Yast2-vpn issue when connecting

I decided to give yast2-vpn a test-ride.

I configured the VPN Gateway using the " Provide access to Android, iOS, MacOS X clients" option and created a test user with PSK and password:

When I attempt to connect, left side (MacOS) logging tells me this:

Sun May 11 22:01:28 2025 : publish_entry SCDSet() failed: Success!
Sun May 11 22:01:28 2025 : publish_entry SCDSet() failed: Success!
Sun May 11 22:01:28 2025 : l2tp_get_router_address
Sun May 11 22:01:28 2025 : l2tp_get_router_address 192.168.0.1 from dict 1
Sun May 11 22:01:28 2025 : L2TP connecting to server '192.168.0.24' (192.168.0.24)...
Sun May 11 22:01:28 2025 : IPSec connection started
Sun May 11 22:01:28 2025 : IPSec phase 1 client started
Sun May 11 22:01:28 2025 : IPSec phase 1 server replied
Sun May 11 22:01:58 2025 : IPSec connection failed

Right side (OpenSuse) tells me this:

2025-05-12T02:01:28.914196-03:00 apple-srv charon: 11[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (788 bytes)
2025-05-12T02:01:28.914313-03:00 apple-srv charon: 11[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V ]
2025-05-12T02:01:28.914382-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
2025-05-12T02:01:28.914442-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
2025-05-12T02:01:28.914471-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
2025-05-12T02:01:28.914494-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
2025-05-12T02:01:28.914518-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
2025-05-12T02:01:28.914544-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
2025-05-12T02:01:28.914568-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
2025-05-12T02:01:28.914591-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
2025-05-12T02:01:28.914616-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
2025-05-12T02:01:28.914639-03:00 apple-srv ipsec[17951]: 11[IKE] received FRAGMENTATION vendor ID
2025-05-12T02:01:28.914662-03:00 apple-srv ipsec[17951]: 11[IKE] received DPD vendor ID
2025-05-12T02:01:28.914686-03:00 apple-srv ipsec[17951]: 11[IKE] 192.168.0.68 is initiating a Main Mode IKE_SA
2025-05-12T02:01:28.914710-03:00 apple-srv ipsec[17951]: 11[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
2025-05-12T02:01:28.914735-03:00 apple-srv ipsec[17951]: 11[ENC] generating ID_PROT response 0 [ SA V V V V ]
2025-05-12T02:01:28.914758-03:00 apple-srv ipsec[17951]: 11[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (160 bytes)
2025-05-12T02:01:28.914782-03:00 apple-srv ipsec[17951]: 12[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (380 bytes)
2025-05-12T02:01:28.914807-03:00 apple-srv ipsec[17951]: 12[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
2025-05-12T02:01:28.914830-03:00 apple-srv ipsec[17951]: 12[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
2025-05-12T02:01:28.914855-03:00 apple-srv ipsec[17951]: 12[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (396 bytes)
2025-05-12T02:01:28.914878-03:00 apple-srv ipsec[17951]: 09[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (108 bytes)
2025-05-12T02:01:28.914902-03:00 apple-srv ipsec[17951]: 09[ENC] parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
2025-05-12T02:01:28.914926-03:00 apple-srv ipsec[17951]: 09[CFG] looking for pre-shared key peer configs matching 192.168.0.24...192.168.0.68[192.168.0.68]
2025-05-12T02:01:28.914950-03:00 apple-srv ipsec[17951]: 09[IKE] found 1 matching config, but none allows pre-shared key authentication using Main Mode
2025-05-12T02:01:28.914975-03:00 apple-srv ipsec[17951]: 09[ENC] generating INFORMATIONAL_V1 request 2553770615 [ HASH N(AUTH_FAILED) ]
2025-05-12T02:01:28.915004-03:00 apple-srv ipsec[17951]: 09[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (108 bytes)
2025-05-12T02:01:28.915029-03:00 apple-srv ipsec[17951]: 01[KNL] interface xfrmi-test-1847 activated
2025-05-12T02:01:28.915052-03:00 apple-srv ipsec[17951]: 05[KNL] interface xfrmi-test-1847 deactivated
2025-05-12T02:01:28.915076-03:00 apple-srv ipsec[17951]: 08[KNL] interface xfrmi-test-1847 deleted
2025-05-12T02:01:28.915100-03:00 apple-srv ipsec[17951]: 11[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (788 bytes)
2025-05-12T02:01:28.915124-03:00 apple-srv ipsec[17951]: 11[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V ]
2025-05-12T02:01:28.915147-03:00 apple-srv ipsec[17951]: 11[IKE] received NAT-T (RFC 3947) vendor ID
2025-05-12T02:01:28.915170-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
2025-05-12T02:01:28.915202-03:00 apple-srv charon: 11[IKE] received NAT-T (RFC 3947) vendor ID
2025-05-12T02:01:28.915238-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
2025-05-12T02:01:28.915266-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
2025-05-12T02:01:28.915290-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
2025-05-12T02:01:28.915314-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
2025-05-12T02:01:28.915337-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
2025-05-12T02:01:28.915360-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
2025-05-12T02:01:28.915384-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
2025-05-12T02:01:28.915412-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
2025-05-12T02:01:28.915436-03:00 apple-srv ipsec[17951]: 11[IKE] received FRAGMENTATION vendor ID
2025-05-12T02:01:28.915459-03:00 apple-srv ipsec[17951]: 11[IKE] received DPD vendor ID
2025-05-12T02:01:28.915483-03:00 apple-srv ipsec[17951]: 11[IKE] 192.168.0.68 is initiating a Main Mode IKE_SA
2025-05-12T02:01:28.915510-03:00 apple-srv ipsec[17951]: 11[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
2025-05-12T02:01:28.915534-03:00 apple-srv ipsec[17951]: 11[ENC] generating ID_PROT response 0 [ SA V V V V ]
2025-05-12T02:01:28.915558-03:00 apple-srv ipsec[17951]: 11[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (160 bytes)
2025-05-12T02:01:28.915581-03:00 apple-srv ipsec[17951]: 12[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (380 bytes)
2025-05-12T02:01:28.915605-03:00 apple-srv ipsec[17951]: 12[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
2025-05-12T02:01:28.915632-03:00 apple-srv ipsec[17951]: 12[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
2025-05-12T02:01:28.915658-03:00 apple-srv ipsec[17951]: 12[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (396 bytes)
2025-05-12T02:01:28.915682-03:00 apple-srv ipsec[17951]: 09[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (108 bytes)
2025-05-12T02:01:28.915705-03:00 apple-srv ipsec[17951]: 09[ENC] parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
2025-05-12T02:01:28.915728-03:00 apple-srv ipsec[17951]: 09[CFG] looking for pre-shared key peer configs matching 192.168.0.24...192.168.0.68[192.168.0.68]
2025-05-12T02:01:28.915752-03:00 apple-srv ipsec[17951]: 09[IKE] found 1 matching config, but none allows pre-shared key authentication using Main Mode
2025-05-12T02:01:28.915775-03:00 apple-srv ipsec[17951]: 09[ENC] generating INFORMATIONAL_V1 request 947803515 [ HASH N(AUTH_FAILED) ]
2025-05-12T02:01:28.915799-03:00 apple-srv ipsec[17951]: 09[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (108 bytes)
2025-05-12T02:01:28.915823-03:00 apple-srv ipsec[17951]: 11[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (788 bytes)
2025-05-12T02:01:28.915846-03:00 apple-srv ipsec[17951]: 11[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V ]
2025-05-12T02:01:28.915870-03:00 apple-srv ipsec[17951]: 11[IKE] received NAT-T (RFC 3947) vendor ID
2025-05-12T02:01:28.915894-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
2025-05-12T02:01:28.915921-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
2025-05-12T02:01:28.915946-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
2025-05-12T02:01:28.915970-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
2025-05-12T02:01:28.915993-03:00 apple-srv ipsec[17951]: 11[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
2025-05-12T02:01:28.916023-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
2025-05-12T02:01:28.916063-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
2025-05-12T02:01:28.916096-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
2025-05-12T02:01:28.916128-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
2025-05-12T02:01:28.916159-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
2025-05-12T02:01:28.916191-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
2025-05-12T02:01:28.916228-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
2025-05-12T02:01:28.916265-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
2025-05-12T02:01:28.916297-03:00 apple-srv charon: 11[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
2025-05-12T02:01:28.916328-03:00 apple-srv charon: 11[IKE] received FRAGMENTATION vendor ID
2025-05-12T02:01:28.916359-03:00 apple-srv charon: 11[IKE] received DPD vendor ID
2025-05-12T02:01:28.916390-03:00 apple-srv charon: 11[IKE] 192.168.0.68 is initiating a Main Mode IKE_SA
2025-05-12T02:01:28.916421-03:00 apple-srv charon: 11[IKE] 192.168.0.68 is initiating a Main Mode IKE_SA
2025-05-12T02:01:28.916453-03:00 apple-srv charon: 11[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
2025-05-12T02:01:28.916485-03:00 apple-srv charon: 11[ENC] generating ID_PROT response 0 [ SA V V V V ]
2025-05-12T02:01:28.916518-03:00 apple-srv charon: 11[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (160 bytes)
2025-05-12T02:01:28.947299-03:00 apple-srv charon: 12[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (380 bytes)
2025-05-12T02:01:28.947385-03:00 apple-srv charon: 12[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
2025-05-12T02:01:28.960190-03:00 apple-srv charon: 12[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
2025-05-12T02:01:28.960277-03:00 apple-srv charon: 12[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (396 bytes)
2025-05-12T02:01:29.012397-03:00 apple-srv charon: 09[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (108 bytes)
2025-05-12T02:01:29.012473-03:00 apple-srv charon: 09[ENC] parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
2025-05-12T02:01:29.012508-03:00 apple-srv charon: 09[CFG] looking for pre-shared key peer configs matching 192.168.0.24...192.168.0.68[192.168.0.68]
2025-05-12T02:01:29.012542-03:00 apple-srv charon: 09[IKE] found 1 matching config, but none allows pre-shared key authentication using Main Mode
2025-05-12T02:01:29.012585-03:00 apple-srv charon: 09[ENC] generating INFORMATIONAL_V1 request 890575881 [ HASH N(AUTH_FAILED) ]
2025-05-12T02:01:29.012619-03:00 apple-srv charon: 09[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (108 bytes)

I’m at my wit’s end. I googled to no avail but none of the options worked (enable aggressivity, etc etc).
Does anyone know what’s the backend for the Yast module for the VPN? I just wanted a quick way to create VPN users. Thanks in advance!

Adding ipsec.conf just in case:

conn infra
    auto = add
    keyexchange = ikev1
    left = %defaultroute
    leftauth = psk
    leftsubnet = 0.0.0.0/0
    right = %any
    rightauth = psk
    rightauth2 = xauth
    rightsourceip = 10.10.10.0/24
    fragmentation = yes
    dpdaction = clear
    dpdtimeout = 600
    dpddelay = 60

Stab in the dark, but try commenting it out.

1 Like

Stab in the dark is better than nothing, so thank you!

It seems to have done something, but still not getting in:

2025-05-13T18:55:10.809583-03:00 apple-srv ipsec[17236]: 12[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (788 bytes)
2025-05-13T18:55:10.809631-03:00 apple-srv ipsec[17236]: 12[ENC] parsed ID_PROT request 0 [ SA V V V V V V V V V V V V ]
2025-05-13T18:55:10.809678-03:00 apple-srv ipsec[17236]: 12[IKE] received NAT-T (RFC 3947) vendor ID
2025-05-13T18:55:10.809725-03:00 apple-srv ipsec[17236]: 12[IKE] received draft-ietf-ipsec-nat-t-ike vendor ID
2025-05-13T18:55:10.809772-03:00 apple-srv ipsec[17236]: 12[IKE] received draft-ietf-ipsec-nat-t-ike-08 vendor ID
2025-05-13T18:55:10.809819-03:00 apple-srv ipsec[17236]: 12[IKE] received draft-ietf-ipsec-nat-t-ike-07 vendor ID
2025-05-13T18:55:10.809866-03:00 apple-srv ipsec[17236]: 12[IKE] received draft-ietf-ipsec-nat-t-ike-06 vendor ID
2025-05-13T18:55:10.809913-03:00 apple-srv ipsec[17236]: 12[IKE] received draft-ietf-ipsec-nat-t-ike-05 vendor ID
2025-05-13T18:55:10.809960-03:00 apple-srv ipsec[17236]: 12[IKE] received draft-ietf-ipsec-nat-t-ike-04 vendor ID
2025-05-13T18:55:10.810007-03:00 apple-srv ipsec[17236]: 12[IKE] received draft-ietf-ipsec-nat-t-ike-03 vendor ID
2025-05-13T18:55:10.810055-03:00 apple-srv ipsec[17236]: 12[IKE] received draft-ietf-ipsec-nat-t-ike-02 vendor ID
2025-05-13T18:55:10.810102-03:00 apple-srv ipsec[17236]: 12[IKE] received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
2025-05-13T18:55:10.810149-03:00 apple-srv ipsec[17236]: 12[IKE] received FRAGMENTATION vendor ID
2025-05-13T18:55:10.810195-03:00 apple-srv ipsec[17236]: 12[IKE] received DPD vendor ID
2025-05-13T18:55:10.810242-03:00 apple-srv ipsec[17236]: 12[IKE] 192.168.0.68 is initiating a Main Mode IKE_SA
2025-05-13T18:55:10.810289-03:00 apple-srv ipsec[17236]: 12[CFG] selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
2025-05-13T18:55:10.810336-03:00 apple-srv ipsec[17236]: 12[ENC] generating ID_PROT response 0 [ SA V V V V ]
2025-05-13T18:55:10.810383-03:00 apple-srv ipsec[17236]: 12[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (160 bytes)
2025-05-13T18:55:10.810438-03:00 apple-srv ipsec[17236]: 13[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (380 bytes)
2025-05-13T18:55:10.810487-03:00 apple-srv ipsec[17236]: 13[ENC] parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
2025-05-13T18:55:10.810534-03:00 apple-srv ipsec[17236]: 13[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
2025-05-13T18:55:10.810581-03:00 apple-srv ipsec[17236]: 13[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (396 bytes)
2025-05-13T18:55:10.810629-03:00 apple-srv ipsec[17236]: 14[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (108 bytes)
2025-05-13T18:55:10.810676-03:00 apple-srv ipsec[17236]: 14[ENC] parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
2025-05-13T18:55:10.810723-03:00 apple-srv ipsec[17236]: 14[CFG] looking for pre-shared key peer configs matching 192.168.0.24...192.168.0.68[192.168.0.68]
2025-05-13T18:55:10.810783-03:00 apple-srv charon: 14[IKE] IKE_SA infra[2] established between 192.168.0.24[192.168.0.24]...192.168.0.68[192.168.0.68]
2025-05-13T18:55:10.810856-03:00 apple-srv ipsec[17236]: 14[CFG] selected peer config "infra"
2025-05-13T18:55:10.810925-03:00 apple-srv charon: 14[IKE] IKE_SA infra[2] established between 192.168.0.24[192.168.0.24]...192.168.0.68[192.168.0.68]
2025-05-13T18:55:10.811006-03:00 apple-srv charon: 14[IKE] scheduling reauthentication in 9848s
2025-05-13T18:55:10.811070-03:00 apple-srv charon: 14[IKE] maximum IKE_SA lifetime 10388s
2025-05-13T18:55:10.811131-03:00 apple-srv charon: 14[ENC] generating ID_PROT response 0 [ ID HASH ]
2025-05-13T18:55:10.811193-03:00 apple-srv charon: 14[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (92 bytes)
2025-05-13T18:55:11.773818-03:00 apple-srv charon: 05[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (300 bytes)
2025-05-13T18:55:11.773905-03:00 apple-srv charon: 05[ENC] parsed QUICK_MODE request 3858670547 [ HASH SA No ID ID ]
2025-05-13T18:55:11.775949-03:00 apple-srv charon: 05[IKE] no matching CHILD_SA config found for 192.168.0.68/32[udp/58421] === 192.168.0.24/32[udp/l2f]
2025-05-13T18:55:11.776034-03:00 apple-srv charon: 05[ENC] generating INFORMATIONAL_V1 request 110221951 [ HASH N(INVAL_ID) ]
2025-05-13T18:55:11.776098-03:00 apple-srv charon: 05[NET] sending packet: from 192.168.0.24[500] to 192.168.0.68[500] (92 bytes)
2025-05-13T18:55:15.070795-03:00 apple-srv charon: 06[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (300 bytes)
2025-05-13T18:55:15.070876-03:00 apple-srv charon: 06[IKE] received retransmit of request with ID 3858670547, but no response to retransmit
2025-05-13T18:55:18.268582-03:00 apple-srv charon: 07[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (300 bytes)
2025-05-13T18:55:18.268664-03:00 apple-srv charon: 07[IKE] received retransmit of request with ID 3858670547, but no response to retransmit
2025-05-13T18:55:21.529983-03:00 apple-srv charon: 08[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (300 bytes)
2025-05-13T18:55:21.530063-03:00 apple-srv charon: 08[IKE] received retransmit of request with ID 3858670547, but no response to retransmit
2025-05-13T18:55:24.827481-03:00 apple-srv charon: 13[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (300 bytes)
2025-05-13T18:55:24.827601-03:00 apple-srv charon: 13[IKE] received retransmit of request with ID 3858670547, but no response to retransmit
x2025-05-13T18:55:28.089111-03:00 apple-srv charon: 05[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (300 bytes)
2025-05-13T18:55:28.089199-03:00 apple-srv charon: 05[IKE] received retransmit of request with ID 3858670547, but no response to retransmit
2025-05-13T18:55:31.386815-03:00 apple-srv charon: 11[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (300 bytes)
2025-05-13T18:55:31.386924-03:00 apple-srv charon: 11[IKE] received retransmit of request with ID 3858670547, but no response to retransmit
2025-05-13T18:55:34.667071-03:00 apple-srv charon: 05[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (300 bytes)
2025-05-13T18:55:34.667194-03:00 apple-srv charon: 05[IKE] received retransmit of request with ID 3858670547, but no response to retransmit
2025-05-13T18:55:37.948097-03:00 apple-srv charon: 16[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (300 bytes)
2025-05-13T18:55:37.948223-03:00 apple-srv charon: 16[IKE] received retransmit of request with ID 3858670547, but no response to retransmit
2025-05-13T18:55:41.227335-03:00 apple-srv charon: 06[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (300 bytes)
2025-05-13T18:55:41.227416-03:00 apple-srv charon: 06[IKE] received retransmit of request with ID 3858670547, but no response to retransmit
2025-05-13T18:55:41.849510-03:00 apple-srv charon: 07[NET] received packet: from 192.168.0.68[500] to 192.168.0.24[500] (108 bytes)
2025-05-13T18:55:41.849602-03:00 apple-srv charon: 07[ENC] parsed INFORMATIONAL_V1 request 3764339419 [ HASH D ]
2025-05-13T18:55:41.849638-03:00 apple-srv charon: 07[IKE] received DELETE for IKE_SA infra[2]
2025-05-13T18:55:41.849671-03:00 apple-srv charon: 07[IKE] deleting IKE_S

Not sure why the invalid Hash ID. This is a test VM on a test env, PSK is “ABCD” just to make sure no typos.