Created
November 2, 2016 00:35
-
-
Save cjac/101873cb98d2e2b61c93ebbb98418c3f to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
I/Vpn ( 750): Switched from [Legacy VPN] to [Legacy VPN] | |
D/Vpn ( 750): setting state=IDLE, reason=prepare | |
I/Vpn ( 750): Switched from [Legacy VPN] to [Legacy VPN] | |
D/Vpn ( 750): setting state=IDLE, reason=prepare | |
D/Vpn ( 750): setting state=CONNECTING, reason=startLegacyVpn | |
V/LegacyVpnRunner( 750): Waiting | |
V/LegacyVpnRunner( 750): Executing | |
D/Vpn ( 750): setting state=CONNECTING, reason=execute | |
D/racoon (25311): Waiting for control socket | |
D/racoon (25311): Received 11 arguments | |
I/racoon (25311): ipsec-tools 0.7.3 (http://ipsec-tools.sf.net) | |
I/racoon (25311): 192.168.1.37[500] used as isakmp port (fd=6) | |
I/racoon (25311): 192.168.1.37[500] used for NAT-T | |
I/racoon (25311): 192.168.1.37[4500] used as isakmp port (fd=7) | |
I/racoon (25311): 192.168.1.37[4500] used for NAT-T | |
I/racoon (25311): initiate new phase 1 negotiation: 192.168.1.37[500]<=>208.115.126.77[500] | |
I/racoon (25311): begin Identity Protection mode. | |
I/racoon (25311): received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt | |
I/racoon (25311): received Vendor ID: DPD | |
I/racoon (25311): received Vendor ID: RFC 3947 | |
I/racoon (25311): Selected NAT-T version: RFC 3947 | |
I/racoon (25311): Hashing 208.115.126.77[500] with algo #2 | |
I/racoon (25311): Hashing 192.168.1.37[500] with algo #2 | |
I/racoon (25311): Adding remote and local NAT-D payloads. | |
I/racoon (25311): Hashing 192.168.1.37[500] with algo #2 | |
I/racoon (25311): NAT-D payload #0 doesn't match | |
I/racoon (25311): Hashing 208.115.126.77[500] with algo #2 | |
I/racoon (25311): NAT-D payload #1 verified | |
I/racoon (25311): NAT detected: ME | |
I/racoon (25311): KA list add: 192.168.1.37[4500]->208.115.126.77[4500] | |
I/Metrics:BatchTransmitte(23986): QueuePusher.sendBatches - Drained batch queue.; Number of NORMAL queue batches sent: 0 | |
I/Metrics:BatchTransmitte(23986): QueuePusher.sendBatches - Drained batch queue.; Number of RESERVED_FOR_NON_ANONYMOUS_METRICS queue batches sent: 0 | |
I/Metrics:BatchTransmitte(23986): QueuePusher.sendBatches - Drained batch queue.; Number of HIGH queue batches sent: 0 | |
D/ConnectivityService( 750): updateNetworkScore for NetworkAgentInfo [WIFI () - 150] to 52 | |
D/ConnectivityService( 750): rematching NetworkAgentInfo [WIFI () - 150] | |
D/ConnectivityService( 750): Network NetworkAgentInfo [WIFI () - 150] was already satisfying request 1. No change. | |
D/ConnectivityService( 750): notifyType AVAILABLE for NetworkAgentInfo [WIFI () - 150] | |
E/racoon (25311): phase1 negotiation failed due to time up. 8405d20ec85a4218:2f02fbf01b7a6a0a | |
I/racoon (25311): Bye | |
I/LegacyVpnRunner( 750): Aborting | |
I/LegacyVpnRunner( 750): java.lang.IllegalStateException: racoon is dead | |
I/LegacyVpnRunner( 750): at com.android.server.connectivity.Vpn$LegacyVpnRunner.execute(Vpn.java:1247) | |
I/LegacyVpnRunner( 750): at com.android.server.connectivity.Vpn$LegacyVpnRunner.run(Vpn.java:1126) | |
D/Vpn ( 750): setting state=FAILED, reason=racoon is dead |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment