1 Basic pluto with IKEv2 using PSK on the initiator (west), and on the responder.
3 This is the reverse of ikev2-algo-02-modp2048-responder
5 This time, one end has an ike=aes128-sha1-modp2048 specified. This will
6 cause a negotiation failure in 2.6.06 and earlier, visible in the logs with:
8 | prf= (policy:prf-hmac-md5 vs offered:prf-hmac-sha1)
9 | dh= (policy:(null) vs offered:OAKLEY_GROUP_MODP2048)
10 | proposal 1 encr= (policy:3des vs offered:aes-cbc)
11 | failed integ=(policy:auth-hmac-sha1-96 vs offered:auth-hmac-sha1-96)
12 | failed prf= (policy:prf-hmac-sha1 vs offered:prf-hmac-sha1)
13 | dh= (policy:(null) vs offered:OAKLEY_GROUP_MODP2048)
14 | proposal 1 encr= (policy:3des vs offered:aes-cbc)
15 | failed integ=(policy:auth-hmac-sha1-96 vs offered:auth-hmac-sha1-96)
16 | prf= (policy:prf-hmac-md5 vs offered:prf-hmac-sha1)
17 | dh= (policy:(null) vs offered:OAKLEY_GROUP_MODP2048)
18 | complete v2 state transition with (null)
19 | state transition function for STATE_PARENT_R1 failed: NO_PROPOSAL_CHOSEN