEv2: FIPS  sha384
      SHA2_512                IKEv1: IKE         IKEv2: FIPS  sha512
   PRF algorithms:
      HMAC_MD5                IKEv1: IKE         IKEv2:
   IKE               md5
      HMAC_SHA1               IKEv1: IKE         IKEv2: IKE FIPS  sha, sha1
      HMAC_SHA2_256           IKEv1: IKE         IKEv2: IKE FIPS  sha2,
   sha256, sha2_256
      HMAC_SHA2_384           IKEv1: IKE         IKEv2: IKE FIPS 
   sha384, sha2_384
      HMAC_SHA2_512           IKEv1: IKE         IKEv2: IKE FIPS 
   sha512, sha2_512
      AES_XCBC                IKEv1:             IKEv2:
   IKE               aes128_xcbc
   Integrity algorithms:
      HMAC_MD5_96             IKEv1: IKE ESP AH  IKEv2: IKE ESP
   AH        md5, hmac_md5
      HMAC_SHA1_96            IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
   FIPS  sha, sha1, sha1_96, hmac_sha1
      HMAC_SHA2_512_256       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
   FIPS  sha512, sha2_512, sha2_512_256, hmac_sha2_512
      HMAC_SHA2_384_192       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
   FIPS  sha384, sha2_384, sha2_384_192, hmac_sha2_384
      HMAC_SHA2_256_128       IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
   FIPS  sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256
      HMAC_SHA2_256_TRUNCBUG  IKEv1:     ESP AH  IKEv2: AH
      AES_XCBC_96             IKEv1:     ESP AH  IKEv2: IKE ESP
   AH        aes_xcbc, aes128_xcbc, aes128_xcbc_96
      AES_CMAC_96             IKEv1:     ESP AH  IKEv2:     ESP AH
   FIPS  aes_cmac
      NONE                    IKEv1:     ESP     IKEv2: IKE ESP FIPS  null
   DH algorithms:
      NONE                    IKEv1:             IKEv2: IKE ESP AH
   FIPS  null, dh0
      MODP1024                IKEv1: IKE ESP AH  IKEv2: IKE ESP
   AH        dh2
      MODP1536                IKEv1: IKE ESP AH  IKEv2: IKE ESP
   AH        dh5
      MODP2048                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
   FIPS  dh14
      MODP3072                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
   FIPS  dh15
      MODP4096                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
   FIPS  dh16
      MODP6144                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
   FIPS  dh17
      MODP8192                IKEv1: IKE ESP AH  IKEv2: IKE ESP AH
   FIPS  dh18
      DH19                    IKEv1: IKE         IKEv2: IKE ESP AH
   FIPS  ecp_256, ecp256
      DH20                    IKEv1: IKE         IKEv2: IKE ESP AH
   FIPS  ecp_384, ecp384
      DH21                    IKEv1: IKE         IKEv2: IKE ESP AH
   FIPS  ecp_521, ecp521
      DH31                    IKEv1: IKE         IKEv2: IKE ESP
   AH        curve25519
   8 CPU cores online
   starting up 7 crypto helpers
   started thread for crypto helper 0
   started thread for crypto helper 1
   | starting up helper thread 0
   seccomp security for crypto helper not supported
   | starting up helper thread 1
   seccomp security for crypto helper not supported
   | status value returned by setting the priority of this thread
   (crypto helper 1) 22
   | crypto helper 1 waiting (nothing to do)
   | starting up helper thread 2
   seccomp security for crypto helper not supported
   | status value returned by setting the priority of this thread
   (crypto helper 2) 22
   started thread for crypto helper 2
   | status value returned by setting the priority of this thread
   (crypto helper 0) 22
   | starting up helper thread 3
   started thread for crypto helper 3
   started thread for crypto helper 4
   | crypto helper 2 waiting (nothing to do)
   started thread for crypto helper 5
   | crypto helper 0 waiting (nothing to do)
   seccomp security for crypto helper not supported
   started thread for crypto helper 6
   | status value returned by setting the priority of this thread
   (crypto helper 3) 22
   | starting up helper thread 4
   | checking IKEv1 state table
   |   MAIN_R0: category: half-open IKE SA flags: 0:
   |     -> MAIN_R1 EVENT_SO_DISCARD
   | starting up helper thread 6
   seccomp security for crypto helper not supported
   | status value returned by setting the priority of this thread
   (crypto helper 6) 22
   | crypto helper 3 waiting (nothing to do)
   seccomp security for crypto helper not supported
   |   MAIN_I1: category: half-open IKE SA flags: 0:
   | status value returned by setting the priority of this thread
   (crypto helper 4) 22
   |     -> MAIN_I2 EVENT_RETRANSMIT
   | starting up helper thread 5
   | crypto helper 4 waiting (nothing to do)
   |   MAIN_R1: category: open IKE SA flags: 200:
   |     -> MAIN_R2 EVENT_RETRANSMIT
   |     -> UNDEFINED EVENT_RETRANSMIT
   seccomp security for crypto helper not supported
   |     -> UNDEFINED EVENT_RETRANSMIT
   | status value returned by setting the priority of this thread
   (crypto helper 5) 22
   |   MAIN_I2: category: open IKE SA flags: 0:
   |     -> MAIN_I3 EVENT_RETRANSMIT
   |     -> UNDEFINED EVENT_RETRANSMIT
   |     -> UNDEFINED EVENT_RETRANSMIT
   |   MAIN_R2: category: open IKE SA flags: 0:
   |     -> MAIN_R3 EVENT_SA_REPLACE
   |     -> MAIN_R3 EVENT_SA_REPLACE
   |     -> UNDEFINED EVENT_SA_REPLACE
   | crypto helper 5 waiting (nothing to do)
   |   MAIN_I3: category: open IKE SA flags: 0:
   |     -> MAIN_I4 EVENT_SA_REPLACE
   |     -> MAIN_I4 EVENT_SA_REPLACE
   |     -> UNDEFINED EVENT_SA_REPLACE
   |   MAIN_R3: category: established IKE SA flags: 200:
   |     -> UNDEFINED EVENT_NULL
   |   MAIN_I4: category: established IKE SA flags: 0:
   |     -> UNDEFINED EVENT_NULL
   |   AGGR_R0: category: half-open IKE SA flags: 0:
   |     -> AGGR_R1 EVENT_SO_DISCARD
   |   AGGR_I1: category: half-open IKE SA flags: 0:
   |     -> AGGR_I2 EVENT_SA_REPLACE
   |     -> AGGR_I2 EVENT_SA_REPLACE
   |   AGGR_R1: category: open IKE SA flags: 200:
   |     -> AGGR_R2 EVENT_SA_REPLACE
   |     -> AGGR_R2 EVENT_SA_REPLACE
   |   AGGR_I2: category: established IKE SA flags: 200:
   |     -> UNDEFINED EVENT_NULL
   |   AGGR_R2: category: established IKE SA flags: 0:
   |     -> UNDEFINED EVENT_NULL
   |   QUICK_R0: category: established CHILD SA flags: 0:
   |     -> QUICK_R1 EVENT_RETRANSMIT
   |   QUICK_I1: category: established CHILD SA flags: 0:
   |     -> QUICK_I2 EVENT_SA_REPLACE
   | crypto helper 6 waiting (nothing to do)
   |   QUICK_R1: category: established CHILD SA flags: 0:
   |     -> QUICK_R2 EVENT_SA_REPLACE
   |   QUICK_I2: category: established CHILD SA flags: 200:
   |     -> UNDEFINED EVENT_NULL
   |   QUICK_R2: category: established CHILD SA flags: 0:
   |     -> UNDEFINED EVENT_NULL
   |   INFO: category: informational flags: 0:
   |     -> UNDEFINED EVENT_NULL
   |   INFO_PROTECTED: category: informational flags: 0:
   |     -> UNDEFINED EVENT_NULL
   |   XAUTH_R0: category: established IKE SA flags: 0:
   |     -> XAUTH_R1 EVENT_NULL
   |   XAUTH_R1: category: established IKE SA flags: 0:
   |     -> MAIN_R3 EVENT_SA_REPLACE
   |   MODE_CFG_R0: category: informational flags: 0:
   |     -> MODE_CFG_R1 EVENT_SA_REPLACE
   |   MODE_CFG_R1: category: established IKE SA flags: 0:
   |     -> MODE_CFG_R2 EVENT_SA_REPLACE
   |   MODE_CFG_R2: category: established IKE SA flags: 0:
   |     -> UNDEFINED EVENT_NULL
   |   MODE_CFG_I1: category: established IKE SA flags: 0:
   |     -> MAIN_I4 EVENT_SA_REPLACE
   |   XAUTH_I0: category: established IKE SA flags: 0:
   |     -> XAUTH_I1 EVENT_RETRANSMIT
   |   XAUTH_I1: category: established IKE SA flags: 0:
   |     -> MAIN_I4 EVENT_RETRANSMIT
   | checking IKEv2 state table
   |   PARENT_I0: category: ignore flags: 0:
   |     -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT)
   |   PARENT_I1: category: half-open IKE SA flags: 0:
   |     -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process
   SA_INIT reply notification)
   |     -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process
   IKE_SA_INIT reply, initiate IKE_AUTH)
   |   PARENT_I2: category: open IKE SA flags: 0:
   |     -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX
   AUTH notification)
   |     -> PARENT_I2 EVENT_NULL (Initiator: process
   AUTHENTICATION_FAILED AUTH notification)
   |     -> PARENT_I2 EVENT_NULL (Initiator: process
   UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification)
   |     -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH
   response)
   |     -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response
   containing unknown notification)
   |   PARENT_I3: category: established IKE SA flags: 0:
   |     -> PARENT_I3 EVENT_RETAIN (I3: Informational Request)
   |     -> PARENT_I3 EVENT_RETAIN (I3: Informational Response)
   |     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request)
   |     -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response)
   |   PARENT_R1: category: half-open IKE SA flags: 0:
   |     -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process
   IKE_AUTH request (no SKEYSEED))
   |     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder:
   process IKE_AUTH request)
   |   PARENT_R2: category: established IKE SA flags: 0:
   |     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request)
   |     -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response)
   |     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request)
   |     -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response)
   |   V2_CREATE_I0: category: established IKE SA flags: 0:
   |     -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate
   CREATE_CHILD_SA IPsec SA)
   |   V2_CREATE_I: category: established IKE SA flags: 0:
   |     -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec
   SA Response)
   |   V2_REKEY_IKE_I0: category: established IKE SA flags: 0:
   |     -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate
   CREATE_CHILD_SA IKE Rekey)
   |   V2_REKEY_IKE_I: category: established IKE SA flags: 0:
   |     -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE
   Rekey Response)
   |   V2_REKEY_CHILD_I0: category: established IKE SA flags: 0:
   |     -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate
   CREATE_CHILD_SA IPsec Rekey SA)
   |   V2_REKEY_CHILD_I: category: established IKE SA flags: 0: <none>
   |   V2_CREATE_R: category: established IKE SA flags: 0:
   |     -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to
   CREATE_CHILD_SA IPsec SA Request)
   |   V2_REKEY_IKE_R: category: established IKE SA flags: 0:
   |     -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to
   CREATE_CHILD_SA IKE Rekey)
   |   V2_REKEY_CHILD_R: category: established IKE SA flags: 0: <none>
   |   V2_IPSEC_I: category: established CHILD SA flags: 0: <none>
   |   V2_IPSEC_R: category: established CHILD SA flags: 0: <none>
   |   IKESA_DEL: category: established IKE SA flags: 0:
   |     -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL)
   |   CHILDSA_DEL: category: informational flags: 0: <none>
   |   PARENT_R0: category: half-open IKE SA flags: 0:
   |     -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to
   IKE_SA_INIT)
   Using Linux XFRM/NETKEY IPsec interface code on 5.13.0-35-generic
   | Hard-wiring algorithms
   | adding AES_CCM_16 to kernel algorithm db
   | adding AES_CCM_12 to kernel algorithm db
   | adding AES_CCM_8 to kernel algorithm db
   | adding 3DES_CBC to kernel algorithm db
   | adding CAMELLIA_CBC to kernel algorithm db
   | adding AES_GCM_16 to kernel algorithm db
   | adding AES_GCM_12 to kernel algorithm db
   | adding AES_GCM_8 to kernel algorithm db
   | adding AES_CTR to kernel algorithm db
   | adding AES_CBC to kernel algorithm db
   | adding SERPENT_CBC to kernel algorithm db
   | adding TWOFISH_CBC to kernel algorithm db
   | adding NULL_AUTH_AES_GMAC to kernel algorithm db
   | adding NULL to kernel algorithm db
   | adding CHACHA20_POLY1305 to kernel algorithm db
   | adding HMAC_MD5_96 to kernel algorithm db
   | adding HMAC_SHA1_96 to kernel algorithm db
   | adding HMAC_SHA2_512_256 to kernel algorithm db
   | adding HMAC_SHA2_384_192 to kernel algorithm db
   | adding HMAC_SHA2_256_128 to kernel algorithm db
   | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db
   | adding AES_XCBC_96 to kernel algorithm db
   | adding AES_CMAC_96 to kernel algorithm db
   | adding NONE to kernel algorithm db
   | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20
   seconds
   | setup kernel fd callback
   | pluto_event_add: new KERNEL_XRM_FD-pe@0x55b964c931c8
   | libevent_malloc: new ptr-libevent@0x55b964c9e388 size 128
   | libevent_malloc: new ptr-libevent@0x55b964cbaa98 size 16
   | pluto_event_add: new KERNEL_ROUTE_FD-pe@0x55b964c92078
   | libevent_malloc: new ptr-libevent@0x55b964c9e688 size 128
   | libevent_malloc: new ptr-libevent@0x55b964cbaa58 size 16
   | global one-shot timer EVENT_CHECK_CRLS initialized
   selinux support is NOT enabled.
   systemd watchdog for ipsec service configured with timeout of
   200000000 usecs
   watchdog: sending probes every 100 secs
   | pluto_sd: executing action action: start(2), status 0
   | global periodic timer EVENT_SD_WATCHDOG enabled with interval of
   100 seconds
   | unbound context created - setting debug level to 5
   | /etc/hosts lookups activated
   | /etc/resolv.conf usage activated
   | outgoing-port-avoid set 0-65535
   | outgoing-port-permit set 32768-60999
   | Loading dnssec root key from:/usr/share/dns/root.key
   | No additional dnssec trust anchors defined via dnssec-trusted= option
   | Setting up events, loop start
   | pluto_event_add: new PLUTO_CTL_FD-pe@0x55b964c92168
   | libevent_malloc: new ptr-libevent@0x55b964cc5aa8 size 128
   | libevent_malloc: new ptr-libevent@0x55b964cc79c8 size 16
   | libevent_realloc: new ptr-libevent@0x55b964cc9118 size 256
   | libevent_malloc: new ptr-libevent@0x55b964cc9248 size 8
   | libevent_realloc: new ptr-libevent@0x55b964c94488 size 144
   | libevent_malloc: new ptr-libevent@0x55b964c32ed8 size 152
   | libevent_malloc: new ptr-libevent@0x55b964cc9288 size 16
   | signal event handler PLUTO_SIGCHLD installed
   | libevent_malloc: new ptr-libevent@0x55b964cc92c8 size 8
   | libevent_malloc: new ptr-libevent@0x55b964c32d08 size 152
   | signal event handler PLUTO_SIGTERM installed
   | libevent_malloc: new ptr-libevent@0x55b964cc9308 size 8
   | libevent_malloc: new ptr-libevent@0x55b964c30738 size 152
   | signal event handler PLUTO_SIGHUP installed
   | created addconn helper (pid:7133) using fork+execve
   | forked child 7133
   seccomp security not supported
   | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen)
   -> fd@14 (in whack_handle() at rcv_whack.c:717)
   | Added new connection xauth-psk with policy
   
PSK+ENCRYPT+TUNNEL+DONT_REKEY+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
   | ike (phase1) algorithm values: 3DES_CBC-HMAC_MD5-MODP1536,
   3DES_CBC-HMAC_SHA1-MODP1536, AES_CBC-HMAC_SHA1-MODP1536,
   AES_CBC-HMAC_MD5-MODP1536
   | counting wild cards for <server.address.redacted> is 0
   | counting wild cards for (none) is 15
   | add new addresspool to global pools 10.231.247.10-10.231.247.254
   size 245 ptr 0x55b964cc9f98
   | based upon policy, the connection is a template.
   | reference addresspool of conn xauth-psk[0] kind CK_TEMPLATE refcnt 0
   added connection description "xauth-psk"
   | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s;
   rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy:
   
PSK+ENCRYPT+TUNNEL+DONT_REKEY+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
   |
   
0.0.0.0/0===<server.address.redacted><<server.address.redacted>>[MS+XS+S=C]...%any[+MC+XC+S=C]
   | close_any(fd@14) (in whack_process() at rcv_whack.c:698)
   | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen)
   -> fd@14 (in whack_handle() at rcv_whack.c:717)
   | pluto_sd: executing action action: reloading(4), status 0
   listening for IKE messages
   | Inspecting interface lo
   | found lo with address 127.0.0.1
   | Inspecting interface enp0s31f6
   | found enp0s31f6 with address 192.168.0.56
   | Inspecting interface ap0
   | found ap0 with address 192.168.12.1
   | Inspecting interface vipnet
   | found vipnet with address <server.address.redacted>
   Kernel supports NIC esp-hw-offload
   adding interface vipnet/vipnet (esp-hw-offload=no)
   <server.address.redacted>:500
   | NAT-Traversal: Trying sockopt style NAT-T
   | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T
   family IPv4
   adding interface vipnet/vipnet <server.address.redacted>:4500
   Kernel supports NIC esp-hw-offload
   adding interface ap0/ap0 (esp-hw-offload=no) 192.168.12.1:500
   | NAT-Traversal: Trying sockopt style NAT-T
   | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T
   family IPv4
   adding interface ap0/ap0 192.168.12.1:4500
   Kernel supports NIC esp-hw-offload
   adding interface enp0s31f6/enp0s31f6 (esp-hw-offload=no)
   192.168.0.56:500
   | NAT-Traversal: Trying sockopt style NAT-T
   | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T
   family IPv4
   adding interface enp0s31f6/enp0s31f6 192.168.0.56:4500
   Kernel supports NIC esp-hw-offload
   adding interface lo/lo (esp-hw-offload=no) 127.0.0.1:500
   | NAT-Traversal: Trying sockopt style NAT-T
   | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T
   family IPv4
   adding interface lo/lo 127.0.0.1:4500
   | found lo with address 0000:0000:0000:0000:0000:0000:0000:0001
   | sorting 1 interfaces
   Kernel supports NIC esp-hw-offload
   adding interface lo/lo (esp-hw-offload=no) ::1:500
   | connect_to_host_pair: <server.address.redacted>:500 0.0.0.0:500 ->
   hp:none
   | pluto_event_add: new ethX-pe@0x55b964c9dbc8
   | libevent_malloc: new ptr-libevent@0x55b964cc21e8 size 128
   | libevent_malloc: new ptr-libevent@0x55b964cca798 size 16
   | setup callback for interface lo:500 fd 23
   | pluto_event_add: new ethX-pe@0x55b964cca7d8
   | libevent_malloc: new ptr-libevent@0x55b964c9e788 size 128
   | libevent_malloc: new ptr-libevent@0x55b964cca848 size 16
   | setup callback for interface lo:4500 fd 22
   | pluto_event_add: new ethX-pe@0x55b964cca888
   | libevent_malloc: new ptr-libevent@0x55b964c9e988 size 128
   | libevent_malloc: new ptr-libevent@0x55b964cca8f8 size 16
   | setup callback for interface lo:500 fd 21
   | pluto_event_add: new ethX-pe@0x55b964cca938
   | libevent_malloc: new ptr-libevent@0x55b964c9e888 size 128
   | libevent_malloc: new ptr-libevent@0x55b964cca9a8 size 16
   | setup callback for interface enp0s31f6:4500 fd 20
   | pluto_event_add: new ethX-pe@0x55b964cca9e8
   | libevent_malloc: new ptr-libevent@0x55b964c9e588 size 128
   | libevent_malloc: new ptr-libevent@0x55b964ccaa58 size 16
   | setup callback for interface enp0s31f6:500 fd 19
   | pluto_event_add: new ethX-pe@0x55b964ccaa98
   | libevent_malloc: new ptr-libevent@0x55b964c9e488 size 128
   | libevent_malloc: new ptr-libevent@0x55b964ccab08 size 16
   | setup callback for interface ap0:4500 fd 18
   | pluto_event_add: new ethX-pe@0x55b964ccab48
   | libevent_malloc: new ptr-libevent@0x55b964ccabb8 size 128
   | libevent_malloc: new ptr-libevent@0x55b964ccac68 size 16
   | setup callback for interface ap0:500 fd 17
   | pluto_event_add: new ethX-pe@0x55b964ccaca8
   | libevent_malloc: new ptr-libevent@0x55b964ccad18 size 128
   | libevent_malloc: new ptr-libevent@0x55b964ccadc8 size 16
   | setup callback for interface vipnet:4500 fd 16
   | pluto_event_add: new ethX-pe@0x55b964ccae08
   | libevent_malloc: new ptr-libevent@0x55b964ccae78 size 128
   | libevent_malloc: new ptr-libevent@0x55b964ccaf28 size 16
   | setup callback for interface vipnet:500 fd 15
   | certs and keys locked by 'free_preshared_secrets'
   | certs and keys unlocked by 'free_preshared_secrets'
   loading secrets from "/etc/ipsec.secrets"
   | Processing PSK at line 2: passed
   | certs and keys locked by 'process_secret'
   | certs and keys unlocked by 'process_secret'
   | pluto_sd: executing action action: ready(5), status 0
   | close_any(fd@14) (in whack_process() at rcv_whack.c:698)
   | signal PLUTO_SIGCHLD event
   | waitpid returned pid 7133 (exited with status 0)
   | reaped addconn helper child (status 0)
   | waitpid returned ECHILD (no child processes left)
   |  kernel_process_msg_cb process netlink message
   | netlink_get: XFRM_MSG_NEWSA message
   | *received 572 bytes from 192.168.12.87:1500 on vipnet (port=500)
   |   0c 75 da 3b  07 7a f1 49  00 00 00 00  00 00 00 00
   |   01 10 04 00  00 00 00 00  00 00 02 3c  04 00 00 9c
   |   00 00 00 01  00 00 00 01  00 00 00 90  01 01 00 04
   |   03 00 00 24  01 01 00 00  80 0b 00 01  80 0c 70 80
   |   80 01 00 07  80 0e 00 80  80 03 00 01  80 02 00 02
   |   80 04 00 05  03 00 00 24  02 01 00 00  80 0b 00 01
   |   80 0c 70 80  80 01 00 07  80 0e 00 80  80 03 00 01
   |   80 02 00 01  80 04 00 05  03 00 00 20  03 01 00 00
   |   80 0b 00 01  80 0c 70 80  80 01 00 05  80 03 00 01
   |   80 02 00 02  80 04 00 05  00 00 00 20  04 01 00 00
   |   80 0b 00 01  80 0c 70 80  80 01 00 05  80 03 00 01
   |   80 02 00 01  80 04 00 05  0a 00 00 c4  e3 e1 3f a5
   |   89 56 dc 7e  40 cd 82 d5  13 ab 66 74  d5 72 35 18
   |   d0 b1 3d e3  4b 4d e5 c9  8f 64 78 04  58 84 3a 91
   |   bf 18 98 37  84 f0 ee 1e  a8 08 42 33  b1 a9 38 e6
   |   ed 5d ae 27  04 3f e3 9d  77 95 5a 92  46 dc c9 47
   |   33 cb d7 b4  c4 37 da b3  98 b9 9e da  eb 78 87 4e
   |   f5 8d 2f f4  fe 1a e0 f6  8d 4f 79 84  30 17 17 62
   |   e3 52 34 30  a9 67 a9 4b  4c a1 f9 fb  74 0c e1 3b
   |   e9 58 19 a4  bd 28 ae 36  be e7 14 0f  58 f5 09 8c
   |   50 19 89 e5  59 5c 6e 99  e1 8b d0 a4  5c 0f b2 75
   |   92 6d 81 b6  b5 4d f6 78  db 6d c7 4b  d0 c3 84 3a
   |   7c 2e c2 be  7b 6b f5 d2  2a 33 09 dc  f8 1c 15 7d
   |   16 e6 94 c7  da 3d 5e 2b  95 d1 11 c0  05 00 00 14
   |   a5 64 e4 ab  96 3d 82 ba  f1 c0 a5 24  4c e1 6c 73
   |   0d 00 00 0c  01 11 05 dc  c0 a8 0c 57  0d 00 00 14
   |   4a 13 1c 81  07 03 58 45  5c 57 28 f2  0e 95 45 2f
   |   0d 00 00 14  cd 60 46 43  35 df 21 f8  7c fd b2 fc
   |   68 b6 a4 48  0d 00 00 14  90 cb 80 91  3e bb 69 6e
   |   08 63 81 b5  ec 42 7b 1f  0d 00 00 14  44 85 15 2d
   |   18 b6 bb cd  0b e8 a8 46  95 79 dd cc  0d 00 00 14
   |   12 f5 f2 8c  45 71 68 a9  70 2d 9f e2  74 cc 01 00
   |   0d 00 00 14  af ca d7 13  68 a1 f1 c9  6b 86 96 fc
   |   77 57 01 00  0d 00 00 14  4c 53 42 7b  6d 46 5d 1b
   |   33 7b b7 55  a3 7a 7f ef  00 00 00 14  b4 f0 1c a9
   |   51 e9 da 8d  0b af bb d3  4a d3 04 4e
   | processing: start from 192.168.12.87:1500 (in process_md() at
   demux.c:441)
   | **parse ISAKMP Message:
   |    initiator cookie:
   |   0c 75 da 3b  07 7a f1 49
   |    responder cookie:
   |   00 00 00 00  00 00 00 00
   |    next payload type: ISAKMP_NEXT_SA (0x1)
   |    ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10)
   |    exchange type: ISAKMP_XCHG_AGGR (0x4)
   |    flags: none (0x0)
   |    Message ID: 0 (0x0)
   |    length: 572 (0x23c)
   |  processing version=1.0 packet with exchange type=ISAKMP_XCHG_AGGR (4)
   | State DB: IKEv1 state object not found (find_state_ikev1_init)
   | #null state always idle
   | got payload 0x2  (ISAKMP_NEXT_SA) needed: 0x432 opt: 0x102000
   | ***parse ISAKMP Security Association Payload:
   |    next payload type: ISAKMP_NEXT_KE (0x4)
   |    length: 156 (0x9c)
   |    DOI: ISAKMP_DOI_IPSEC (0x1)
   | got payload 0x10  (ISAKMP_NEXT_KE) needed: 0x430 opt: 0x102000
   | ***parse ISAKMP Key Exchange Payload:
   |    next payload type: ISAKMP_NEXT_NONCE (0xa)
   |    length: 196 (0xc4)
   | got payload 0x400  (ISAKMP_NEXT_NONCE) needed: 0x420 opt: 0x102000
   | ***parse ISAKMP Nonce Payload:
   |    next payload type: ISAKMP_NEXT_ID (0x5)
   |    length: 20 (0x14)
   | got payload 0x20  (ISAKMP_NEXT_ID) needed: 0x20 opt: 0x102000
   | ***parse ISAKMP Identification Payload:
   |    next payload type: ISAKMP_NEXT_VID (0xd)
   |    length: 12 (0xc)
   |    ID type: ID_IPV4_ADDR (0x1)
   |    DOI specific A: 17 (0x11)
   |    DOI specific B: 1500 (0x5dc)
   |      obj:   c0 a8 0c 57
   | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
   | ***parse ISAKMP Vendor ID Payload:
   |    next payload type: ISAKMP_NEXT_VID (0xd)
   |    length: 20 (0x14)
   | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
   | ***parse ISAKMP Vendor ID Payload:
   |    next payload type: ISAKMP_NEXT_VID (0xd)
   |    length: 20 (0x14)
   | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
   | ***parse ISAKMP Vendor ID Payload:
   |    next payload type: ISAKMP_NEXT_VID (0xd)
   |    length: 20 (0x14)
   | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
   | ***parse ISAKMP Vendor ID Payload:
   |    next payload type: ISAKMP_NEXT_VID (0xd)
   |    length: 20 (0x14)
   | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
   | ***parse ISAKMP Vendor ID Payload:
   |    next payload type: ISAKMP_NEXT_VID (0xd)
   |    length: 20 (0x14)
   | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
   | ***parse ISAKMP Vendor ID Payload:
   |    next payload type: ISAKMP_NEXT_VID (0xd)
   |    length: 20 (0x14)
   | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
   | ***parse ISAKMP Vendor ID Payload:
   |    next payload type: ISAKMP_NEXT_VID (0xd)
   |    length: 20 (0x14)
   | got payload 0x2000  (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x102000
   | ***parse ISAKMP Vendor ID Payload:
   |    next payload type: ISAKMP_NEXT_NONE (0x0)
   |    length: 20 (0x14)
   |  quirks.qnat_traversal_vid set to=117 [RFC 3947]
   | received Vendor ID payload [RFC 3947]
   | Ignoring older NAT-T Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
   | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02]
   | Ignoring older NAT-T Vendor ID payload
   [draft-ietf-ipsec-nat-t-ike-02_n]
   | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
   | ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-00]
   | received Vendor ID payload [Cisco-Unity]
   | received Vendor ID payload [Dead Peer Detection]
   packet from 192.168.12.87:1500: ignoring unknown Vendor ID payload
   [4c53427b6d465d1b337bb755a37a7fef]
   packet from 192.168.12.87:1500: ignoring unknown Vendor ID payload
   [b4f01ca951e9da8d0bafbbd34ad3044e]
   | ****parse IPsec DOI SIT:
   |    IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1)
   | ****parse ISAKMP Proposal Payload:
   |    next payload type: ISAKMP_NEXT_NONE (0x0)
   |    length: 144 (0x90)
   |    proposal number: 1 (0x1)
   |    protocol ID: PROTO_ISAKMP (0x1)
   |    SPI size: 0 (0x0)
   |    number of transforms: 4 (0x4)
   | *****parse ISAKMP Transform Payload (ISAKMP):
   |    next payload type: ISAKMP_NEXT_T (0x3)
   |    length: 36 (0x24)
   |    ISAKMP transform number: 1 (0x1)
   |    ISAKMP transform ID: KEY_IKE (0x1)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
   |    length/value: 1 (0x1)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
   |    length/value: 28800 (0x7080)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
   |    length/value: 7 (0x7)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
   |    length/value: 128 (0x80)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
   |    length/value: 1 (0x1)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
   |    length/value: 2 (0x2)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
   |    length/value: 5 (0x5)
   | *****parse ISAKMP Transform Payload (ISAKMP):
   |    next payload type: ISAKMP_NEXT_T (0x3)
   |    length: 36 (0x24)
   |    ISAKMP transform number: 2 (0x2)
   |    ISAKMP transform ID: KEY_IKE (0x1)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
   |    length/value: 1 (0x1)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
   |    length/value: 28800 (0x7080)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
   |    length/value: 7 (0x7)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_KEY_LENGTH (0x800e)
   |    length/value: 128 (0x80)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
   |    length/value: 1 (0x1)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
   |    length/value: 1 (0x1)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
   |    length/value: 5 (0x5)
   | *****parse ISAKMP Transform Payload (ISAKMP):
   |    next payload type: ISAKMP_NEXT_T (0x3)
   |    length: 32 (0x20)
   |    ISAKMP transform number: 3 (0x3)
   |    ISAKMP transform ID: KEY_IKE (0x1)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
   |    length/value: 1 (0x1)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
   |    length/value: 28800 (0x7080)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
   |    length/value: 5 (0x5)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
   |    length/value: 1 (0x1)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
   |    length/value: 2 (0x2)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
   |    length/value: 5 (0x5)
   | *****parse ISAKMP Transform Payload (ISAKMP):
   |    next payload type: ISAKMP_NEXT_NONE (0x0)
   |    length: 32 (0x20)
   |    ISAKMP transform number: 4 (0x4)
   |    ISAKMP transform ID: KEY_IKE (0x1)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_LIFE_TYPE (0x800b)
   |    length/value: 1 (0x1)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c)
   |    length/value: 28800 (0x7080)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001)
   |    length/value: 5 (0x5)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003)
   |    length/value: 1 (0x1)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002)
   |    length/value: 1 (0x1)
   | ******parse ISAKMP Oakley attribute:
   |    af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004)
   |    length/value: 5 (0x5)
   | find_host_connection me=<server.address.redacted>:500
   him=192.168.12.87:1500 policy=PSK+AGGRESSIVE+IKEV1_ALLOW
   | find_host_pair: comparing <server.address.redacted>:500 to 0.0.0.0:500
   | find_next_host_connection policy=PSK+AGGRESSIVE+IKEV1_ALLOW
   | find_next_host_connection returns empty
   | find_host_connection me=<server.address.redacted>:500
   him=%any:1500 policy=PSK+AGGRESSIVE+IKEV1_ALLOW
   | find_host_pair: comparing <server.address.redacted>:500 to 0.0.0.0:500
   | find_next_host_connection policy=PSK+AGGRESSIVE+IKEV1_ALLOW
   | found policy =
   
PSK+ENCRYPT+TUNNEL+DONT_REKEY+XAUTH+AGGRESSIVE+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO
   (xauth-psk)
   | find_next_host_connection returns empty
   packet from 192.168.12.87:1500: initial Aggressive Mode message from
   192.168.12.87 but no (wildcard) connection has been configured with
   policy PSK+AGGRESSIVE+IKEV1_ALLOW
   | complete v1 state transition with STF_IGNORE
   | processing: stop from 192.168.12.87:1500 (in process_md() at
   demux.c:443)
   | processing: STOP state #0 (in process_md() at demux.c:445)
   | processing: STOP connection NULL (in process_md() at demux.c:446)


Thanks.

Cheers,
Wolf

On 15/03/2022 01:48, Paul Wouters wrote:


---------- Forwarded message ----------
Date: Mon, 14 Mar 2022 13:47:01
From: Paul Wouters <[email protected]>
Cc: [email protected]
To: 1one.w01f <[email protected]>
Subject: Re: [Swan] no (wildcard) connection has been configured with policy
    PSK+AGGRESSIVE+IKEV1_ALLOW



On Sun, 13 Mar 2022, 1one.w01f wrote:

Date: Sun, 13 Mar 2022 09:28:57
From: 1one.w01f <[email protected]>
To: [email protected]
Subject: Re: [Swan] no (wildcard) connection has been configured with policy
    PSK+AGGRESSIVE+IKEV1_ALLOW

Based on your logs, I think the ike= hash algorithm is the problem:

Mar 13 16:19:32.346942: | ******parse ISAKMP Oakley attribute:
      Mar 13 16:19:32.346954: |    af+type: AF+OAKLEY_AUTHENTICATION_METHOD
      (0x8003)
      Mar 13 16:19:32.346965: |    length/value: 1 (0x1)


That is MD5. Can you tell the other end to use SHA1 or SHA256 instead ?

If not, you can try and add:

    ike=3des-md5;modp1536

Paul

_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan
_______________________________________________
Swan mailing list
[email protected]
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to