cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1752
Views
0
Helpful
1
Replies

VPN Client V. 5.0.07.0440 Done with the hash signing with signature length of 0.

artemoniks
Level 1
Level 1

Please, help me. I can not to connect.

Windows 7.

Log:

Cisco Systems VPN Client Version 5.0.07.0440

Copyright (C) 1998-2010 Cisco Systems, Inc. All Rights Reserved.

Client Type(s): Windows, WinNT

Running on: 6.1.7601 Service Pack 1

178    13:35:08.700  06/27/13  Sev=Info/6          CERT/0x63600026

Attempting to find a Certificate using Serial Hash.

179    13:35:08.701  06/27/13  Sev=Info/6          CERT/0x63600027

Found a Certificate using Serial Hash.

180    13:35:08.704  06/27/13  Sev=Info/6          CERT/0x63600026

Attempting to find a Certificate using Serial Hash.

181    13:35:08.705  06/27/13  Sev=Info/6          CERT/0x63600027

Found a Certificate using Serial Hash.

182    13:35:08.710  06/27/13  Sev=Info/6          CERT/0x63600026

Attempting to find a Certificate using Serial Hash.

183    13:35:08.710  06/27/13  Sev=Info/6          CERT/0x63600027

Found a Certificate using Serial Hash.

184    13:35:08.730  06/27/13  Sev=Info/4          CERT/0x63600015

Cert (cn=Ремизов Максим) verification succeeded.

185    13:35:08.732  06/27/13  Sev=Info/4          CM/0x63100002

Begin connection process

186    13:35:08.734  06/27/13  Sev=Info/4          CM/0x63100004

Establish secure connection

187    13:35:08.734  06/27/13  Sev=Info/4          CM/0x63100024

Attempt connection with server "vpn1.alfastrah.ru"

188    13:35:08.737  06/27/13  Sev=Info/6          IKE/0x6300003B

Attempting to establish a connection with 195.239.64.243.

189    13:35:08.751  06/27/13  Sev=Info/6          CERT/0x63600026

Attempting to find a Certificate using Serial Hash.

190    13:35:08.752  06/27/13  Sev=Info/6          CERT/0x63600027

Found a Certificate using Serial Hash.

191    13:35:08.762  06/27/13  Sev=Info/4          CERT/0x63600015

Cert (cn=Ремизов Максим) verification succeeded.

192    13:35:08.762  06/27/13  Sev=Info/4          IKE/0x63000001

Starting IKE Phase 1 Negotiation

193    13:35:08.762  06/27/13  Sev=Info/4          IKE/0x63000013

SENDING >>> ISAKMP OAK MM (SA, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 195.239.64.243

194    13:35:08.796  06/27/13  Sev=Info/5          IKE/0x6300002F

Received ISAKMP packet: peer = 195.239.64.243

195    13:35:08.796  06/27/13  Sev=Info/4          IKE/0x63000014

RECEIVING <<< ISAKMP OAK MM (SA, VID(Nat-T), VID(Frag)) from 195.239.64.243

196    13:35:08.800  06/27/13  Sev=Info/5          IKE/0x63000001

Peer supports NAT-T

197    13:35:08.800  06/27/13  Sev=Info/5          IKE/0x63000001

Peer supports IKE fragmentation payloads

198    13:35:08.800  06/27/13  Sev=Info/6          IKE/0x63000001

IOS Vendor ID Contruction successful

199    13:35:08.800  06/27/13  Sev=Info/4          IKE/0x63000013

SENDING >>> ISAKMP OAK MM (KE, NON, NAT-D, NAT-D, VID(?), VID(Unity)) to 195.239.64.243

200    13:35:08.832  06/27/13  Sev=Info/5          IKE/0x6300002F

Received ISAKMP packet: peer = 195.239.64.243

201    13:35:08.832  06/27/13  Sev=Info/4          IKE/0x63000014

RECEIVING <<< ISAKMP OAK MM (KE, NON, CERT_REQ, CERT_REQ, VID(Unity), VID(Xauth), VID(?), VID(?), NAT-D, NAT-D) from 195.239.64.243

202    13:35:08.832  06/27/13  Sev=Info/5          IKE/0x63000001

Peer is a Cisco-Unity compliant peer

203    13:35:08.832  06/27/13  Sev=Info/5          IKE/0x63000001

Peer supports XAUTH

204    13:35:08.832  06/27/13  Sev=Info/5          IKE/0x63000082

Received IOS Vendor ID with unknown capabilities flag 0x20000001

205    13:35:08.877  06/27/13  Sev=Info/6          CERT/0x63600034

Attempting to sign the hash for Windows XP or higher.

206    13:37:08.906  06/27/13  Sev=Warning/2          CERT/0xE3600001

ProcessApiRemove failed with error code: 0xfffffffb (-5) from C:\temp\build\rel_5.0.70.494236314968-Fri-04-Mar-2011-19-37-25\rel_5.0.7\UnityCertAPI\BCertAPI.cpp:#3338

207    13:37:08.906  06/27/13  Sev=Info/6          CERT/0x63600035

Done with the hash signing with signature length of 0.

208    13:37:08.906  06/27/13  Sev=Info/4          CERT/0xE3600005

Failed to RSA sign the hash for IKE phase 1 negotiation using my certificate.

209    13:37:08.906  06/27/13  Sev=Warning/2          IKE/0xE300009B

Failed to generate signature: Signature generation failed (SigUtil:97)

210    13:37:08.906  06/27/13  Sev=Warning/2          IKE/0xE300009B

Failed to build Signature payload (MsgHandlerMM:489)

211    13:37:08.906  06/27/13  Sev=Warning/2          IKE/0xE300009B

Failed to build MM msg5 (NavigatorMM:312)

212    13:37:08.906  06/27/13  Sev=Warning/2          IKE/0xE30000A7

Unexpected SW error occurred while processing Identity Protection (Main Mode) negotiator:(Navigator:2263)

213    13:37:08.906  06/27/13  Sev=Info/4          IKE/0x63000017

Marking IKE SA for deletion  (I_Cookie=330DA1434A28078F R_Cookie=3BD2898DB088748C) reason = DEL_REASON_IKE_NEG_FAILED

214    13:37:08.907  06/27/13  Sev=Info/4          IKE/0x63000013

SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 195.239.64.243

215    13:37:08.907  06/27/13  Sev=Info/5          IKE/0x6300002F

Received ISAKMP packet: peer = 195.239.64.243

216    13:37:08.907  06/27/13  Sev=Info/4          IKE/0x63000058

Received an ISAKMP message for a non-active SA, I_Cookie=330DA1434A28078F R_Cookie=3BD2898DB088748C

217    13:37:08.907  06/27/13  Sev=Info/4          IKE/0x63000014

RECEIVING <<< ISAKMP OAK MM (Dropped) from 195.239.64.243

218    13:37:08.907  06/27/13  Sev=Info/5          IKE/0x6300002F

Received ISAKMP packet: peer = 195.239.64.243

219    13:37:08.907  06/27/13  Sev=Info/4          IKE/0x63000058

Received an ISAKMP message for a non-active SA, I_Cookie=330DA1434A28078F R_Cookie=3BD2898DB088748C

220    13:37:08.907  06/27/13  Sev=Info/4          IKE/0x63000014

RECEIVING <<< ISAKMP OAK MM (Dropped) from 195.239.64.243

221    13:37:08.907  06/27/13  Sev=Info/5          IKE/0x6300002F

Received ISAKMP packet: peer = 195.239.64.243

222    13:37:08.907  06/27/13  Sev=Info/4          IKE/0x63000058

Received an ISAKMP message for a non-active SA, I_Cookie=330DA1434A28078F R_Cookie=3BD2898DB088748C

223    13:37:08.907  06/27/13  Sev=Info/4          IKE/0x63000014

RECEIVING <<< ISAKMP OAK MM (Dropped) from 195.239.64.243

224    13:37:08.907  06/27/13  Sev=Info/5          IKE/0x6300002F

Received ISAKMP packet: peer = 195.239.64.243

225    13:37:08.907  06/27/13  Sev=Info/4          IKE/0x63000058

Received an ISAKMP message for a non-active SA, I_Cookie=330DA1434A28078F R_Cookie=3BD2898DB088748C

226    13:37:08.907  06/27/13  Sev=Info/4          IKE/0x63000014

RECEIVING <<< ISAKMP OAK INFO *(Dropped) from 195.239.64.243

227    13:37:08.907  06/27/13  Sev=Info/4          IPSEC/0x63700008

IPSec driver successfully started

228    13:37:08.907  06/27/13  Sev=Info/4          IPSEC/0x63700014

Deleted all keys

229    13:37:09.561  06/27/13  Sev=Info/4          IKE/0x6300004B

Discarding IKE SA negotiation (I_Cookie=330DA1434A28078F R_Cookie=3BD2898DB088748C) reason = DEL_REASON_IKE_NEG_FAILED

230    13:37:09.561  06/27/13  Sev=Info/4          CM/0x63100014

Unable to establish Phase 1 SA with server "vpn1.alfastrah.ru" because of "DEL_REASON_IKE_NEG_FAILED"

231    13:37:09.561  06/27/13  Sev=Info/5          CM/0x63100025

Initializing CVPNDrv

232    13:37:09.567  06/27/13  Sev=Info/6          CM/0x63100046

Set tunnel established flag in registry to 0.

233    13:37:09.567  06/27/13  Sev=Info/4          IKE/0x63000001

IKE received signal to terminate VPN connection

234    13:37:10.566  06/27/13  Sev=Info/4          IPSEC/0x63700014

Deleted all keys

235    13:37:10.567  06/27/13  Sev=Info/4          IPSEC/0x63700014

Deleted all keys

236    13:37:10.567  06/27/13  Sev=Info/4          IPSEC/0x63700014

Deleted all keys

237    13:37:10.567  06/27/13  Sev=Info/4          IPSEC/0x6370000A

IPSec driver successfully stopped

1 Reply 1

artemoniks
Level 1
Level 1

Please help me! What should i do ?