Aug 26 13:21:37.251087: FIPS Product: YES Aug 26 13:21:37.251163: FIPS Kernel: NO Aug 26 13:21:37.251165: FIPS Mode: NO Aug 26 13:21:37.251167: NSS DB directory: sql:/etc/ipsec.d Aug 26 13:21:37.251283: Initializing NSS Aug 26 13:21:37.251313: Opening NSS database "sql:/etc/ipsec.d" read-only Aug 26 13:21:37.273272: NSS initialized Aug 26 13:21:37.273285: NSS crypto library initialized Aug 26 13:21:37.273287: FIPS HMAC integrity support [enabled] Aug 26 13:21:37.273294: FIPS mode disabled for pluto daemon Aug 26 13:21:37.298318: FIPS HMAC integrity verification self-test FAILED Aug 26 13:21:37.298409: libcap-ng support [enabled] Aug 26 13:21:37.298417: Linux audit support [enabled] Aug 26 13:21:37.298434: Linux audit activated Aug 26 13:21:37.298437: Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:3876 Aug 26 13:21:37.298439: core dump dir: /tmp Aug 26 13:21:37.298441: secrets file: /etc/ipsec.secrets Aug 26 13:21:37.298442: leak-detective enabled Aug 26 13:21:37.298444: NSS crypto [enabled] Aug 26 13:21:37.298445: XAUTH PAM support [enabled] Aug 26 13:21:37.298502: | libevent is using pluto's memory allocator Aug 26 13:21:37.298507: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Aug 26 13:21:37.298518: | libevent_malloc: new ptr-libevent@0x560749a62ad8 size 40 Aug 26 13:21:37.298522: | libevent_malloc: new ptr-libevent@0x560749a62a58 size 40 Aug 26 13:21:37.298525: | libevent_malloc: new ptr-libevent@0x560749a629d8 size 40 Aug 26 13:21:37.298526: | creating event base Aug 26 13:21:37.298529: | libevent_malloc: new ptr-libevent@0x560749a54608 size 56 Aug 26 13:21:37.298532: | libevent_malloc: new ptr-libevent@0x5607499d5448 size 664 Aug 26 13:21:37.298540: | libevent_malloc: new ptr-libevent@0x560749a9d0f8 size 24 Aug 26 13:21:37.298542: | libevent_malloc: new ptr-libevent@0x560749a9d148 size 384 Aug 26 13:21:37.298549: | libevent_malloc: new ptr-libevent@0x560749a9d0b8 size 16 Aug 26 13:21:37.298551: | libevent_malloc: new ptr-libevent@0x560749a62958 size 40 Aug 26 13:21:37.298553: | libevent_malloc: new ptr-libevent@0x560749a628d8 size 48 Aug 26 13:21:37.298556: | libevent_realloc: new ptr-libevent@0x5607499d50d8 size 256 Aug 26 13:21:37.298558: | libevent_malloc: new ptr-libevent@0x560749a9d2f8 size 16 Aug 26 13:21:37.298561: | libevent_free: release ptr-libevent@0x560749a54608 Aug 26 13:21:37.298564: | libevent initialized Aug 26 13:21:37.298566: | libevent_realloc: new ptr-libevent@0x560749a54608 size 64 Aug 26 13:21:37.298569: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Aug 26 13:21:37.298579: | init_nat_traversal() initialized with keep_alive=0s Aug 26 13:21:37.298581: NAT-Traversal support [enabled] Aug 26 13:21:37.298583: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Aug 26 13:21:37.298587: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Aug 26 13:21:37.298592: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Aug 26 13:21:37.298617: | global one-shot timer EVENT_REVIVE_CONNS initialized Aug 26 13:21:37.298619: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Aug 26 13:21:37.298621: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Aug 26 13:21:37.298654: Encryption algorithms: Aug 26 13:21:37.298660: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c Aug 26 13:21:37.298664: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b Aug 26 13:21:37.298667: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a Aug 26 13:21:37.298671: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des Aug 26 13:21:37.298675: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Aug 26 13:21:37.298682: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia Aug 26 13:21:37.298686: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c Aug 26 13:21:37.298690: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b Aug 26 13:21:37.298694: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a Aug 26 13:21:37.298696: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr Aug 26 13:21:37.298698: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes Aug 26 13:21:37.298700: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent Aug 26 13:21:37.298703: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish Aug 26 13:21:37.298705: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh Aug 26 13:21:37.298707: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac Aug 26 13:21:37.298709: NULL IKEv1: ESP IKEv2: ESP [] Aug 26 13:21:37.298711: CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Aug 26 13:21:37.298716: Hash algorithms: Aug 26 13:21:37.298718: MD5 IKEv1: IKE IKEv2: Aug 26 13:21:37.298719: SHA1 IKEv1: IKE IKEv2: FIPS sha Aug 26 13:21:37.298721: SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 Aug 26 13:21:37.298723: SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 Aug 26 13:21:37.298725: SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 Aug 26 13:21:37.298733: PRF algorithms: Aug 26 13:21:37.298735: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 Aug 26 13:21:37.298737: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 Aug 26 13:21:37.298739: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 Aug 26 13:21:37.298741: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 Aug 26 13:21:37.298743: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 Aug 26 13:21:37.298745: AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Aug 26 13:21:37.298761: Integrity algorithms: Aug 26 13:21:37.298763: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 Aug 26 13:21:37.298765: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 Aug 26 13:21:37.298768: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Aug 26 13:21:37.298770: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Aug 26 13:21:37.298773: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Aug 26 13:21:37.298774: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Aug 26 13:21:37.298776: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 Aug 26 13:21:37.298778: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Aug 26 13:21:37.298780: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Aug 26 13:21:37.298788: DH algorithms: Aug 26 13:21:37.298790: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 Aug 26 13:21:37.298792: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 Aug 26 13:21:37.298793: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 Aug 26 13:21:37.298797: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 Aug 26 13:21:37.298799: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 Aug 26 13:21:37.298800: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 Aug 26 13:21:37.298802: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 Aug 26 13:21:37.298804: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 Aug 26 13:21:37.298806: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 Aug 26 13:21:37.298808: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 Aug 26 13:21:37.298810: DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 Aug 26 13:21:37.298811: testing CAMELLIA_CBC: Aug 26 13:21:37.298813: Camellia: 16 bytes with 128-bit key Aug 26 13:21:37.298902: Camellia: 16 bytes with 128-bit key Aug 26 13:21:37.298921: Camellia: 16 bytes with 256-bit key Aug 26 13:21:37.298940: Camellia: 16 bytes with 256-bit key Aug 26 13:21:37.298957: testing AES_GCM_16: Aug 26 13:21:37.298959: empty string Aug 26 13:21:37.298992: one block Aug 26 13:21:37.299010: two blocks Aug 26 13:21:37.299052: two blocks with associated data Aug 26 13:21:37.299068: testing AES_CTR: Aug 26 13:21:37.299070: Encrypting 16 octets using AES-CTR with 128-bit key Aug 26 13:21:37.299088: Encrypting 32 octets using AES-CTR with 128-bit key Aug 26 13:21:37.299124: Encrypting 36 octets using AES-CTR with 128-bit key Aug 26 13:21:37.299158: Encrypting 16 octets using AES-CTR with 192-bit key Aug 26 13:21:37.299175: Encrypting 32 octets using AES-CTR with 192-bit key Aug 26 13:21:37.299191: Encrypting 36 octets using AES-CTR with 192-bit key Aug 26 13:21:37.299208: Encrypting 16 octets using AES-CTR with 256-bit key Aug 26 13:21:37.299224: Encrypting 32 octets using AES-CTR with 256-bit key Aug 26 13:21:37.299241: Encrypting 36 octets using AES-CTR with 256-bit key Aug 26 13:21:37.299258: testing AES_CBC: Aug 26 13:21:37.299260: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Aug 26 13:21:37.299277: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Aug 26 13:21:37.299300: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Aug 26 13:21:37.299334: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Aug 26 13:21:37.299354: testing AES_XCBC: Aug 26 13:21:37.299356: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input Aug 26 13:21:37.299428: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input Aug 26 13:21:37.299507: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input Aug 26 13:21:37.299581: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input Aug 26 13:21:37.299656: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input Aug 26 13:21:37.299730: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input Aug 26 13:21:37.299806: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input Aug 26 13:21:37.299973: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Aug 26 13:21:37.300050: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Aug 26 13:21:37.300130: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Aug 26 13:21:37.300271: testing HMAC_MD5: Aug 26 13:21:37.300273: RFC 2104: MD5_HMAC test 1 Aug 26 13:21:37.300410: RFC 2104: MD5_HMAC test 2 Aug 26 13:21:37.300503: RFC 2104: MD5_HMAC test 3 Aug 26 13:21:37.300681: 8 CPU cores online Aug 26 13:21:37.300685: starting up 7 crypto helpers Aug 26 13:21:37.300821: started thread for crypto helper 0 Aug 26 13:21:37.300847: | starting up helper thread 0 Aug 26 13:21:37.300854: started thread for crypto helper 1 Aug 26 13:21:37.300861: | starting up helper thread 1 Aug 26 13:21:37.300877: | status value returned by setting the priority of this thread (crypto helper 1) 22 Aug 26 13:21:37.300879: | crypto helper 1 waiting (nothing to do) Aug 26 13:21:37.300866: | status value returned by setting the priority of this thread (crypto helper 0) 22 Aug 26 13:21:37.300892: | crypto helper 0 waiting (nothing to do) Aug 26 13:21:37.300893: started thread for crypto helper 2 Aug 26 13:21:37.300929: started thread for crypto helper 3 Aug 26 13:21:37.300930: | starting up helper thread 2 Aug 26 13:21:37.300950: | starting up helper thread 3 Aug 26 13:21:37.300952: | status value returned by setting the priority of this thread (crypto helper 2) 22 Aug 26 13:21:37.300964: | starting up helper thread 4 Aug 26 13:21:37.300960: started thread for crypto helper 4 Aug 26 13:21:37.300970: | crypto helper 2 waiting (nothing to do) Aug 26 13:21:37.300966: | status value returned by setting the priority of this thread (crypto helper 3) 22 Aug 26 13:21:37.301002: | crypto helper 3 waiting (nothing to do) Aug 26 13:21:37.300990: | status value returned by setting the priority of this thread (crypto helper 4) 22 Aug 26 13:21:37.301009: started thread for crypto helper 5 Aug 26 13:21:37.301011: | crypto helper 4 waiting (nothing to do) Aug 26 13:21:37.301030: | starting up helper thread 5 Aug 26 13:21:37.301041: | status value returned by setting the priority of this thread (crypto helper 5) 22 Aug 26 13:21:37.301041: started thread for crypto helper 6 Aug 26 13:21:37.301046: | checking IKEv1 state table Aug 26 13:21:37.301043: | starting up helper thread 6 Aug 26 13:21:37.301044: | crypto helper 5 waiting (nothing to do) Aug 26 13:21:37.301056: | MAIN_R0: category: half-open IKE SA flags: 0: Aug 26 13:21:37.301054: | status value returned by setting the priority of this thread (crypto helper 6) 22 Aug 26 13:21:37.301059: | -> MAIN_R1 EVENT_SO_DISCARD Aug 26 13:21:37.301063: | crypto helper 6 waiting (nothing to do) Aug 26 13:21:37.301067: | MAIN_I1: category: half-open IKE SA flags: 0: Aug 26 13:21:37.301071: | -> MAIN_I2 EVENT_RETRANSMIT Aug 26 13:21:37.301073: | MAIN_R1: category: open IKE SA flags: 200: Aug 26 13:21:37.301075: | -> MAIN_R2 EVENT_RETRANSMIT Aug 26 13:21:37.301076: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:21:37.301078: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:21:37.301079: | MAIN_I2: category: open IKE SA flags: 0: Aug 26 13:21:37.301081: | -> MAIN_I3 EVENT_RETRANSMIT Aug 26 13:21:37.301082: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:21:37.301084: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:21:37.301086: | MAIN_R2: category: open IKE SA flags: 0: Aug 26 13:21:37.301087: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:21:37.301089: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:21:37.301090: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 13:21:37.301092: | MAIN_I3: category: open IKE SA flags: 0: Aug 26 13:21:37.301093: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:21:37.301095: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:21:37.301096: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 13:21:37.301098: | MAIN_R3: category: established IKE SA flags: 200: Aug 26 13:21:37.301100: | -> UNDEFINED EVENT_NULL Aug 26 13:21:37.301101: | MAIN_I4: category: established IKE SA flags: 0: Aug 26 13:21:37.301103: | -> UNDEFINED EVENT_NULL Aug 26 13:21:37.301105: | AGGR_R0: category: half-open IKE SA flags: 0: Aug 26 13:21:37.301107: | -> AGGR_R1 EVENT_SO_DISCARD Aug 26 13:21:37.301110: | AGGR_I1: category: half-open IKE SA flags: 0: Aug 26 13:21:37.301112: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 13:21:37.301114: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 13:21:37.301117: | AGGR_R1: category: open IKE SA flags: 200: Aug 26 13:21:37.301132: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 13:21:37.301134: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 13:21:37.301137: | AGGR_I2: category: established IKE SA flags: 200: Aug 26 13:21:37.301139: | -> UNDEFINED EVENT_NULL Aug 26 13:21:37.301142: | AGGR_R2: category: established IKE SA flags: 0: Aug 26 13:21:37.301144: | -> UNDEFINED EVENT_NULL Aug 26 13:21:37.301147: | QUICK_R0: category: established CHILD SA flags: 0: Aug 26 13:21:37.301149: | -> QUICK_R1 EVENT_RETRANSMIT Aug 26 13:21:37.301155: | QUICK_I1: category: established CHILD SA flags: 0: Aug 26 13:21:37.301157: | -> QUICK_I2 EVENT_SA_REPLACE Aug 26 13:21:37.301160: | QUICK_R1: category: established CHILD SA flags: 0: Aug 26 13:21:37.301162: | -> QUICK_R2 EVENT_SA_REPLACE Aug 26 13:21:37.301165: | QUICK_I2: category: established CHILD SA flags: 200: Aug 26 13:21:37.301167: | -> UNDEFINED EVENT_NULL Aug 26 13:21:37.301170: | QUICK_R2: category: established CHILD SA flags: 0: Aug 26 13:21:37.301173: | -> UNDEFINED EVENT_NULL Aug 26 13:21:37.301175: | INFO: category: informational flags: 0: Aug 26 13:21:37.301177: | -> UNDEFINED EVENT_NULL Aug 26 13:21:37.301180: | INFO_PROTECTED: category: informational flags: 0: Aug 26 13:21:37.301183: | -> UNDEFINED EVENT_NULL Aug 26 13:21:37.301185: | XAUTH_R0: category: established IKE SA flags: 0: Aug 26 13:21:37.301188: | -> XAUTH_R1 EVENT_NULL Aug 26 13:21:37.301190: | XAUTH_R1: category: established IKE SA flags: 0: Aug 26 13:21:37.301193: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:21:37.301196: | MODE_CFG_R0: category: informational flags: 0: Aug 26 13:21:37.301198: | -> MODE_CFG_R1 EVENT_SA_REPLACE Aug 26 13:21:37.301201: | MODE_CFG_R1: category: established IKE SA flags: 0: Aug 26 13:21:37.301203: | -> MODE_CFG_R2 EVENT_SA_REPLACE Aug 26 13:21:37.301206: | MODE_CFG_R2: category: established IKE SA flags: 0: Aug 26 13:21:37.301208: | -> UNDEFINED EVENT_NULL Aug 26 13:21:37.301210: | MODE_CFG_I1: category: established IKE SA flags: 0: Aug 26 13:21:37.301211: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:21:37.301213: | XAUTH_I0: category: established IKE SA flags: 0: Aug 26 13:21:37.301215: | -> XAUTH_I1 EVENT_RETRANSMIT Aug 26 13:21:37.301216: | XAUTH_I1: category: established IKE SA flags: 0: Aug 26 13:21:37.301218: | -> MAIN_I4 EVENT_RETRANSMIT Aug 26 13:21:37.301224: | checking IKEv2 state table Aug 26 13:21:37.301228: | PARENT_I0: category: ignore flags: 0: Aug 26 13:21:37.301230: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Aug 26 13:21:37.301232: | PARENT_I1: category: half-open IKE SA flags: 0: Aug 26 13:21:37.301233: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) Aug 26 13:21:37.301235: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) Aug 26 13:21:37.301237: | PARENT_I2: category: open IKE SA flags: 0: Aug 26 13:21:37.301239: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Aug 26 13:21:37.301241: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Aug 26 13:21:37.301242: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Aug 26 13:21:37.301244: | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Aug 26 13:21:37.301246: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Aug 26 13:21:37.301247: | PARENT_I3: category: established IKE SA flags: 0: Aug 26 13:21:37.301249: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) Aug 26 13:21:37.301251: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) Aug 26 13:21:37.301252: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) Aug 26 13:21:37.301254: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) Aug 26 13:21:37.301256: | PARENT_R0: category: half-open IKE SA flags: 0: Aug 26 13:21:37.301257: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) Aug 26 13:21:37.301259: | PARENT_R1: category: half-open IKE SA flags: 0: Aug 26 13:21:37.301261: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) Aug 26 13:21:37.301262: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) Aug 26 13:21:37.301264: | PARENT_R2: category: established IKE SA flags: 0: Aug 26 13:21:37.301266: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) Aug 26 13:21:37.301269: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) Aug 26 13:21:37.301271: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) Aug 26 13:21:37.301273: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) Aug 26 13:21:37.301275: | V2_CREATE_I0: category: established IKE SA flags: 0: Aug 26 13:21:37.301276: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Aug 26 13:21:37.301278: | V2_CREATE_I: category: established IKE SA flags: 0: Aug 26 13:21:37.301280: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Aug 26 13:21:37.301281: | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: Aug 26 13:21:37.301283: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Aug 26 13:21:37.301285: | V2_REKEY_IKE_I: category: established IKE SA flags: 0: Aug 26 13:21:37.301287: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Aug 26 13:21:37.301316: | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: Aug 26 13:21:37.301331: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Aug 26 13:21:37.301333: | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: Aug 26 13:21:37.301335: | V2_CREATE_R: category: established IKE SA flags: 0: Aug 26 13:21:37.301336: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) Aug 26 13:21:37.301338: | V2_REKEY_IKE_R: category: established IKE SA flags: 0: Aug 26 13:21:37.301340: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) Aug 26 13:21:37.301342: | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: Aug 26 13:21:37.301343: | V2_IPSEC_I: category: established CHILD SA flags: 0: Aug 26 13:21:37.301345: | V2_IPSEC_R: category: established CHILD SA flags: 0: Aug 26 13:21:37.301347: | IKESA_DEL: category: established IKE SA flags: 0: Aug 26 13:21:37.301348: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Aug 26 13:21:37.301350: | CHILDSA_DEL: category: informational flags: 0: Aug 26 13:21:37.301363: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 Aug 26 13:21:37.301427: | Hard-wiring algorithms Aug 26 13:21:37.301432: | adding AES_CCM_16 to kernel algorithm db Aug 26 13:21:37.301436: | adding AES_CCM_12 to kernel algorithm db Aug 26 13:21:37.301439: | adding AES_CCM_8 to kernel algorithm db Aug 26 13:21:37.301442: | adding 3DES_CBC to kernel algorithm db Aug 26 13:21:37.301444: | adding CAMELLIA_CBC to kernel algorithm db Aug 26 13:21:37.301447: | adding AES_GCM_16 to kernel algorithm db Aug 26 13:21:37.301450: | adding AES_GCM_12 to kernel algorithm db Aug 26 13:21:37.301452: | adding AES_GCM_8 to kernel algorithm db Aug 26 13:21:37.301455: | adding AES_CTR to kernel algorithm db Aug 26 13:21:37.301458: | adding AES_CBC to kernel algorithm db Aug 26 13:21:37.301460: | adding SERPENT_CBC to kernel algorithm db Aug 26 13:21:37.301463: | adding TWOFISH_CBC to kernel algorithm db Aug 26 13:21:37.301466: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Aug 26 13:21:37.301469: | adding NULL to kernel algorithm db Aug 26 13:21:37.301471: | adding CHACHA20_POLY1305 to kernel algorithm db Aug 26 13:21:37.301474: | adding HMAC_MD5_96 to kernel algorithm db Aug 26 13:21:37.301477: | adding HMAC_SHA1_96 to kernel algorithm db Aug 26 13:21:37.301480: | adding HMAC_SHA2_512_256 to kernel algorithm db Aug 26 13:21:37.301482: | adding HMAC_SHA2_384_192 to kernel algorithm db Aug 26 13:21:37.301485: | adding HMAC_SHA2_256_128 to kernel algorithm db Aug 26 13:21:37.301488: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Aug 26 13:21:37.301490: | adding AES_XCBC_96 to kernel algorithm db Aug 26 13:21:37.301493: | adding AES_CMAC_96 to kernel algorithm db Aug 26 13:21:37.301496: | adding NONE to kernel algorithm db Aug 26 13:21:37.301519: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Aug 26 13:21:37.301525: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Aug 26 13:21:37.301528: | setup kernel fd callback Aug 26 13:21:37.301532: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x560749a5c7f8 Aug 26 13:21:37.301535: | libevent_malloc: new ptr-libevent@0x560749a9b8b8 size 128 Aug 26 13:21:37.301539: | libevent_malloc: new ptr-libevent@0x560749aa28f8 size 16 Aug 26 13:21:37.301545: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x560749aa2888 Aug 26 13:21:37.301549: | libevent_malloc: new ptr-libevent@0x560749a55218 size 128 Aug 26 13:21:37.301553: | libevent_malloc: new ptr-libevent@0x560749aa2558 size 16 Aug 26 13:21:37.301700: | global one-shot timer EVENT_CHECK_CRLS initialized Aug 26 13:21:37.301708: selinux support is enabled. Aug 26 13:21:37.301878: | unbound context created - setting debug level to 5 Aug 26 13:21:37.301898: | /etc/hosts lookups activated Aug 26 13:21:37.301908: | /etc/resolv.conf usage activated Aug 26 13:21:37.301944: | outgoing-port-avoid set 0-65535 Aug 26 13:21:37.301961: | outgoing-port-permit set 32768-60999 Aug 26 13:21:37.301963: | Loading dnssec root key from:/var/lib/unbound/root.key Aug 26 13:21:37.301965: | No additional dnssec trust anchors defined via dnssec-trusted= option Aug 26 13:21:37.301967: | Setting up events, loop start Aug 26 13:21:37.301969: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x560749aa2d28 Aug 26 13:21:37.301971: | libevent_malloc: new ptr-libevent@0x560749aae798 size 128 Aug 26 13:21:37.301973: | libevent_malloc: new ptr-libevent@0x560749ab9a08 size 16 Aug 26 13:21:37.301977: | libevent_realloc: new ptr-libevent@0x560749ab9a48 size 256 Aug 26 13:21:37.301979: | libevent_malloc: new ptr-libevent@0x560749ab9b78 size 8 Aug 26 13:21:37.301981: | libevent_realloc: new ptr-libevent@0x560749ab9bb8 size 144 Aug 26 13:21:37.301983: | libevent_malloc: new ptr-libevent@0x560749a60dc8 size 152 Aug 26 13:21:37.301985: | libevent_malloc: new ptr-libevent@0x560749ab9c78 size 16 Aug 26 13:21:37.301988: | signal event handler PLUTO_SIGCHLD installed Aug 26 13:21:37.301990: | libevent_malloc: new ptr-libevent@0x560749ab9cb8 size 8 Aug 26 13:21:37.301991: | libevent_malloc: new ptr-libevent@0x5607499d5838 size 152 Aug 26 13:21:37.301993: | signal event handler PLUTO_SIGTERM installed Aug 26 13:21:37.301995: | libevent_malloc: new ptr-libevent@0x560749ab9cf8 size 8 Aug 26 13:21:37.301998: | libevent_malloc: new ptr-libevent@0x5607499deba8 size 152 Aug 26 13:21:37.302000: | signal event handler PLUTO_SIGHUP installed Aug 26 13:21:37.302001: | libevent_malloc: new ptr-libevent@0x560749ab9d38 size 8 Aug 26 13:21:37.302003: | libevent_realloc: release ptr-libevent@0x560749ab9bb8 Aug 26 13:21:37.302005: | libevent_realloc: new ptr-libevent@0x560749ab9d78 size 256 Aug 26 13:21:37.302007: | libevent_malloc: new ptr-libevent@0x560749ab9ea8 size 152 Aug 26 13:21:37.302009: | signal event handler PLUTO_SIGSYS installed Aug 26 13:21:37.302250: | created addconn helper (pid:3906) using fork+execve Aug 26 13:21:37.302262: | forked child 3906 Aug 26 13:21:37.308368: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:21:37.308390: listening for IKE messages Aug 26 13:21:37.308429: | Inspecting interface lo Aug 26 13:21:37.308434: | found lo with address 127.0.0.1 Aug 26 13:21:37.308439: | Inspecting interface eth0 Aug 26 13:21:37.308442: | found eth0 with address 192.0.3.254 Aug 26 13:21:37.308444: | Inspecting interface eth1 Aug 26 13:21:37.308447: | found eth1 with address 192.1.3.33 Aug 26 13:21:37.308519: Kernel supports NIC esp-hw-offload Aug 26 13:21:37.308527: adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.3.33:500 Aug 26 13:21:37.308542: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 13:21:37.308545: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 13:21:37.308548: adding interface eth1/eth1 192.1.3.33:4500 Aug 26 13:21:37.308568: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.3.254:500 Aug 26 13:21:37.308582: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 13:21:37.308585: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 13:21:37.308587: adding interface eth0/eth0 192.0.3.254:4500 Aug 26 13:21:37.308603: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 Aug 26 13:21:37.308617: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 13:21:37.308619: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 13:21:37.308621: adding interface lo/lo 127.0.0.1:4500 Aug 26 13:21:37.308662: | no interfaces to sort Aug 26 13:21:37.308665: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 13:21:37.308670: | add_fd_read_event_handler: new ethX-pe@0x560749aba408 Aug 26 13:21:37.308673: | libevent_malloc: new ptr-libevent@0x560749aae6e8 size 128 Aug 26 13:21:37.308676: | libevent_malloc: new ptr-libevent@0x560749aba478 size 16 Aug 26 13:21:37.308681: | setup callback for interface lo 127.0.0.1:4500 fd 22 Aug 26 13:21:37.308682: | add_fd_read_event_handler: new ethX-pe@0x560749aba4b8 Aug 26 13:21:37.308685: | libevent_malloc: new ptr-libevent@0x560749a552c8 size 128 Aug 26 13:21:37.308687: | libevent_malloc: new ptr-libevent@0x560749aba528 size 16 Aug 26 13:21:37.308690: | setup callback for interface lo 127.0.0.1:500 fd 21 Aug 26 13:21:37.308692: | add_fd_read_event_handler: new ethX-pe@0x560749aba568 Aug 26 13:21:37.308694: | libevent_malloc: new ptr-libevent@0x560749a54be8 size 128 Aug 26 13:21:37.308696: | libevent_malloc: new ptr-libevent@0x560749aba5d8 size 16 Aug 26 13:21:37.308699: | setup callback for interface eth0 192.0.3.254:4500 fd 20 Aug 26 13:21:37.308701: | add_fd_read_event_handler: new ethX-pe@0x560749aba618 Aug 26 13:21:37.308702: | libevent_malloc: new ptr-libevent@0x560749a542a8 size 128 Aug 26 13:21:37.308704: | libevent_malloc: new ptr-libevent@0x560749aba688 size 16 Aug 26 13:21:37.308707: | setup callback for interface eth0 192.0.3.254:500 fd 19 Aug 26 13:21:37.308708: | add_fd_read_event_handler: new ethX-pe@0x560749aba6c8 Aug 26 13:21:37.308710: | libevent_malloc: new ptr-libevent@0x560749a543a8 size 128 Aug 26 13:21:37.308712: | libevent_malloc: new ptr-libevent@0x560749aba738 size 16 Aug 26 13:21:37.308714: | setup callback for interface eth1 192.1.3.33:4500 fd 18 Aug 26 13:21:37.308716: | add_fd_read_event_handler: new ethX-pe@0x560749aba778 Aug 26 13:21:37.308718: | libevent_malloc: new ptr-libevent@0x560749a544a8 size 128 Aug 26 13:21:37.308719: | libevent_malloc: new ptr-libevent@0x560749aba7e8 size 16 Aug 26 13:21:37.308722: | setup callback for interface eth1 192.1.3.33:500 fd 17 Aug 26 13:21:37.308725: | certs and keys locked by 'free_preshared_secrets' Aug 26 13:21:37.308727: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 13:21:37.308741: loading secrets from "/etc/ipsec.secrets" Aug 26 13:21:37.308752: | saving Modulus Aug 26 13:21:37.308754: | saving PublicExponent Aug 26 13:21:37.308757: | ignoring PrivateExponent Aug 26 13:21:37.308759: | ignoring Prime1 Aug 26 13:21:37.308761: | ignoring Prime2 Aug 26 13:21:37.308763: | ignoring Exponent1 Aug 26 13:21:37.308765: | ignoring Exponent2 Aug 26 13:21:37.308767: | ignoring Coefficient Aug 26 13:21:37.308769: | ignoring CKAIDNSS Aug 26 13:21:37.308798: | computed rsa CKAID 90 5d fc a1 08 68 74 7c 6f 20 d3 1b 2d 20 4b 8f Aug 26 13:21:37.308800: | computed rsa CKAID 88 aa 7c 5d Aug 26 13:21:37.308803: loaded private key for keyid: PKK_RSA:AQPl33O2P Aug 26 13:21:37.308809: | certs and keys locked by 'process_secret' Aug 26 13:21:37.308812: | certs and keys unlocked by 'process_secret' Aug 26 13:21:37.308818: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:21:37.308823: | spent 0.478 milliseconds in whack Aug 26 13:21:37.320058: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:21:37.320074: listening for IKE messages Aug 26 13:21:37.320099: | Inspecting interface lo Aug 26 13:21:37.320104: | found lo with address 127.0.0.1 Aug 26 13:21:37.320106: | Inspecting interface eth0 Aug 26 13:21:37.320109: | found eth0 with address 192.0.3.254 Aug 26 13:21:37.320110: | Inspecting interface eth1 Aug 26 13:21:37.320113: | found eth1 with address 192.1.3.33 Aug 26 13:21:37.320149: | no interfaces to sort Aug 26 13:21:37.320155: | libevent_free: release ptr-libevent@0x560749aae6e8 Aug 26 13:21:37.320157: | free_event_entry: release EVENT_NULL-pe@0x560749aba408 Aug 26 13:21:37.320159: | add_fd_read_event_handler: new ethX-pe@0x560749aba408 Aug 26 13:21:37.320162: | libevent_malloc: new ptr-libevent@0x560749aae6e8 size 128 Aug 26 13:21:37.320166: | setup callback for interface lo 127.0.0.1:4500 fd 22 Aug 26 13:21:37.320168: | libevent_free: release ptr-libevent@0x560749a552c8 Aug 26 13:21:37.320170: | free_event_entry: release EVENT_NULL-pe@0x560749aba4b8 Aug 26 13:21:37.320172: | add_fd_read_event_handler: new ethX-pe@0x560749aba4b8 Aug 26 13:21:37.320173: | libevent_malloc: new ptr-libevent@0x560749a552c8 size 128 Aug 26 13:21:37.320177: | setup callback for interface lo 127.0.0.1:500 fd 21 Aug 26 13:21:37.320179: | libevent_free: release ptr-libevent@0x560749a54be8 Aug 26 13:21:37.320181: | free_event_entry: release EVENT_NULL-pe@0x560749aba568 Aug 26 13:21:37.320182: | add_fd_read_event_handler: new ethX-pe@0x560749aba568 Aug 26 13:21:37.320184: | libevent_malloc: new ptr-libevent@0x560749a54be8 size 128 Aug 26 13:21:37.320187: | setup callback for interface eth0 192.0.3.254:4500 fd 20 Aug 26 13:21:37.320189: | libevent_free: release ptr-libevent@0x560749a542a8 Aug 26 13:21:37.320191: | free_event_entry: release EVENT_NULL-pe@0x560749aba618 Aug 26 13:21:37.320192: | add_fd_read_event_handler: new ethX-pe@0x560749aba618 Aug 26 13:21:37.320194: | libevent_malloc: new ptr-libevent@0x560749a542a8 size 128 Aug 26 13:21:37.320197: | setup callback for interface eth0 192.0.3.254:500 fd 19 Aug 26 13:21:37.320199: | libevent_free: release ptr-libevent@0x560749a543a8 Aug 26 13:21:37.320201: | free_event_entry: release EVENT_NULL-pe@0x560749aba6c8 Aug 26 13:21:37.320203: | add_fd_read_event_handler: new ethX-pe@0x560749aba6c8 Aug 26 13:21:37.320204: | libevent_malloc: new ptr-libevent@0x560749a543a8 size 128 Aug 26 13:21:37.320207: | setup callback for interface eth1 192.1.3.33:4500 fd 18 Aug 26 13:21:37.320210: | libevent_free: release ptr-libevent@0x560749a544a8 Aug 26 13:21:37.320211: | free_event_entry: release EVENT_NULL-pe@0x560749aba778 Aug 26 13:21:37.320213: | add_fd_read_event_handler: new ethX-pe@0x560749aba778 Aug 26 13:21:37.320214: | libevent_malloc: new ptr-libevent@0x560749a544a8 size 128 Aug 26 13:21:37.320217: | setup callback for interface eth1 192.1.3.33:500 fd 17 Aug 26 13:21:37.320219: | certs and keys locked by 'free_preshared_secrets' Aug 26 13:21:37.320221: forgetting secrets Aug 26 13:21:37.320228: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 13:21:37.320237: loading secrets from "/etc/ipsec.secrets" Aug 26 13:21:37.320247: | saving Modulus Aug 26 13:21:37.320249: | saving PublicExponent Aug 26 13:21:37.320252: | ignoring PrivateExponent Aug 26 13:21:37.320254: | ignoring Prime1 Aug 26 13:21:37.320256: | ignoring Prime2 Aug 26 13:21:37.320258: | ignoring Exponent1 Aug 26 13:21:37.320259: | ignoring Exponent2 Aug 26 13:21:37.320261: | ignoring Coefficient Aug 26 13:21:37.320263: | ignoring CKAIDNSS Aug 26 13:21:37.320278: | computed rsa CKAID 90 5d fc a1 08 68 74 7c 6f 20 d3 1b 2d 20 4b 8f Aug 26 13:21:37.320280: | computed rsa CKAID 88 aa 7c 5d Aug 26 13:21:37.320282: loaded private key for keyid: PKK_RSA:AQPl33O2P Aug 26 13:21:37.320286: | certs and keys locked by 'process_secret' Aug 26 13:21:37.320292: | certs and keys unlocked by 'process_secret' Aug 26 13:21:37.320303: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:21:37.320326: | spent 0.271 milliseconds in whack Aug 26 13:21:37.320691: | processing signal PLUTO_SIGCHLD Aug 26 13:21:37.320703: | waitpid returned pid 3906 (exited with status 0) Aug 26 13:21:37.320708: | reaped addconn helper child (status 0) Aug 26 13:21:37.320712: | waitpid returned ECHILD (no child processes left) Aug 26 13:21:37.320716: | spent 0.0166 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 13:21:37.382979: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:21:37.383001: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:21:37.383003: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 13:21:37.383005: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:21:37.383006: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 13:21:37.383010: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:21:37.383015: | Added new connection north-a-dpd with policy ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 13:21:37.383017: | No AUTH policy was set - defaulting to RSASIG Aug 26 13:21:37.383489: | setting ID to ID_DER_ASN1_DN: 'E=user-north@testing.libreswan.org,CN=north.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA' Aug 26 13:21:37.383502: | loading left certificate 'north' pubkey Aug 26 13:21:37.383580: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749abc978 Aug 26 13:21:37.383584: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749abc908 Aug 26 13:21:37.383609: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749abc7c8 Aug 26 13:21:37.383721: | unreference key: 0x560749abc9c8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org cnt 1-- Aug 26 13:21:37.383856: | certs and keys locked by 'lsw_add_rsa_secret' Aug 26 13:21:37.383860: | certs and keys unlocked by 'lsw_add_rsa_secret' Aug 26 13:21:37.383865: | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org is 0 Aug 26 13:21:37.384268: | setting ID to ID_DER_ASN1_DN: 'E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA' Aug 26 13:21:37.384274: | loading right certificate 'east' pubkey Aug 26 13:21:37.384364: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749abc908 Aug 26 13:21:37.384370: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749ac0b78 Aug 26 13:21:37.384372: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749abff98 Aug 26 13:21:37.384373: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749abfaa8 Aug 26 13:21:37.384375: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749abc518 Aug 26 13:21:37.384518: | unreference key: 0x560749ac57c8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- Aug 26 13:21:37.384594: | warning: no secret key loaded for right certificate with nickname east: NSS: cert private key not found Aug 26 13:21:37.384601: | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org is 0 Aug 26 13:21:37.384609: | connect_to_host_pair: 192.1.3.33:500 192.1.2.23:500 -> hp@(nil): none Aug 26 13:21:37.384611: | new hp@0x560749ac4fd8 Aug 26 13:21:37.384615: added connection description "north-a-dpd" Aug 26 13:21:37.384623: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 13:21:37.384638: | 192.0.3.0/24===192.1.3.33<192.1.3.33>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org]---192.1.3.254...192.1.2.23<192.1.2.23>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org]===192.0.22.0/24 Aug 26 13:21:37.384646: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:21:37.384656: | spent 1.67 milliseconds in whack Aug 26 13:21:37.460789: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:21:37.460809: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:21:37.460813: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 13:21:37.460815: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:21:37.460816: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 13:21:37.460820: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:21:37.460824: | Added new connection northnet-eastnet-b with policy ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 13:21:37.460827: | No AUTH policy was set - defaulting to RSASIG Aug 26 13:21:37.460953: | setting ID to ID_DER_ASN1_DN: 'E=user-north@testing.libreswan.org,CN=north.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA' Aug 26 13:21:37.460959: | loading left certificate 'north' pubkey Aug 26 13:21:37.461007: | unreference key: 0x560749ac0ed8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org cnt 1-- Aug 26 13:21:37.461020: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749abfaa8 Aug 26 13:21:37.461022: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749ac4cb8 Aug 26 13:21:37.461024: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749abc518 Aug 26 13:21:37.461058: | unreference key: 0x560749abfdc8 @north.testing.libreswan.org cnt 1-- Aug 26 13:21:37.461093: | unreference key: 0x560749ac09a8 user-north@testing.libreswan.org cnt 1-- Aug 26 13:21:37.461129: | unreference key: 0x560749ac7368 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org cnt 1-- Aug 26 13:21:37.461164: | secrets entry for north already exists Aug 26 13:21:37.461170: | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org is 0 Aug 26 13:21:37.461231: | setting ID to ID_DER_ASN1_DN: 'E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA' Aug 26 13:21:37.461236: | loading right certificate 'east' pubkey Aug 26 13:21:37.461272: | unreference key: 0x560749ac69b8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- Aug 26 13:21:37.461281: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749ac72f8 Aug 26 13:21:37.461283: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749ac51b8 Aug 26 13:21:37.461284: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749ac5168 Aug 26 13:21:37.461286: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749ac5648 Aug 26 13:21:37.461292: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749ac6968 Aug 26 13:21:37.461334: | unreference key: 0x560749ac5558 192.1.2.23 cnt 1-- Aug 26 13:21:37.461369: | unreference key: 0x560749ac4818 east@testing.libreswan.org cnt 1-- Aug 26 13:21:37.461402: | unreference key: 0x560749ac6308 @east.testing.libreswan.org cnt 1-- Aug 26 13:21:37.461436: | unreference key: 0x560749ac6758 user-east@testing.libreswan.org cnt 1-- Aug 26 13:21:37.461471: | unreference key: 0x560749ac52e8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- Aug 26 13:21:37.461553: | warning: no secret key loaded for right certificate with nickname east: NSS: cert private key not found Aug 26 13:21:37.461560: | counting wild cards for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org is 0 Aug 26 13:21:37.461566: | find_host_pair: comparing 192.1.3.33:500 to 192.1.2.23:500 but ignoring ports Aug 26 13:21:37.461569: | connect_to_host_pair: 192.1.3.33:500 192.1.2.23:500 -> hp@0x560749ac4fd8: north-a-dpd Aug 26 13:21:37.461571: added connection description "northnet-eastnet-b" Aug 26 13:21:37.461586: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 13:21:37.461603: | 192.0.3.0/24===192.1.3.33<192.1.3.33>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org]---192.1.3.254...192.1.2.23<192.1.2.23>[C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org]===192.0.2.0/24 Aug 26 13:21:37.461611: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:21:37.461619: | spent 0.831 milliseconds in whack Aug 26 13:21:37.573853: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:21:37.573877: | dup_any(fd@16) -> fd@23 (in whack_process() at rcv_whack.c:590) Aug 26 13:21:37.573880: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:21:37.573883: initiating all conns with alias='north-b' Aug 26 13:21:37.573890: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 13:21:37.573897: | close_any(fd@23) (in initiate_connection() at initiate.c:384) Aug 26 13:21:37.573902: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:21:37.573910: | spent 0.0627 milliseconds in whack Aug 26 13:21:37.634000: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:21:37.634031: | dup_any(fd@16) -> fd@23 (in whack_process() at rcv_whack.c:590) Aug 26 13:21:37.634036: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:21:37.634043: | start processing: connection "north-a-dpd" (in initiate_a_connection() at initiate.c:186) Aug 26 13:21:37.634047: | empty esp_info, returning defaults for ENCRYPT Aug 26 13:21:37.634053: | connection 'north-a-dpd' +POLICY_UP Aug 26 13:21:37.634056: | dup_any(fd@23) -> fd@24 (in initiate_a_connection() at initiate.c:342) Aug 26 13:21:37.634059: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:21:37.634079: | creating state object #1 at 0x560749ac7f88 Aug 26 13:21:37.634083: | State DB: adding IKEv1 state #1 in UNDEFINED Aug 26 13:21:37.634091: | pstats #1 ikev1.isakmp started Aug 26 13:21:37.634100: | suspend processing: connection "north-a-dpd" (in main_outI1() at ikev1_main.c:118) Aug 26 13:21:37.634106: | start processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118) Aug 26 13:21:37.634110: | parent state #1: UNDEFINED(ignore) => MAIN_I1(half-open IKE SA) Aug 26 13:21:37.634114: | dup_any(fd@24) -> fd@25 (in main_outI1() at ikev1_main.c:123) Aug 26 13:21:37.634119: | Queuing pending IPsec SA negotiating with 192.1.2.23 "north-a-dpd" IKE SA #1 "north-a-dpd" Aug 26 13:21:37.634123: "north-a-dpd" #1: initiating Main Mode Aug 26 13:21:37.634157: | **emit ISAKMP Message: Aug 26 13:21:37.634161: | initiator cookie: Aug 26 13:21:37.634164: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:37.634166: | responder cookie: Aug 26 13:21:37.634169: | 00 00 00 00 00 00 00 00 Aug 26 13:21:37.634172: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:21:37.634175: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:21:37.634178: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:21:37.634180: | flags: none (0x0) Aug 26 13:21:37.634183: | Message ID: 0 (0x0) Aug 26 13:21:37.634186: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:21:37.634189: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:21:37.634192: | no specific IKE algorithms specified - using defaults Aug 26 13:21:37.634215: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP2048=14 eklen=0 Aug 26 13:21:37.634221: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP2048=14 eklen=0 Aug 26 13:21:37.634226: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP2048=14 eklen=0 Aug 26 13:21:37.634237: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP1536=5 eklen=0 Aug 26 13:21:37.634244: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP1536=5 eklen=0 Aug 26 13:21:37.634251: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP1536=5 eklen=0 Aug 26 13:21:37.634256: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP2048=14 eklen=0 Aug 26 13:21:37.634259: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP2048=14 eklen=0 Aug 26 13:21:37.634263: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP2048=14 eklen=0 Aug 26 13:21:37.634266: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP1536=5 eklen=0 Aug 26 13:21:37.634269: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP1536=5 eklen=0 Aug 26 13:21:37.634272: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP1536=5 eklen=0 Aug 26 13:21:37.634276: | oakley_alg_makedb() returning 0x560749aca9e8 Aug 26 13:21:37.634280: | ***emit ISAKMP Security Association Payload: Aug 26 13:21:37.634282: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:21:37.634284: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:21:37.634286: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:21:37.634292: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:21:37.634297: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.634300: | ****emit IPsec DOI SIT: Aug 26 13:21:37.634302: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:21:37.634304: | ikev1_out_sa pcn: 0 has 1 valid proposals Aug 26 13:21:37.634305: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 18 Aug 26 13:21:37.634307: | ****emit ISAKMP Proposal Payload: Aug 26 13:21:37.634309: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.634311: | proposal number: 0 (0x0) Aug 26 13:21:37.634312: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:21:37.634314: | SPI size: 0 (0x0) Aug 26 13:21:37.634316: | number of transforms: 18 (0x12) Aug 26 13:21:37.634318: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' Aug 26 13:21:37.634319: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.634321: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634323: | ISAKMP transform number: 0 (0x0) Aug 26 13:21:37.634324: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.634326: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.634328: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634330: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.634332: | length/value: 1 (0x1) Aug 26 13:21:37.634334: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.634336: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634337: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.634339: | length/value: 3600 (0xe10) Aug 26 13:21:37.634341: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634343: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.634344: | length/value: 7 (0x7) Aug 26 13:21:37.634346: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:37.634347: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634349: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.634350: | length/value: 4 (0x4) Aug 26 13:21:37.634352: | [4 is OAKLEY_SHA2_256] Aug 26 13:21:37.634354: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634355: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.634357: | length/value: 3 (0x3) Aug 26 13:21:37.634358: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.634362: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634364: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.634366: | length/value: 14 (0xe) Aug 26 13:21:37.634367: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:37.634369: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634371: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:37.634372: | length/value: 256 (0x100) Aug 26 13:21:37.634374: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:37.634376: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.634377: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634379: | ISAKMP transform number: 1 (0x1) Aug 26 13:21:37.634380: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.634382: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634384: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.634386: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634387: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.634389: | length/value: 1 (0x1) Aug 26 13:21:37.634391: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.634392: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634394: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.634395: | length/value: 3600 (0xe10) Aug 26 13:21:37.634397: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634398: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.634400: | length/value: 7 (0x7) Aug 26 13:21:37.634401: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:37.634403: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634405: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.634406: | length/value: 4 (0x4) Aug 26 13:21:37.634408: | [4 is OAKLEY_SHA2_256] Aug 26 13:21:37.634409: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634411: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.634412: | length/value: 3 (0x3) Aug 26 13:21:37.634414: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.634415: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634417: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.634418: | length/value: 14 (0xe) Aug 26 13:21:37.634420: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:37.634421: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634423: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:37.634425: | length/value: 128 (0x80) Aug 26 13:21:37.634426: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:37.634428: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.634429: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634431: | ISAKMP transform number: 2 (0x2) Aug 26 13:21:37.634432: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.634434: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634436: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.634438: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634439: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.634441: | length/value: 1 (0x1) Aug 26 13:21:37.634442: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.634444: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634446: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.634447: | length/value: 3600 (0xe10) Aug 26 13:21:37.634449: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634450: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.634452: | length/value: 7 (0x7) Aug 26 13:21:37.634453: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:37.634455: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634457: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.634459: | length/value: 6 (0x6) Aug 26 13:21:37.634460: | [6 is OAKLEY_SHA2_512] Aug 26 13:21:37.634462: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634464: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.634465: | length/value: 3 (0x3) Aug 26 13:21:37.634467: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.634468: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634470: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.634471: | length/value: 14 (0xe) Aug 26 13:21:37.634473: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:37.634474: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634476: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:37.634477: | length/value: 256 (0x100) Aug 26 13:21:37.634479: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:37.634481: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.634482: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634484: | ISAKMP transform number: 3 (0x3) Aug 26 13:21:37.634485: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.634487: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634489: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.634490: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634492: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.634494: | length/value: 1 (0x1) Aug 26 13:21:37.634495: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.634497: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634498: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.634500: | length/value: 3600 (0xe10) Aug 26 13:21:37.634501: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634503: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.634505: | length/value: 7 (0x7) Aug 26 13:21:37.634506: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:37.634508: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634509: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.634511: | length/value: 6 (0x6) Aug 26 13:21:37.634512: | [6 is OAKLEY_SHA2_512] Aug 26 13:21:37.634514: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634515: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.634517: | length/value: 3 (0x3) Aug 26 13:21:37.634518: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.634520: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634521: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.634523: | length/value: 14 (0xe) Aug 26 13:21:37.634524: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:37.634526: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634527: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:37.634529: | length/value: 128 (0x80) Aug 26 13:21:37.634531: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:37.634532: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.634534: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634535: | ISAKMP transform number: 4 (0x4) Aug 26 13:21:37.634537: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.634539: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634540: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.634542: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634544: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.634545: | length/value: 1 (0x1) Aug 26 13:21:37.634547: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.634548: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634550: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.634552: | length/value: 3600 (0xe10) Aug 26 13:21:37.634554: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634556: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.634557: | length/value: 7 (0x7) Aug 26 13:21:37.634559: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:37.634560: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634562: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.634563: | length/value: 2 (0x2) Aug 26 13:21:37.634565: | [2 is OAKLEY_SHA1] Aug 26 13:21:37.634566: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634568: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.634569: | length/value: 3 (0x3) Aug 26 13:21:37.634571: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.634572: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634574: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.634576: | length/value: 14 (0xe) Aug 26 13:21:37.634577: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:37.634579: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634580: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:37.634582: | length/value: 256 (0x100) Aug 26 13:21:37.634583: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:37.634585: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.634586: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634588: | ISAKMP transform number: 5 (0x5) Aug 26 13:21:37.634589: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.634591: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634593: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.634595: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634596: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.634598: | length/value: 1 (0x1) Aug 26 13:21:37.634599: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.634601: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634602: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.634604: | length/value: 3600 (0xe10) Aug 26 13:21:37.634606: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634607: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.634609: | length/value: 7 (0x7) Aug 26 13:21:37.634610: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:37.634612: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634613: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.634615: | length/value: 2 (0x2) Aug 26 13:21:37.634616: | [2 is OAKLEY_SHA1] Aug 26 13:21:37.634618: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634619: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.634621: | length/value: 3 (0x3) Aug 26 13:21:37.634622: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.634624: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634625: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.634627: | length/value: 14 (0xe) Aug 26 13:21:37.634629: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:37.634630: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634632: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:37.634633: | length/value: 128 (0x80) Aug 26 13:21:37.634635: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:37.634636: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.634638: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634639: | ISAKMP transform number: 6 (0x6) Aug 26 13:21:37.634641: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.634643: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634645: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.634649: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634650: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.634652: | length/value: 1 (0x1) Aug 26 13:21:37.634653: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.634655: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634657: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.634658: | length/value: 3600 (0xe10) Aug 26 13:21:37.634660: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634661: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.634663: | length/value: 7 (0x7) Aug 26 13:21:37.634664: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:37.634666: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634667: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.634669: | length/value: 4 (0x4) Aug 26 13:21:37.634670: | [4 is OAKLEY_SHA2_256] Aug 26 13:21:37.634672: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634674: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.634675: | length/value: 3 (0x3) Aug 26 13:21:37.634677: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.634678: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634680: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.634681: | length/value: 5 (0x5) Aug 26 13:21:37.634683: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:37.634684: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634686: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:37.634688: | length/value: 256 (0x100) Aug 26 13:21:37.634689: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:37.634691: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.634692: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634694: | ISAKMP transform number: 7 (0x7) Aug 26 13:21:37.634695: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.634697: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634699: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.634701: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634702: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.634704: | length/value: 1 (0x1) Aug 26 13:21:37.634705: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.634707: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634708: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.634710: | length/value: 3600 (0xe10) Aug 26 13:21:37.634712: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634713: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.634715: | length/value: 7 (0x7) Aug 26 13:21:37.634716: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:37.634718: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634719: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.634721: | length/value: 4 (0x4) Aug 26 13:21:37.634722: | [4 is OAKLEY_SHA2_256] Aug 26 13:21:37.634724: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634725: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.634727: | length/value: 3 (0x3) Aug 26 13:21:37.634728: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.634730: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634731: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.634733: | length/value: 5 (0x5) Aug 26 13:21:37.634735: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:37.634736: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634738: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:37.634739: | length/value: 128 (0x80) Aug 26 13:21:37.634741: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:37.634742: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.634744: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634746: | ISAKMP transform number: 8 (0x8) Aug 26 13:21:37.634748: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.634750: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634751: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.634753: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634755: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.634756: | length/value: 1 (0x1) Aug 26 13:21:37.634758: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.634759: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634761: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.634762: | length/value: 3600 (0xe10) Aug 26 13:21:37.634764: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634766: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.634767: | length/value: 7 (0x7) Aug 26 13:21:37.634769: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:37.634770: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634772: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.634773: | length/value: 6 (0x6) Aug 26 13:21:37.634775: | [6 is OAKLEY_SHA2_512] Aug 26 13:21:37.634776: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634778: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.634779: | length/value: 3 (0x3) Aug 26 13:21:37.634781: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.634782: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634784: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.634785: | length/value: 5 (0x5) Aug 26 13:21:37.634787: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:37.634788: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634790: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:37.634792: | length/value: 256 (0x100) Aug 26 13:21:37.634793: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:37.634795: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.634796: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634798: | ISAKMP transform number: 9 (0x9) Aug 26 13:21:37.634799: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.634801: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634803: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.634805: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634806: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.634808: | length/value: 1 (0x1) Aug 26 13:21:37.634809: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.634811: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634812: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.634814: | length/value: 3600 (0xe10) Aug 26 13:21:37.634815: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634817: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.634819: | length/value: 7 (0x7) Aug 26 13:21:37.634820: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:37.634822: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634823: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.634825: | length/value: 6 (0x6) Aug 26 13:21:37.634826: | [6 is OAKLEY_SHA2_512] Aug 26 13:21:37.634828: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634829: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.634831: | length/value: 3 (0x3) Aug 26 13:21:37.634832: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.634834: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634835: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.634837: | length/value: 5 (0x5) Aug 26 13:21:37.634839: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:37.634841: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634842: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:37.634844: | length/value: 128 (0x80) Aug 26 13:21:37.634846: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:37.634847: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.634849: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634850: | ISAKMP transform number: 10 (0xa) Aug 26 13:21:37.634852: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.634854: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634855: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.634857: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634859: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.634860: | length/value: 1 (0x1) Aug 26 13:21:37.634862: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.634863: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634865: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.634866: | length/value: 3600 (0xe10) Aug 26 13:21:37.634868: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634869: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.634871: | length/value: 7 (0x7) Aug 26 13:21:37.634873: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:37.634874: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634876: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.634877: | length/value: 2 (0x2) Aug 26 13:21:37.634879: | [2 is OAKLEY_SHA1] Aug 26 13:21:37.634880: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634882: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.634883: | length/value: 3 (0x3) Aug 26 13:21:37.634885: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.634886: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634888: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.634889: | length/value: 5 (0x5) Aug 26 13:21:37.634891: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:37.634892: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634894: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:37.634896: | length/value: 256 (0x100) Aug 26 13:21:37.634897: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:37.634899: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.634900: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634902: | ISAKMP transform number: 11 (0xb) Aug 26 13:21:37.634903: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.634905: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634907: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.634909: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634910: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.634912: | length/value: 1 (0x1) Aug 26 13:21:37.634913: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.634915: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634916: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.634918: | length/value: 3600 (0xe10) Aug 26 13:21:37.634920: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634921: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.634923: | length/value: 7 (0x7) Aug 26 13:21:37.634924: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:37.634926: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634927: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.634929: | length/value: 2 (0x2) Aug 26 13:21:37.634930: | [2 is OAKLEY_SHA1] Aug 26 13:21:37.634932: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634934: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.634936: | length/value: 3 (0x3) Aug 26 13:21:37.634937: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.634939: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634940: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.634942: | length/value: 5 (0x5) Aug 26 13:21:37.634944: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:37.634945: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634947: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:37.634948: | length/value: 128 (0x80) Aug 26 13:21:37.634950: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:37.634951: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.634953: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634954: | ISAKMP transform number: 12 (0xc) Aug 26 13:21:37.634956: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.634958: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.634960: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.634961: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634963: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.634964: | length/value: 1 (0x1) Aug 26 13:21:37.634966: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.634967: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634969: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.634971: | length/value: 3600 (0xe10) Aug 26 13:21:37.634972: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634974: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.634975: | length/value: 5 (0x5) Aug 26 13:21:37.634977: | [5 is OAKLEY_3DES_CBC] Aug 26 13:21:37.634978: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634980: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.634981: | length/value: 4 (0x4) Aug 26 13:21:37.634983: | [4 is OAKLEY_SHA2_256] Aug 26 13:21:37.634984: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634986: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.634987: | length/value: 3 (0x3) Aug 26 13:21:37.634989: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.634990: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.634992: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.634994: | length/value: 14 (0xe) Aug 26 13:21:37.634995: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:37.634997: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:21:37.634998: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.635000: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.635001: | ISAKMP transform number: 13 (0xd) Aug 26 13:21:37.635003: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.635005: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.635007: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.635008: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635010: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.635011: | length/value: 1 (0x1) Aug 26 13:21:37.635013: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.635014: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635016: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.635017: | length/value: 3600 (0xe10) Aug 26 13:21:37.635019: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635021: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.635022: | length/value: 5 (0x5) Aug 26 13:21:37.635024: | [5 is OAKLEY_3DES_CBC] Aug 26 13:21:37.635025: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635028: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.635029: | length/value: 6 (0x6) Aug 26 13:21:37.635031: | [6 is OAKLEY_SHA2_512] Aug 26 13:21:37.635032: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635034: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.635035: | length/value: 3 (0x3) Aug 26 13:21:37.635037: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.635038: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635040: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.635041: | length/value: 14 (0xe) Aug 26 13:21:37.635043: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:37.635044: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:21:37.635046: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.635048: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.635049: | ISAKMP transform number: 14 (0xe) Aug 26 13:21:37.635051: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.635053: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.635054: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.635056: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635057: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.635059: | length/value: 1 (0x1) Aug 26 13:21:37.635061: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.635062: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635064: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.635065: | length/value: 3600 (0xe10) Aug 26 13:21:37.635067: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635068: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.635070: | length/value: 5 (0x5) Aug 26 13:21:37.635071: | [5 is OAKLEY_3DES_CBC] Aug 26 13:21:37.635073: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635074: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.635076: | length/value: 2 (0x2) Aug 26 13:21:37.635077: | [2 is OAKLEY_SHA1] Aug 26 13:21:37.635079: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635081: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.635082: | length/value: 3 (0x3) Aug 26 13:21:37.635084: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.635085: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635087: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.635088: | length/value: 14 (0xe) Aug 26 13:21:37.635090: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:37.635091: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:21:37.635093: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.635094: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.635096: | ISAKMP transform number: 15 (0xf) Aug 26 13:21:37.635097: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.635099: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.635101: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.635103: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635104: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.635106: | length/value: 1 (0x1) Aug 26 13:21:37.635107: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.635109: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635110: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.635112: | length/value: 3600 (0xe10) Aug 26 13:21:37.635114: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635115: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.635117: | length/value: 5 (0x5) Aug 26 13:21:37.635118: | [5 is OAKLEY_3DES_CBC] Aug 26 13:21:37.635120: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635122: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.635124: | length/value: 4 (0x4) Aug 26 13:21:37.635125: | [4 is OAKLEY_SHA2_256] Aug 26 13:21:37.635127: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635128: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.635130: | length/value: 3 (0x3) Aug 26 13:21:37.635131: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.635133: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635134: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.635136: | length/value: 5 (0x5) Aug 26 13:21:37.635137: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:37.635139: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:21:37.635140: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.635142: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.635143: | ISAKMP transform number: 16 (0x10) Aug 26 13:21:37.635145: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.635147: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.635149: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.635150: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635152: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.635153: | length/value: 1 (0x1) Aug 26 13:21:37.635155: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.635156: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635158: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.635160: | length/value: 3600 (0xe10) Aug 26 13:21:37.635161: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635163: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.635164: | length/value: 5 (0x5) Aug 26 13:21:37.635166: | [5 is OAKLEY_3DES_CBC] Aug 26 13:21:37.635167: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635169: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.635170: | length/value: 6 (0x6) Aug 26 13:21:37.635172: | [6 is OAKLEY_SHA2_512] Aug 26 13:21:37.635173: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635175: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.635176: | length/value: 3 (0x3) Aug 26 13:21:37.635178: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.635179: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635181: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.635182: | length/value: 5 (0x5) Aug 26 13:21:37.635184: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:37.635186: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:21:37.635187: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.635189: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.635190: | ISAKMP transform number: 17 (0x11) Aug 26 13:21:37.635192: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.635194: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.635195: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:37.635197: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635199: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.635200: | length/value: 1 (0x1) Aug 26 13:21:37.635202: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.635203: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635205: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.635206: | length/value: 3600 (0xe10) Aug 26 13:21:37.635208: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635210: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.635211: | length/value: 5 (0x5) Aug 26 13:21:37.635213: | [5 is OAKLEY_3DES_CBC] Aug 26 13:21:37.635215: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635216: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.635218: | length/value: 2 (0x2) Aug 26 13:21:37.635219: | [2 is OAKLEY_SHA1] Aug 26 13:21:37.635221: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635223: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.635224: | length/value: 3 (0x3) Aug 26 13:21:37.635226: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.635227: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:37.635229: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.635230: | length/value: 5 (0x5) Aug 26 13:21:37.635232: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:37.635233: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:21:37.635235: | emitting length of ISAKMP Proposal Payload: 632 Aug 26 13:21:37.635237: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0 Aug 26 13:21:37.635238: | emitting length of ISAKMP Security Association Payload: 644 Aug 26 13:21:37.635240: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 Aug 26 13:21:37.635245: | out_vid(): sending [FRAGMENTATION] Aug 26 13:21:37.635247: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:21:37.635249: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:21:37.635250: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:21:37.635253: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:21:37.635254: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.635257: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:21:37.635259: | V_ID 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 Aug 26 13:21:37.635260: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:21:37.635262: | out_vid(): sending [Dead Peer Detection] Aug 26 13:21:37.635263: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:21:37.635265: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.635267: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:21:37.635269: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.635271: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:21:37.635272: | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 Aug 26 13:21:37.635274: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:21:37.635275: | nat add vid Aug 26 13:21:37.635277: | sending draft and RFC NATT VIDs Aug 26 13:21:37.635279: | out_vid(): sending [RFC 3947] Aug 26 13:21:37.635280: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:21:37.635282: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:21:37.635283: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:21:37.635285: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:21:37.635287: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.635292: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:21:37.635294: | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f Aug 26 13:21:37.635296: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:21:37.635297: | skipping VID_NATT_RFC Aug 26 13:21:37.635299: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-03] Aug 26 13:21:37.635300: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:21:37.635302: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:21:37.635306: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:21:37.635308: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:21:37.635310: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.635311: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:21:37.635313: | V_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Aug 26 13:21:37.635315: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:21:37.635316: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02_n] Aug 26 13:21:37.635318: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:21:37.635319: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:21:37.635321: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:21:37.635323: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:21:37.635325: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.635328: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:21:37.635329: | V_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f Aug 26 13:21:37.635331: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:21:37.635332: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02] Aug 26 13:21:37.635334: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:21:37.635335: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.635337: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:21:37.635339: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.635341: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:21:37.635342: | V_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 Aug 26 13:21:37.635344: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:21:37.635346: | no IKEv1 message padding required Aug 26 13:21:37.635347: | emitting length of ISAKMP Message: 792 Aug 26 13:21:37.635357: | sending 792 bytes for reply packet for main_outI1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1) Aug 26 13:21:37.635360: | b2 8a 78 70 6d 40 cb f8 00 00 00 00 00 00 00 00 Aug 26 13:21:37.635361: | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 Aug 26 13:21:37.635363: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Aug 26 13:21:37.635364: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:37.635366: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:21:37.635367: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Aug 26 13:21:37.635369: | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 Aug 26 13:21:37.635370: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Aug 26 13:21:37.635372: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 Aug 26 13:21:37.635373: | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 Aug 26 13:21:37.635375: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:37.635376: | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 Aug 26 13:21:37.635378: | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:37.635379: | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:21:37.635381: | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 Aug 26 13:21:37.635382: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 Aug 26 13:21:37.635383: | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 Aug 26 13:21:37.635385: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 Aug 26 13:21:37.635386: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:21:37.635388: | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:37.635390: | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:21:37.635392: | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:37.635393: | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:21:37.635395: | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 Aug 26 13:21:37.635396: | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 Aug 26 13:21:37.635398: | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 Aug 26 13:21:37.635399: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Aug 26 13:21:37.635401: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:21:37.635402: | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:37.635404: | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:21:37.635405: | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:37.635407: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:21:37.635408: | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:37.635410: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e Aug 26 13:21:37.635411: | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:37.635413: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:21:37.635414: | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:37.635416: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 Aug 26 13:21:37.635417: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:37.635419: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:21:37.635420: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:37.635421: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 Aug 26 13:21:37.635423: | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f Aug 26 13:21:37.635424: | 00 d6 c2 d3 0d 00 00 14 af ca d7 13 68 a1 f1 c9 Aug 26 13:21:37.635426: | 6b 86 96 fc 77 57 01 00 0d 00 00 14 4a 13 1c 81 Aug 26 13:21:37.635427: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 Aug 26 13:21:37.635429: | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Aug 26 13:21:37.635430: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 Aug 26 13:21:37.635432: | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 Aug 26 13:21:37.635433: | 7c fd b2 fc 68 b6 a4 48 Aug 26 13:21:37.635511: | event_schedule: new EVENT_RETRANSMIT-pe@0x560749ac6aa8 Aug 26 13:21:37.635516: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1 Aug 26 13:21:37.635518: | libevent_malloc: new ptr-libevent@0x560749ac5718 size 128 Aug 26 13:21:37.635522: | #1 STATE_MAIN_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10983.377977 Aug 26 13:21:37.635532: | #1 spent 1.43 milliseconds in main_outI1() Aug 26 13:21:37.635536: | stop processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in main_outI1() at ikev1_main.c:228) Aug 26 13:21:37.635538: | resume processing: connection "north-a-dpd" (in main_outI1() at ikev1_main.c:228) Aug 26 13:21:37.635540: | stop processing: connection "north-a-dpd" (in initiate_a_connection() at initiate.c:349) Aug 26 13:21:37.635543: | close_any(fd@23) (in initiate_connection() at initiate.c:372) Aug 26 13:21:37.635545: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:21:37.635548: | spent 1.5 milliseconds in whack Aug 26 13:21:37.636152: | spent 0.00192 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:21:37.636170: | *received 144 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Aug 26 13:21:37.636172: | b2 8a 78 70 6d 40 cb f8 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.636174: | 01 10 02 00 00 00 00 00 00 00 00 90 0d 00 00 38 Aug 26 13:21:37.636175: | 00 00 00 01 00 00 00 01 00 00 00 2c 00 01 00 01 Aug 26 13:21:37.636177: | 00 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:37.636178: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:21:37.636180: | 80 0e 01 00 0d 00 00 14 40 48 b7 d5 6e bc e8 85 Aug 26 13:21:37.636183: | 25 e7 de 7f 00 d6 c2 d3 0d 00 00 14 af ca d7 13 Aug 26 13:21:37.636184: | 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 00 00 00 14 Aug 26 13:21:37.636186: | 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f Aug 26 13:21:37.636189: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:21:37.636191: | **parse ISAKMP Message: Aug 26 13:21:37.636193: | initiator cookie: Aug 26 13:21:37.636194: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:37.636196: | responder cookie: Aug 26 13:21:37.636197: | 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.636199: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:21:37.636201: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:21:37.636203: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:21:37.636204: | flags: none (0x0) Aug 26 13:21:37.636206: | Message ID: 0 (0x0) Aug 26 13:21:37.636207: | length: 144 (0x90) Aug 26 13:21:37.636209: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:21:37.636212: | State DB: IKEv1 state not found (find_state_ikev1) Aug 26 13:21:37.636214: | State DB: found IKEv1 state #1 in MAIN_I1 (find_state_ikev1_init) Aug 26 13:21:37.636217: | start processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) Aug 26 13:21:37.636219: | #1 is idle Aug 26 13:21:37.636220: | #1 idle Aug 26 13:21:37.636223: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:21:37.636225: | ***parse ISAKMP Security Association Payload: Aug 26 13:21:37.636226: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:21:37.636228: | length: 56 (0x38) Aug 26 13:21:37.636230: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:21:37.636232: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Aug 26 13:21:37.636233: | ***parse ISAKMP Vendor ID Payload: Aug 26 13:21:37.636235: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:21:37.636236: | length: 20 (0x14) Aug 26 13:21:37.636238: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Aug 26 13:21:37.636240: | ***parse ISAKMP Vendor ID Payload: Aug 26 13:21:37.636241: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:21:37.636243: | length: 20 (0x14) Aug 26 13:21:37.636244: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Aug 26 13:21:37.636246: | ***parse ISAKMP Vendor ID Payload: Aug 26 13:21:37.636247: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.636249: | length: 20 (0x14) Aug 26 13:21:37.636251: | message 'main_inR1_outI2' HASH payload not checked early Aug 26 13:21:37.636254: | received Vendor ID payload [FRAGMENTATION] Aug 26 13:21:37.636256: | received Vendor ID payload [Dead Peer Detection] Aug 26 13:21:37.636258: | quirks.qnat_traversal_vid set to=117 [RFC 3947] Aug 26 13:21:37.636260: | received Vendor ID payload [RFC 3947] Aug 26 13:21:37.636263: | ****parse IPsec DOI SIT: Aug 26 13:21:37.636264: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:21:37.636266: | ****parse ISAKMP Proposal Payload: Aug 26 13:21:37.636268: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.636269: | length: 44 (0x2c) Aug 26 13:21:37.636271: | proposal number: 0 (0x0) Aug 26 13:21:37.636273: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:21:37.636274: | SPI size: 0 (0x0) Aug 26 13:21:37.636276: | number of transforms: 1 (0x1) Aug 26 13:21:37.636278: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:37.636279: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.636281: | length: 36 (0x24) Aug 26 13:21:37.636282: | ISAKMP transform number: 0 (0x0) Aug 26 13:21:37.636284: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:37.636286: | ******parse ISAKMP Oakley attribute: Aug 26 13:21:37.636287: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:37.636310: | length/value: 1 (0x1) Aug 26 13:21:37.636312: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:37.636314: | ******parse ISAKMP Oakley attribute: Aug 26 13:21:37.636317: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:37.636319: | length/value: 3600 (0xe10) Aug 26 13:21:37.636320: | ******parse ISAKMP Oakley attribute: Aug 26 13:21:37.636322: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:37.636324: | length/value: 7 (0x7) Aug 26 13:21:37.636325: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:37.636327: | ******parse ISAKMP Oakley attribute: Aug 26 13:21:37.636329: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:37.636330: | length/value: 4 (0x4) Aug 26 13:21:37.636332: | [4 is OAKLEY_SHA2_256] Aug 26 13:21:37.636334: | ******parse ISAKMP Oakley attribute: Aug 26 13:21:37.636335: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:37.636337: | length/value: 3 (0x3) Aug 26 13:21:37.636338: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:37.636340: | ******parse ISAKMP Oakley attribute: Aug 26 13:21:37.636341: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:37.636343: | length/value: 14 (0xe) Aug 26 13:21:37.636345: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:37.636346: | ******parse ISAKMP Oakley attribute: Aug 26 13:21:37.636348: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:37.636349: | length/value: 256 (0x100) Aug 26 13:21:37.636351: | OAKLEY proposal verified unconditionally; no alg_info to check against Aug 26 13:21:37.636353: | Oakley Transform 0 accepted Aug 26 13:21:37.636355: | sender checking NAT-T: enabled; VID 117 Aug 26 13:21:37.636357: | returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC Aug 26 13:21:37.636358: | enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) Aug 26 13:21:37.636361: | adding outI2 KE work-order 1 for state #1 Aug 26 13:21:37.636363: | state #1 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:21:37.636365: | #1 STATE_MAIN_I1: retransmits: cleared Aug 26 13:21:37.636368: | libevent_free: release ptr-libevent@0x560749ac5718 Aug 26 13:21:37.636370: | free_event_entry: release EVENT_RETRANSMIT-pe@0x560749ac6aa8 Aug 26 13:21:37.636372: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x560749ac6aa8 Aug 26 13:21:37.636375: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Aug 26 13:21:37.636376: | libevent_malloc: new ptr-libevent@0x560749ac5718 size 128 Aug 26 13:21:37.636384: | complete v1 state transition with STF_SUSPEND Aug 26 13:21:37.636388: | [RE]START processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) Aug 26 13:21:37.636390: | suspending state #1 and saving MD Aug 26 13:21:37.636391: | #1 is busy; has a suspended MD Aug 26 13:21:37.636395: | #1 spent 0.114 milliseconds in process_packet_tail() Aug 26 13:21:37.636397: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:21:37.636400: | stop processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 13:21:37.636402: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:21:37.636404: | spent 0.229 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:21:37.636419: | crypto helper 1 resuming Aug 26 13:21:37.636428: | crypto helper 1 starting work-order 1 for state #1 Aug 26 13:21:37.636432: | crypto helper 1 doing build KE and nonce (outI2 KE); request ID 1 Aug 26 13:21:37.637002: | crypto helper 1 finished build KE and nonce (outI2 KE); request ID 1 time elapsed 0.00057 seconds Aug 26 13:21:37.637008: | (#1) spent 0.575 milliseconds in crypto helper computing work-order 1: outI2 KE (pcr) Aug 26 13:21:37.637010: | crypto helper 1 sending results from work-order 1 for state #1 to event queue Aug 26 13:21:37.637012: | scheduling resume sending helper answer for #1 Aug 26 13:21:37.637014: | libevent_malloc: new ptr-libevent@0x7f0f0c002888 size 128 Aug 26 13:21:37.637021: | crypto helper 1 waiting (nothing to do) Aug 26 13:21:37.637057: | processing resume sending helper answer for #1 Aug 26 13:21:37.637066: | start processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:21:37.637072: | crypto helper 1 replies to request ID 1 Aug 26 13:21:37.637074: | calling continuation function 0x5607486cbb50 Aug 26 13:21:37.637076: | main_inR1_outI2_continue for #1: calculated ke+nonce, sending I2 Aug 26 13:21:37.637080: | **emit ISAKMP Message: Aug 26 13:21:37.637082: | initiator cookie: Aug 26 13:21:37.637084: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:37.637085: | responder cookie: Aug 26 13:21:37.637087: | 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.637089: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.637091: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:21:37.637092: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:21:37.637094: | flags: none (0x0) Aug 26 13:21:37.637096: | Message ID: 0 (0x0) Aug 26 13:21:37.637098: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:21:37.637100: | ***emit ISAKMP Key Exchange Payload: Aug 26 13:21:37.637102: | next payload type: ISAKMP_NEXT_NONCE (0xa) Aug 26 13:21:37.637104: | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE Aug 26 13:21:37.637106: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) Aug 26 13:21:37.637108: | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.637110: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload Aug 26 13:21:37.637112: | keyex value a5 f7 21 fc 96 a0 bf 04 23 f9 77 0d aa 58 b5 ec Aug 26 13:21:37.637113: | keyex value 01 82 3d 2c 56 fa 2c 2c fd 2b 42 84 f6 59 2b 66 Aug 26 13:21:37.637115: | keyex value b7 49 3f 8d 14 b2 84 c8 ec 12 89 dd 4a 3b 19 98 Aug 26 13:21:37.637117: | keyex value e1 5c f9 a4 01 54 ee 7e 1f 9f e0 65 21 9c a0 a4 Aug 26 13:21:37.637118: | keyex value e3 cf 29 94 14 f3 64 d4 62 16 fa e1 c1 0e 53 15 Aug 26 13:21:37.637120: | keyex value 6f f0 03 59 b8 f7 f5 f6 32 f9 bc 25 cb 0a d6 ba Aug 26 13:21:37.637121: | keyex value 80 3d ca 06 df 36 f8 a3 90 46 3f 0b e8 b1 8f 06 Aug 26 13:21:37.637123: | keyex value bf 7c f8 85 bb 87 c3 c4 95 ef 52 b8 b2 68 7b 55 Aug 26 13:21:37.637124: | keyex value 90 bb 6d 6b 20 09 4e ab 36 d7 16 d9 68 61 55 e3 Aug 26 13:21:37.637126: | keyex value de c8 67 e8 62 a9 9a 5a c7 1c eb 32 24 fa 48 c1 Aug 26 13:21:37.637127: | keyex value 72 0b b5 36 9d 8b e2 9c d2 9f 11 96 d3 7a 06 98 Aug 26 13:21:37.637129: | keyex value 12 98 1f 17 cd e3 2b 63 9b 85 0d ac 32 7f bc 34 Aug 26 13:21:37.637130: | keyex value 39 a2 b0 3b 77 c2 ac d4 e3 25 03 3a 89 7c 45 dd Aug 26 13:21:37.637132: | keyex value 25 de 84 4a c8 bd 51 12 2d 79 76 de ea 93 64 a7 Aug 26 13:21:37.637133: | keyex value e1 4f 11 43 8f 66 86 36 cc 06 21 1a 8b d3 0b f7 Aug 26 13:21:37.637135: | keyex value 1b 1b 89 97 a3 03 2a ef 78 54 04 6f 0c 45 c2 7b Aug 26 13:21:37.637137: | emitting length of ISAKMP Key Exchange Payload: 260 Aug 26 13:21:37.637138: | ***emit ISAKMP Nonce Payload: Aug 26 13:21:37.637140: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.637142: | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) Aug 26 13:21:37.637144: | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.637146: | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload Aug 26 13:21:37.637148: | Ni 5e 8d 8b 50 76 b1 c4 ea 84 74 78 01 6e 8e 1b fb Aug 26 13:21:37.637149: | Ni 25 05 4d 1e 07 82 1d bf ae 57 9c 16 49 9f cf 79 Aug 26 13:21:37.637151: | emitting length of ISAKMP Nonce Payload: 36 Aug 26 13:21:37.637152: | NAT-T checking st_nat_traversal Aug 26 13:21:37.637154: | NAT-T found (implies NAT_T_WITH_NATD) Aug 26 13:21:37.637155: | sending NAT-D payloads Aug 26 13:21:37.637164: | natd_hash: hasher=0x5607487a0ca0(32) Aug 26 13:21:37.637167: | natd_hash: icookie= b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:37.637169: | natd_hash: rcookie= 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.637170: | natd_hash: ip= c0 01 02 17 Aug 26 13:21:37.637172: | natd_hash: port=500 Aug 26 13:21:37.637174: | natd_hash: hash= 1c f6 b2 25 36 a5 b7 42 ec 1b 4a 17 b1 77 00 f9 Aug 26 13:21:37.637175: | natd_hash: hash= 3f 1b 66 97 89 dd 92 ba 09 41 8a 4d 9f 39 a0 cc Aug 26 13:21:37.637177: | ***emit ISAKMP NAT-D Payload: Aug 26 13:21:37.637179: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Aug 26 13:21:37.637181: | next payload chain: ignoring supplied 'ISAKMP NAT-D Payload'.'next payload type' value 20:ISAKMP_NEXT_NATD_RFC Aug 26 13:21:37.637183: | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) Aug 26 13:21:37.637184: | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.637186: | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload Aug 26 13:21:37.637188: | NAT-D 1c f6 b2 25 36 a5 b7 42 ec 1b 4a 17 b1 77 00 f9 Aug 26 13:21:37.637189: | NAT-D 3f 1b 66 97 89 dd 92 ba 09 41 8a 4d 9f 39 a0 cc Aug 26 13:21:37.637191: | emitting length of ISAKMP NAT-D Payload: 36 Aug 26 13:21:37.637195: | natd_hash: hasher=0x5607487a0ca0(32) Aug 26 13:21:37.637197: | natd_hash: icookie= b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:37.637198: | natd_hash: rcookie= 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.637200: | natd_hash: ip= c0 01 03 21 Aug 26 13:21:37.637201: | natd_hash: port=500 Aug 26 13:21:37.637203: | natd_hash: hash= 63 0a f9 f5 c3 73 5a 91 4f 02 b0 dc d5 16 08 85 Aug 26 13:21:37.637205: | natd_hash: hash= 65 42 33 b2 f0 de e4 92 a0 3e e9 12 d4 48 2c 7d Aug 26 13:21:37.637206: | ***emit ISAKMP NAT-D Payload: Aug 26 13:21:37.637208: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.637210: | next payload chain: setting previous 'ISAKMP NAT-D Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) Aug 26 13:21:37.637211: | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.637213: | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload Aug 26 13:21:37.637215: | NAT-D 63 0a f9 f5 c3 73 5a 91 4f 02 b0 dc d5 16 08 85 Aug 26 13:21:37.637216: | NAT-D 65 42 33 b2 f0 de e4 92 a0 3e e9 12 d4 48 2c 7d Aug 26 13:21:37.637218: | emitting length of ISAKMP NAT-D Payload: 36 Aug 26 13:21:37.637220: | no IKEv1 message padding required Aug 26 13:21:37.637221: | emitting length of ISAKMP Message: 396 Aug 26 13:21:37.637224: | State DB: re-hashing IKEv1 state #1 IKE SPIi and SPI[ir] Aug 26 13:21:37.637230: | complete v1 state transition with STF_OK Aug 26 13:21:37.637235: | [RE]START processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:21:37.637238: | #1 is idle Aug 26 13:21:37.637240: | doing_xauth:no, t_xauth_client_done:no Aug 26 13:21:37.637242: | peer supports fragmentation Aug 26 13:21:37.637244: | peer supports DPD Aug 26 13:21:37.637246: | DPD is configured locally Aug 26 13:21:37.637248: | IKEv1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 Aug 26 13:21:37.637250: | parent state #1: MAIN_I1(half-open IKE SA) => MAIN_I2(open IKE SA) Aug 26 13:21:37.637252: | event_already_set, deleting event Aug 26 13:21:37.637253: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:21:37.637256: | libevent_free: release ptr-libevent@0x560749ac5718 Aug 26 13:21:37.637258: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x560749ac6aa8 Aug 26 13:21:37.637262: | sending reply packet to 192.1.2.23:500 (from 192.1.3.33:500) Aug 26 13:21:37.637272: | sending 396 bytes for STATE_MAIN_I1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1) Aug 26 13:21:37.637274: | b2 8a 78 70 6d 40 cb f8 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.637276: | 04 10 02 00 00 00 00 00 00 00 01 8c 0a 00 01 04 Aug 26 13:21:37.637280: | a5 f7 21 fc 96 a0 bf 04 23 f9 77 0d aa 58 b5 ec Aug 26 13:21:37.637281: | 01 82 3d 2c 56 fa 2c 2c fd 2b 42 84 f6 59 2b 66 Aug 26 13:21:37.637283: | b7 49 3f 8d 14 b2 84 c8 ec 12 89 dd 4a 3b 19 98 Aug 26 13:21:37.637284: | e1 5c f9 a4 01 54 ee 7e 1f 9f e0 65 21 9c a0 a4 Aug 26 13:21:37.637286: | e3 cf 29 94 14 f3 64 d4 62 16 fa e1 c1 0e 53 15 Aug 26 13:21:37.637291: | 6f f0 03 59 b8 f7 f5 f6 32 f9 bc 25 cb 0a d6 ba Aug 26 13:21:37.637293: | 80 3d ca 06 df 36 f8 a3 90 46 3f 0b e8 b1 8f 06 Aug 26 13:21:37.637296: | bf 7c f8 85 bb 87 c3 c4 95 ef 52 b8 b2 68 7b 55 Aug 26 13:21:37.637298: | 90 bb 6d 6b 20 09 4e ab 36 d7 16 d9 68 61 55 e3 Aug 26 13:21:37.637300: | de c8 67 e8 62 a9 9a 5a c7 1c eb 32 24 fa 48 c1 Aug 26 13:21:37.637303: | 72 0b b5 36 9d 8b e2 9c d2 9f 11 96 d3 7a 06 98 Aug 26 13:21:37.637305: | 12 98 1f 17 cd e3 2b 63 9b 85 0d ac 32 7f bc 34 Aug 26 13:21:37.637307: | 39 a2 b0 3b 77 c2 ac d4 e3 25 03 3a 89 7c 45 dd Aug 26 13:21:37.637309: | 25 de 84 4a c8 bd 51 12 2d 79 76 de ea 93 64 a7 Aug 26 13:21:37.637311: | e1 4f 11 43 8f 66 86 36 cc 06 21 1a 8b d3 0b f7 Aug 26 13:21:37.637314: | 1b 1b 89 97 a3 03 2a ef 78 54 04 6f 0c 45 c2 7b Aug 26 13:21:37.637316: | 14 00 00 24 5e 8d 8b 50 76 b1 c4 ea 84 74 78 01 Aug 26 13:21:37.637319: | 6e 8e 1b fb 25 05 4d 1e 07 82 1d bf ae 57 9c 16 Aug 26 13:21:37.637321: | 49 9f cf 79 14 00 00 24 1c f6 b2 25 36 a5 b7 42 Aug 26 13:21:37.637327: | ec 1b 4a 17 b1 77 00 f9 3f 1b 66 97 89 dd 92 ba Aug 26 13:21:37.637329: | 09 41 8a 4d 9f 39 a0 cc 00 00 00 24 63 0a f9 f5 Aug 26 13:21:37.637332: | c3 73 5a 91 4f 02 b0 dc d5 16 08 85 65 42 33 b2 Aug 26 13:21:37.637335: | f0 de e4 92 a0 3e e9 12 d4 48 2c 7d Aug 26 13:21:37.637362: | !event_already_set at reschedule Aug 26 13:21:37.637367: | event_schedule: new EVENT_RETRANSMIT-pe@0x560749ac6aa8 Aug 26 13:21:37.637372: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1 Aug 26 13:21:37.637375: | libevent_malloc: new ptr-libevent@0x560749ac53d8 size 128 Aug 26 13:21:37.637381: | #1 STATE_MAIN_I2: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10983.379833 Aug 26 13:21:37.637384: "north-a-dpd" #1: STATE_MAIN_I2: sent MI2, expecting MR2 Aug 26 13:21:37.637392: | modecfg pull: noquirk policy:push not-client Aug 26 13:21:37.637395: | phase 1 is done, looking for phase 2 to unpend Aug 26 13:21:37.637399: | resume sending helper answer for #1 suppresed complete_v1_state_transition() Aug 26 13:21:37.637405: | #1 spent 0.315 milliseconds in resume sending helper answer Aug 26 13:21:37.637410: | stop processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:21:37.637413: | libevent_free: release ptr-libevent@0x7f0f0c002888 Aug 26 13:21:37.638872: | spent 0.00211 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:21:37.638888: | *received 576 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Aug 26 13:21:37.638891: | b2 8a 78 70 6d 40 cb f8 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.638892: | 04 10 02 00 00 00 00 00 00 00 02 40 0a 00 01 04 Aug 26 13:21:37.638894: | e0 6d c9 25 0f f0 f3 fc a7 8e 92 84 8f f1 d6 3b Aug 26 13:21:37.638895: | 1b 7f df ee 7a 3e 70 15 92 8d 14 a1 79 8f 83 c2 Aug 26 13:21:37.638897: | 39 f9 a3 01 f5 11 c2 b9 f0 3b 6e 97 b3 96 16 34 Aug 26 13:21:37.638898: | 5b ca d8 b1 d7 07 c7 59 1b e1 5c 57 7f 52 37 72 Aug 26 13:21:37.638900: | 19 62 6a c4 ef e0 9a 14 df 1a d3 0c fa 34 1d ec Aug 26 13:21:37.638901: | 1b 00 b1 ff cf 46 17 fa f2 b9 07 79 32 94 b8 3c Aug 26 13:21:37.638903: | f3 b1 3e dd 35 d9 f7 a0 a8 65 f5 6a a1 60 e1 df Aug 26 13:21:37.638904: | 07 cd 05 63 33 b5 48 53 55 b9 0d 60 36 0b d0 ba Aug 26 13:21:37.638906: | c3 c1 85 7b d0 9e df ce 8e 7d 0c 8f a2 26 d1 60 Aug 26 13:21:37.638907: | 44 b9 0d 1c 3b e1 d2 d2 87 dd 22 aa 44 00 86 be Aug 26 13:21:37.638909: | 8d f7 eb 14 21 a1 7f 64 39 d5 a1 c4 99 72 a2 c4 Aug 26 13:21:37.638913: | 52 c5 80 58 e4 12 9a ec e7 a7 02 1e 34 02 0f a0 Aug 26 13:21:37.638915: | 30 4c 99 10 03 e2 fb aa 9d 94 a2 07 17 7a c7 9f Aug 26 13:21:37.638916: | 92 fc 47 34 18 0c 31 e2 b8 21 5f 54 39 ef a6 1a Aug 26 13:21:37.638918: | 5a 0f d8 6a 54 dc 22 fa cd fb b9 b6 4f df da f1 Aug 26 13:21:37.638919: | 9e 14 eb 86 31 b2 95 f7 ea b5 a1 9b 0d a2 80 2a Aug 26 13:21:37.638921: | 07 00 00 24 df e1 de 36 52 03 95 2f e1 3f 57 2d Aug 26 13:21:37.638922: | 4a 5c 3a c9 af 10 61 36 de 82 f4 21 7f 5e b6 de Aug 26 13:21:37.638923: | 72 38 1f 10 14 00 00 b4 04 30 81 ac 31 0b 30 09 Aug 26 13:21:37.638925: | 06 03 55 04 06 13 02 43 41 31 10 30 0e 06 03 55 Aug 26 13:21:37.638926: | 04 08 0c 07 4f 6e 74 61 72 69 6f 31 10 30 0e 06 Aug 26 13:21:37.638928: | 03 55 04 07 0c 07 54 6f 72 6f 6e 74 6f 31 12 30 Aug 26 13:21:37.638929: | 10 06 03 55 04 0a 0c 09 4c 69 62 72 65 73 77 61 Aug 26 13:21:37.638931: | 6e 31 18 30 16 06 03 55 04 0b 0c 0f 54 65 73 74 Aug 26 13:21:37.638932: | 20 44 65 70 61 72 74 6d 65 6e 74 31 25 30 23 06 Aug 26 13:21:37.638934: | 03 55 04 03 0c 1c 4c 69 62 72 65 73 77 61 6e 20 Aug 26 13:21:37.638936: | 74 65 73 74 20 43 41 20 66 6f 72 20 6d 61 69 6e Aug 26 13:21:37.638938: | 63 61 31 24 30 22 06 09 2a 86 48 86 f7 0d 01 09 Aug 26 13:21:37.638941: | 01 16 15 74 65 73 74 69 6e 67 40 6c 69 62 72 65 Aug 26 13:21:37.638943: | 73 77 61 6e 2e 6f 72 67 14 00 00 24 63 0a f9 f5 Aug 26 13:21:37.638945: | c3 73 5a 91 4f 02 b0 dc d5 16 08 85 65 42 33 b2 Aug 26 13:21:37.638947: | f0 de e4 92 a0 3e e9 12 d4 48 2c 7d 00 00 00 24 Aug 26 13:21:37.638949: | 1c f6 b2 25 36 a5 b7 42 ec 1b 4a 17 b1 77 00 f9 Aug 26 13:21:37.638950: | 3f 1b 66 97 89 dd 92 ba 09 41 8a 4d 9f 39 a0 cc Aug 26 13:21:37.638953: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:21:37.638955: | **parse ISAKMP Message: Aug 26 13:21:37.638957: | initiator cookie: Aug 26 13:21:37.638959: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:37.638961: | responder cookie: Aug 26 13:21:37.638962: | 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.638964: | next payload type: ISAKMP_NEXT_KE (0x4) Aug 26 13:21:37.638966: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:21:37.638967: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:21:37.638969: | flags: none (0x0) Aug 26 13:21:37.638971: | Message ID: 0 (0x0) Aug 26 13:21:37.638972: | length: 576 (0x240) Aug 26 13:21:37.638974: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:21:37.638977: | State DB: found IKEv1 state #1 in MAIN_I2 (find_state_ikev1) Aug 26 13:21:37.638980: | start processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) Aug 26 13:21:37.638982: | #1 is idle Aug 26 13:21:37.638983: | #1 idle Aug 26 13:21:37.638985: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410 opt: 0x102080 Aug 26 13:21:37.638987: | ***parse ISAKMP Key Exchange Payload: Aug 26 13:21:37.638989: | next payload type: ISAKMP_NEXT_NONCE (0xa) Aug 26 13:21:37.638991: | length: 260 (0x104) Aug 26 13:21:37.638992: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x102080 Aug 26 13:21:37.638994: | ***parse ISAKMP Nonce Payload: Aug 26 13:21:37.638996: | next payload type: ISAKMP_NEXT_CR (0x7) Aug 26 13:21:37.638997: | length: 36 (0x24) Aug 26 13:21:37.638999: | got payload 0x80 (ISAKMP_NEXT_CR) needed: 0x0 opt: 0x102080 Aug 26 13:21:37.639001: | ***parse ISAKMP Certificate RequestPayload: Aug 26 13:21:37.639002: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Aug 26 13:21:37.639004: | length: 180 (0xb4) Aug 26 13:21:37.639006: | cert type: CERT_X509_SIGNATURE (0x4) Aug 26 13:21:37.639007: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080 Aug 26 13:21:37.639010: | ***parse ISAKMP NAT-D Payload: Aug 26 13:21:37.639012: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Aug 26 13:21:37.639015: | length: 36 (0x24) Aug 26 13:21:37.639019: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080 Aug 26 13:21:37.639022: | ***parse ISAKMP NAT-D Payload: Aug 26 13:21:37.639025: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.639027: | length: 36 (0x24) Aug 26 13:21:37.639030: | message 'main_inR2_outI3' HASH payload not checked early Aug 26 13:21:37.639045: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK Aug 26 13:21:37.639053: | actually looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK Aug 26 13:21:37.639064: | line 0: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA Aug 26 13:21:37.639068: | line 1: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA Aug 26 13:21:37.639071: | concluding with best_match=000 best=(nil) (lineno=-1) Aug 26 13:21:37.639074: | no PreShared Key Found Aug 26 13:21:37.639078: | adding aggr outR1 DH work-order 2 for state #1 Aug 26 13:21:37.639081: | state #1 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:21:37.639084: | #1 STATE_MAIN_I2: retransmits: cleared Aug 26 13:21:37.639087: | libevent_free: release ptr-libevent@0x560749ac53d8 Aug 26 13:21:37.639090: | free_event_entry: release EVENT_RETRANSMIT-pe@0x560749ac6aa8 Aug 26 13:21:37.639093: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x560749ac6aa8 Aug 26 13:21:37.639097: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Aug 26 13:21:37.639100: | libevent_malloc: new ptr-libevent@0x7f0f0c002888 size 128 Aug 26 13:21:37.639108: | complete v1 state transition with STF_SUSPEND Aug 26 13:21:37.639113: | [RE]START processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) Aug 26 13:21:37.639115: | crypto helper 0 resuming Aug 26 13:21:37.639116: | suspending state #1 and saving MD Aug 26 13:21:37.639127: | crypto helper 0 starting work-order 2 for state #1 Aug 26 13:21:37.639132: | #1 is busy; has a suspended MD Aug 26 13:21:37.639137: | crypto helper 0 doing compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2 Aug 26 13:21:37.639143: | #1 spent 0.102 milliseconds in process_packet_tail() Aug 26 13:21:37.639147: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:21:37.639150: | stop processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 13:21:37.639152: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:21:37.639155: | spent 0.268 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:21:37.639899: | crypto helper 0 finished compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2 time elapsed 0.000762 seconds Aug 26 13:21:37.639909: | (#1) spent 0.763 milliseconds in crypto helper computing work-order 2: aggr outR1 DH (pcr) Aug 26 13:21:37.639912: | crypto helper 0 sending results from work-order 2 for state #1 to event queue Aug 26 13:21:37.639914: | scheduling resume sending helper answer for #1 Aug 26 13:21:37.639916: | libevent_malloc: new ptr-libevent@0x7f0f04000f48 size 128 Aug 26 13:21:37.639921: | crypto helper 0 waiting (nothing to do) Aug 26 13:21:37.639955: | processing resume sending helper answer for #1 Aug 26 13:21:37.639965: | start processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:21:37.639968: | crypto helper 0 replies to request ID 2 Aug 26 13:21:37.639972: | calling continuation function 0x5607486cbb50 Aug 26 13:21:37.639974: | main_inR2_outI3_cryptotail for #1: calculated DH, sending R1 Aug 26 13:21:37.639978: | **emit ISAKMP Message: Aug 26 13:21:37.639980: | initiator cookie: Aug 26 13:21:37.639981: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:37.639983: | responder cookie: Aug 26 13:21:37.639985: | 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.639986: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:21:37.639988: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:21:37.639990: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:21:37.639992: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:21:37.639993: | Message ID: 0 (0x0) Aug 26 13:21:37.639995: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:21:37.639997: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 5:ISAKMP_NEXT_ID Aug 26 13:21:37.640000: | CR 30 81 ac 31 0b 30 09 06 03 55 04 06 13 02 43 41 Aug 26 13:21:37.640001: | CR 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 Aug 26 13:21:37.640003: | CR 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 Aug 26 13:21:37.640004: | CR 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c Aug 26 13:21:37.640006: | CR 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 Aug 26 13:21:37.640007: | CR 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 Aug 26 13:21:37.640009: | CR 6e 74 31 25 30 23 06 03 55 04 03 0c 1c 4c 69 62 Aug 26 13:21:37.640010: | CR 72 65 73 77 61 6e 20 74 65 73 74 20 43 41 20 66 Aug 26 13:21:37.640012: | CR 6f 72 20 6d 61 69 6e 63 61 31 24 30 22 06 09 2a Aug 26 13:21:37.640013: | CR 86 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 6e Aug 26 13:21:37.640015: | CR 67 40 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 Aug 26 13:21:37.640020: | requested CA: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:21:37.640023: | thinking about whether to send my certificate: Aug 26 13:21:37.640024: | I have RSA key: OAKLEY_RSA_SIG cert.type: CERT_X509_SIGNATURE Aug 26 13:21:37.640026: | sendcert: CERT_ALWAYSSEND and I did get a certificate request Aug 26 13:21:37.640028: | so send cert. Aug 26 13:21:37.640030: | I am sending a certificate request Aug 26 13:21:37.640032: | I will NOT send an initial contact payload Aug 26 13:21:37.640034: | init checking NAT-T: enabled; RFC 3947 (NAT-Traversal) Aug 26 13:21:37.640042: | natd_hash: hasher=0x5607487a0ca0(32) Aug 26 13:21:37.640044: | natd_hash: icookie= b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:37.640045: | natd_hash: rcookie= 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.640047: | natd_hash: ip= c0 01 03 21 Aug 26 13:21:37.640048: | natd_hash: port=500 Aug 26 13:21:37.640050: | natd_hash: hash= 63 0a f9 f5 c3 73 5a 91 4f 02 b0 dc d5 16 08 85 Aug 26 13:21:37.640052: | natd_hash: hash= 65 42 33 b2 f0 de e4 92 a0 3e e9 12 d4 48 2c 7d Aug 26 13:21:37.640055: | natd_hash: hasher=0x5607487a0ca0(32) Aug 26 13:21:37.640057: | natd_hash: icookie= b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:37.640059: | natd_hash: rcookie= 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.640060: | natd_hash: ip= c0 01 02 17 Aug 26 13:21:37.640062: | natd_hash: port=500 Aug 26 13:21:37.640063: | natd_hash: hash= 1c f6 b2 25 36 a5 b7 42 ec 1b 4a 17 b1 77 00 f9 Aug 26 13:21:37.640065: | natd_hash: hash= 3f 1b 66 97 89 dd 92 ba 09 41 8a 4d 9f 39 a0 cc Aug 26 13:21:37.640066: | expected NAT-D(me): 63 0a f9 f5 c3 73 5a 91 4f 02 b0 dc d5 16 08 85 Aug 26 13:21:37.640068: | expected NAT-D(me): 65 42 33 b2 f0 de e4 92 a0 3e e9 12 d4 48 2c 7d Aug 26 13:21:37.640070: | expected NAT-D(him): Aug 26 13:21:37.640071: | 1c f6 b2 25 36 a5 b7 42 ec 1b 4a 17 b1 77 00 f9 Aug 26 13:21:37.640073: | 3f 1b 66 97 89 dd 92 ba 09 41 8a 4d 9f 39 a0 cc Aug 26 13:21:37.640074: | received NAT-D: 63 0a f9 f5 c3 73 5a 91 4f 02 b0 dc d5 16 08 85 Aug 26 13:21:37.640076: | received NAT-D: 65 42 33 b2 f0 de e4 92 a0 3e e9 12 d4 48 2c 7d Aug 26 13:21:37.640079: | received NAT-D: 1c f6 b2 25 36 a5 b7 42 ec 1b 4a 17 b1 77 00 f9 Aug 26 13:21:37.640081: | received NAT-D: 3f 1b 66 97 89 dd 92 ba 09 41 8a 4d 9f 39 a0 cc Aug 26 13:21:37.640083: | NAT_TRAVERSAL encaps using auto-detect Aug 26 13:21:37.640084: | NAT_TRAVERSAL this end is NOT behind NAT Aug 26 13:21:37.640086: | NAT_TRAVERSAL that end is NOT behind NAT Aug 26 13:21:37.640088: | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 Aug 26 13:21:37.640090: | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected Aug 26 13:21:37.640091: | NAT_T_WITH_KA detected Aug 26 13:21:37.640094: | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds Aug 26 13:21:37.640096: | ***emit ISAKMP Identification Payload (IPsec DOI): Aug 26 13:21:37.640098: | next payload type: ISAKMP_NEXT_CERT (0x6) Aug 26 13:21:37.640100: | ID type: ID_DER_ASN1_DN (0x9) Aug 26 13:21:37.640101: | Protocol ID: 0 (0x0) Aug 26 13:21:37.640103: | port: 0 (0x0) Aug 26 13:21:37.640105: | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 6:ISAKMP_NEXT_CERT Aug 26 13:21:37.640107: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) Aug 26 13:21:37.640109: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' Aug 26 13:21:37.640111: | emitting 185 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:21:37.640113: | my identity 30 81 b6 31 0b 30 09 06 03 55 04 06 13 02 43 41 Aug 26 13:21:37.640115: | my identity 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 Aug 26 13:21:37.640116: | my identity 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 Aug 26 13:21:37.640118: | my identity 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c Aug 26 13:21:37.640119: | my identity 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 Aug 26 13:21:37.640121: | my identity 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 Aug 26 13:21:37.640122: | my identity 6e 74 31 24 30 22 06 03 55 04 03 0c 1b 6e 6f 72 Aug 26 13:21:37.640124: | my identity 74 68 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 Aug 26 13:21:37.640125: | my identity 73 77 61 6e 2e 6f 72 67 31 2f 30 2d 06 09 2a 86 Aug 26 13:21:37.640127: | my identity 48 86 f7 0d 01 09 01 16 20 75 73 65 72 2d 6e 6f Aug 26 13:21:37.640128: | my identity 72 74 68 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 Aug 26 13:21:37.640130: | my identity 65 73 77 61 6e 2e 6f 72 67 Aug 26 13:21:37.640132: | emitting length of ISAKMP Identification Payload (IPsec DOI): 193 Aug 26 13:21:37.640134: "north-a-dpd" #1: I am sending my cert Aug 26 13:21:37.640141: | ***emit ISAKMP Certificate Payload: Aug 26 13:21:37.640143: | next payload type: ISAKMP_NEXT_CR (0x7) Aug 26 13:21:37.640145: | cert encoding: CERT_X509_SIGNATURE (0x4) Aug 26 13:21:37.640147: | next payload chain: ignoring supplied 'ISAKMP Certificate Payload'.'next payload type' value 7:ISAKMP_NEXT_CR Aug 26 13:21:37.640149: | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Certificate Payload (6:ISAKMP_NEXT_CERT) Aug 26 13:21:37.640151: | next payload chain: saving location 'ISAKMP Certificate Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.640153: | emitting 1227 raw bytes of CERT into ISAKMP Certificate Payload Aug 26 13:21:37.640155: | CERT 30 82 04 c7 30 82 04 30 a0 03 02 01 02 02 01 06 Aug 26 13:21:37.640156: | CERT 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 Aug 26 13:21:37.640158: | CERT 81 ac 31 0b 30 09 06 03 55 04 06 13 02 43 41 31 Aug 26 13:21:37.640159: | CERT 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 69 Aug 26 13:21:37.640161: | CERT 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 6f Aug 26 13:21:37.640162: | CERT 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c 69 Aug 26 13:21:37.640165: | CERT 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 0b Aug 26 13:21:37.640166: | CERT 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 6e Aug 26 13:21:37.640168: | CERT 74 31 25 30 23 06 03 55 04 03 0c 1c 4c 69 62 72 Aug 26 13:21:37.640169: | CERT 65 73 77 61 6e 20 74 65 73 74 20 43 41 20 66 6f Aug 26 13:21:37.640171: | CERT 72 20 6d 61 69 6e 63 61 31 24 30 22 06 09 2a 86 Aug 26 13:21:37.640172: | CERT 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 6e 67 Aug 26 13:21:37.640174: | CERT 40 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 30 22 Aug 26 13:21:37.640175: | CERT 18 0f 32 30 31 39 30 38 32 34 30 39 30 37 35 33 Aug 26 13:21:37.640177: | CERT 5a 18 0f 32 30 32 32 30 38 32 33 30 39 30 37 35 Aug 26 13:21:37.640178: | CERT 33 5a 30 81 b6 31 0b 30 09 06 03 55 04 06 13 02 Aug 26 13:21:37.640180: | CERT 43 41 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 Aug 26 13:21:37.640181: | CERT 61 72 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 Aug 26 13:21:37.640183: | CERT 6f 72 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c Aug 26 13:21:37.640184: | CERT 09 4c 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 Aug 26 13:21:37.640186: | CERT 55 04 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 Aug 26 13:21:37.640187: | CERT 6d 65 6e 74 31 24 30 22 06 03 55 04 03 0c 1b 6e Aug 26 13:21:37.640189: | CERT 6f 72 74 68 2e 74 65 73 74 69 6e 67 2e 6c 69 62 Aug 26 13:21:37.640190: | CERT 72 65 73 77 61 6e 2e 6f 72 67 31 2f 30 2d 06 09 Aug 26 13:21:37.640192: | CERT 2a 86 48 86 f7 0d 01 09 01 16 20 75 73 65 72 2d Aug 26 13:21:37.640193: | CERT 6e 6f 72 74 68 40 74 65 73 74 69 6e 67 2e 6c 69 Aug 26 13:21:37.640195: | CERT 62 72 65 73 77 61 6e 2e 6f 72 67 30 82 01 a2 30 Aug 26 13:21:37.640196: | CERT 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 Aug 26 13:21:37.640198: | CERT 01 8f 00 30 82 01 8a 02 82 01 81 00 c0 59 bd 4b Aug 26 13:21:37.640199: | CERT 40 fd f4 2c e7 cf 9e f3 29 e6 61 73 de ab 42 3d Aug 26 13:21:37.640201: | CERT cc 51 1a e8 79 d6 53 46 a1 fd 66 d1 9e ab b4 65 Aug 26 13:21:37.640202: | CERT 76 51 ad 3f 6f 8f ef d2 73 f9 fd 8f 44 b0 6c 36 Aug 26 13:21:37.640204: | CERT 4b 95 c3 b2 45 0f 31 0c e9 df 35 95 44 c0 19 53 Aug 26 13:21:37.640205: | CERT 8d df 6a 4b b2 af d6 d3 e8 dd f5 20 df 9c cd 8a Aug 26 13:21:37.640207: | CERT f7 6a 09 92 60 00 45 44 39 4c 17 6c 06 02 91 37 Aug 26 13:21:37.640208: | CERT 4b f5 6a c3 5e 21 c6 64 32 32 98 1d b7 99 1f 3c Aug 26 13:21:37.640210: | CERT 13 fe ec c7 a4 a5 3b 37 30 df e4 31 95 47 91 b1 Aug 26 13:21:37.640211: | CERT ca 96 66 b7 9e 49 65 a2 4c 79 54 17 ed 68 19 34 Aug 26 13:21:37.640213: | CERT 9d 7e 67 91 27 51 f0 ee cb b3 90 68 7c 1d fd 83 Aug 26 13:21:37.640214: | CERT 32 06 2e e6 6f d5 f0 62 00 4d ef 11 90 b6 ad 61 Aug 26 13:21:37.640216: | CERT 83 0b 21 94 18 d9 2b 88 09 0d 33 2e 3b 71 18 f4 Aug 26 13:21:37.640217: | CERT ce 4a 45 f3 37 f4 db c0 d6 ab c2 da da cd 6d e0 Aug 26 13:21:37.640219: | CERT a3 9d 21 53 19 34 b1 0c d9 63 7c 45 b7 26 a4 d9 Aug 26 13:21:37.640220: | CERT d6 93 25 1e 1f 74 3c 07 32 69 9b bc 0f db ba 3e Aug 26 13:21:37.640222: | CERT 30 85 a4 3d ec 5c 70 fe fe 7d 64 3c 2c 48 b3 8a Aug 26 13:21:37.640223: | CERT eb 26 bf 05 d4 33 1e c3 f7 1c 24 c9 99 e3 d1 99 Aug 26 13:21:37.640225: | CERT 91 df 32 10 d5 7c 31 7e 9e 6f 70 01 dc 0d d7 21 Aug 26 13:21:37.640226: | CERT 03 76 4d f5 b2 e3 87 30 94 8c b2 0a c0 b4 d9 0b Aug 26 13:21:37.640228: | CERT d4 d9 37 e0 7a 73 13 50 8d 6f 93 9a 7c 5a 1a b2 Aug 26 13:21:37.640229: | CERT 87 7e 0c 64 60 cb 4b 2c ef 22 75 b1 7c 60 3e e3 Aug 26 13:21:37.640231: | CERT e5 f1 94 38 51 8f 00 e8 35 7b b5 01 ed c1 c4 fd Aug 26 13:21:37.640232: | CERT a3 4b 56 42 d6 8b 64 38 74 95 c4 13 70 f0 f0 23 Aug 26 13:21:37.640234: | CERT 29 57 2b ef 74 97 97 76 8d 30 48 91 02 03 01 00 Aug 26 13:21:37.640235: | CERT 01 a3 81 e4 30 81 e1 30 09 06 03 55 1d 13 04 02 Aug 26 13:21:37.640237: | CERT 30 00 30 26 06 03 55 1d 11 04 1f 30 1d 82 1b 6e Aug 26 13:21:37.640239: | CERT 6f 72 74 68 2e 74 65 73 74 69 6e 67 2e 6c 69 62 Aug 26 13:21:37.640241: | CERT 72 65 73 77 61 6e 2e 6f 72 67 30 0b 06 03 55 1d Aug 26 13:21:37.640242: | CERT 0f 04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 Aug 26 13:21:37.640244: | CERT 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 Aug 26 13:21:37.640245: | CERT 01 05 05 07 03 02 30 41 06 08 2b 06 01 05 05 07 Aug 26 13:21:37.640247: | CERT 01 01 04 35 30 33 30 31 06 08 2b 06 01 05 05 07 Aug 26 13:21:37.640248: | CERT 30 01 86 25 68 74 74 70 3a 2f 2f 6e 69 63 2e 74 Aug 26 13:21:37.640250: | CERT 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e Aug 26 13:21:37.640251: | CERT 2e 6f 72 67 3a 32 35 36 30 30 3d 06 03 55 1d 1f Aug 26 13:21:37.640253: | CERT 04 36 30 34 30 32 a0 30 a0 2e 86 2c 68 74 74 70 Aug 26 13:21:37.640254: | CERT 3a 2f 2f 6e 69 63 2e 74 65 73 74 69 6e 67 2e 6c Aug 26 13:21:37.640256: | CERT 69 62 72 65 73 77 61 6e 2e 6f 72 67 2f 72 65 76 Aug 26 13:21:37.640257: | CERT 6f 6b 65 64 2e 63 72 6c 30 0d 06 09 2a 86 48 86 Aug 26 13:21:37.640259: | CERT f7 0d 01 01 0b 05 00 03 81 81 00 9e e9 26 57 73 Aug 26 13:21:37.640260: | CERT c2 4c 64 c6 ab d6 d3 1a 13 4f 6b 48 e3 17 b2 3d Aug 26 13:21:37.640262: | CERT fb 30 93 2d 15 92 6e a3 60 29 10 1d 3e a7 93 48 Aug 26 13:21:37.640263: | CERT 3c 40 5b af 9e e5 93 b7 2f d5 4b 9f db bd ab 5d Aug 26 13:21:37.640265: | CERT 03 57 3a 1a f9 81 87 13 dd 32 e7 93 b5 9e 3b 40 Aug 26 13:21:37.640266: | CERT 3c c6 c9 d5 ce c6 c7 5d da 89 36 3d d0 36 82 fd Aug 26 13:21:37.640268: | CERT b2 ab 00 2a 7c 0e a7 ad 3e e2 b1 5a 0d 88 45 26 Aug 26 13:21:37.640269: | CERT 48 51 b3 c7 79 d7 04 e7 47 5f 28 f8 63 fb ae 58 Aug 26 13:21:37.640271: | CERT 52 8b ba 60 ce 19 ac fa 4e 65 7d Aug 26 13:21:37.640273: | emitting length of ISAKMP Certificate Payload: 1232 Aug 26 13:21:37.640274: "north-a-dpd" #1: I am sending a certificate request Aug 26 13:21:37.640278: | ***emit ISAKMP Certificate RequestPayload: Aug 26 13:21:37.640280: | next payload type: ISAKMP_NEXT_SIG (0x9) Aug 26 13:21:37.640282: | cert type: CERT_X509_SIGNATURE (0x4) Aug 26 13:21:37.640284: | next payload chain: ignoring supplied 'ISAKMP Certificate RequestPayload'.'next payload type' value 9:ISAKMP_NEXT_SIG Aug 26 13:21:37.640286: | next payload chain: setting previous 'ISAKMP Certificate Payload'.'next payload type' to current ISAKMP Certificate RequestPayload (7:ISAKMP_NEXT_CR) Aug 26 13:21:37.640296: | next payload chain: saving location 'ISAKMP Certificate RequestPayload'.'next payload type' in 'reply packet' Aug 26 13:21:37.640298: | emitting 175 raw bytes of CA into ISAKMP Certificate RequestPayload Aug 26 13:21:37.640300: | CA 30 81 ac 31 0b 30 09 06 03 55 04 06 13 02 43 41 Aug 26 13:21:37.640302: | CA 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 Aug 26 13:21:37.640303: | CA 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 Aug 26 13:21:37.640305: | CA 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c Aug 26 13:21:37.640306: | CA 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 Aug 26 13:21:37.640308: | CA 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 Aug 26 13:21:37.640309: | CA 6e 74 31 25 30 23 06 03 55 04 03 0c 1c 4c 69 62 Aug 26 13:21:37.640311: | CA 72 65 73 77 61 6e 20 74 65 73 74 20 43 41 20 66 Aug 26 13:21:37.640312: | CA 6f 72 20 6d 61 69 6e 63 61 31 24 30 22 06 09 2a Aug 26 13:21:37.640313: | CA 86 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 6e Aug 26 13:21:37.640317: | CA 67 40 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 Aug 26 13:21:37.640319: | emitting length of ISAKMP Certificate RequestPayload: 180 Aug 26 13:21:37.640348: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_RSA Aug 26 13:21:37.640435: | searching for certificate PKK_RSA:AwEAAcBZv vs PKK_RSA:AwEAAcBZv Aug 26 13:21:37.646173: | ***emit ISAKMP Signature Payload: Aug 26 13:21:37.646185: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.646188: | next payload chain: setting previous 'ISAKMP Certificate RequestPayload'.'next payload type' to current ISAKMP Signature Payload (9:ISAKMP_NEXT_SIG) Aug 26 13:21:37.646190: | next payload chain: saving location 'ISAKMP Signature Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.646193: | emitting 384 raw bytes of SIG_I into ISAKMP Signature Payload Aug 26 13:21:37.646195: | SIG_I 90 e3 12 e4 fc 62 a0 69 0c 27 44 26 23 87 da 5f Aug 26 13:21:37.646196: | SIG_I c9 56 1d 76 e6 50 0d 75 bb 55 0b f5 ef 1b 29 f7 Aug 26 13:21:37.646198: | SIG_I 8c 51 4a 77 a7 02 8e 3c 7c ee 4a 4b 44 47 78 fd Aug 26 13:21:37.646199: | SIG_I af 16 5f 39 1a 2d 64 9a ee 63 7e 7b 0f 65 62 b4 Aug 26 13:21:37.646201: | SIG_I cc a0 8f c7 6a e0 3f 5b 0b cd 98 1d 31 3c d4 5f Aug 26 13:21:37.646202: | SIG_I 94 34 95 37 5d 54 a8 42 a2 24 38 e8 68 4b 4a 5a Aug 26 13:21:37.646204: | SIG_I d7 f5 63 0a b9 65 8d 45 33 d5 83 12 7b c9 76 22 Aug 26 13:21:37.646205: | SIG_I 76 14 00 9c ce 26 d5 4c 93 99 bd 66 c9 f9 bc 79 Aug 26 13:21:37.646207: | SIG_I fb dc 25 0f 06 cf 30 11 bd 4a e9 39 64 10 cd d8 Aug 26 13:21:37.646208: | SIG_I 04 26 8d 28 e1 20 eb 9d 9c d8 19 f8 ef fa ca 42 Aug 26 13:21:37.646210: | SIG_I b5 3d e4 bf 84 30 84 00 4d 20 f4 86 de f5 38 f7 Aug 26 13:21:37.646211: | SIG_I 18 71 c5 fc 0f cd c8 71 9a 6e 9c 61 98 bc d4 3e Aug 26 13:21:37.646213: | SIG_I 38 00 2b 62 56 26 6f 4a 20 ba 7f 51 cd 60 3d cc Aug 26 13:21:37.646214: | SIG_I 70 f3 6b 4c 32 fb 92 8f 25 46 51 28 8d c4 02 03 Aug 26 13:21:37.646216: | SIG_I cd 57 09 76 ca c3 0c 35 ec 0d d4 b9 fc 53 bd b3 Aug 26 13:21:37.646217: | SIG_I 1a 01 24 d3 1e 5e 5b 8e 77 1c 2b 83 fc 44 af 04 Aug 26 13:21:37.646219: | SIG_I 1e 73 8a 52 f5 74 3e 00 12 fe 28 63 24 01 4e 58 Aug 26 13:21:37.646220: | SIG_I 9b 61 75 65 17 eb b1 06 85 4c e1 a2 b9 3d 02 ec Aug 26 13:21:37.646222: | SIG_I de 96 cf 31 ce df 75 57 60 b2 31 cc b5 85 9f 9f Aug 26 13:21:37.646223: | SIG_I cd f1 b3 be e9 67 e8 57 17 8f 59 cc 17 39 ed 06 Aug 26 13:21:37.646225: | SIG_I c2 10 1f 40 4a ac 45 07 c0 be e7 64 60 9a eb 37 Aug 26 13:21:37.646226: | SIG_I 7a 99 60 b0 9f 20 77 6f 60 55 6b 4a 43 be 10 64 Aug 26 13:21:37.646228: | SIG_I 6c d4 6b f9 e7 14 b2 dd 91 93 61 8d a0 c1 e3 64 Aug 26 13:21:37.646229: | SIG_I c4 84 12 59 dd f9 6b b2 72 3a 1b 72 31 73 06 03 Aug 26 13:21:37.646231: | emitting length of ISAKMP Signature Payload: 388 Aug 26 13:21:37.646233: | Not sending INITIAL_CONTACT Aug 26 13:21:37.646235: | emitting 7 zero bytes of encryption padding into ISAKMP Message Aug 26 13:21:37.646237: | no IKEv1 message padding required Aug 26 13:21:37.646238: | emitting length of ISAKMP Message: 2028 Aug 26 13:21:37.646251: | complete v1 state transition with STF_OK Aug 26 13:21:37.646257: | [RE]START processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:21:37.646259: | #1 is idle Aug 26 13:21:37.646261: | doing_xauth:no, t_xauth_client_done:no Aug 26 13:21:37.646262: | IKEv1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 Aug 26 13:21:37.646265: | parent state #1: MAIN_I2(open IKE SA) => MAIN_I3(open IKE SA) Aug 26 13:21:37.646267: | event_already_set, deleting event Aug 26 13:21:37.646269: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:21:37.646273: | libevent_free: release ptr-libevent@0x7f0f0c002888 Aug 26 13:21:37.646275: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x560749ac6aa8 Aug 26 13:21:37.646279: | sending reply packet to 192.1.2.23:500 (from 192.1.3.33:500) Aug 26 13:21:37.646285: | sending 2028 bytes for STATE_MAIN_I2 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1) Aug 26 13:21:37.646286: | b2 8a 78 70 6d 40 cb f8 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.646291: | 05 10 02 01 00 00 00 00 00 00 07 ec f8 18 0b e1 Aug 26 13:21:37.646293: | 07 cc 4a 04 ba 6d 3d 66 62 c8 f1 21 47 b5 9f df Aug 26 13:21:37.646297: | 6c a5 ca ae 78 10 40 5a 3b 33 e6 5e a9 98 de 4c Aug 26 13:21:37.646298: | 03 fe 62 98 b9 60 96 97 89 b0 56 f1 87 79 d1 76 Aug 26 13:21:37.646300: | ab ba 26 80 a0 9a f1 e7 47 f1 5e 12 ed 17 08 c3 Aug 26 13:21:37.646301: | 1d 23 48 0f ee d1 2d 11 39 07 ba af 4a 0e 61 c7 Aug 26 13:21:37.646303: | ad e0 85 5c 40 9c 1a 03 90 f0 dc 81 c3 1f 02 3b Aug 26 13:21:37.646304: | 04 48 bc a0 47 31 78 1d 42 c5 14 bb 77 8b 66 59 Aug 26 13:21:37.646306: | 6c 3e 23 e6 e4 88 19 15 35 d6 18 3e e1 19 f7 99 Aug 26 13:21:37.646307: | d7 a9 77 94 3d 58 89 ee 86 6d 49 cf 94 26 3a 8c Aug 26 13:21:37.646309: | 40 24 56 10 d4 e4 e3 46 c5 c2 d4 4c 89 02 db 13 Aug 26 13:21:37.646310: | 2e 2e bd 36 88 fc 72 94 63 83 ca 7f 58 c8 25 bf Aug 26 13:21:37.646312: | 27 ef d1 5d 70 14 b9 30 1c db a3 aa c7 b2 65 de Aug 26 13:21:37.646313: | a9 4c b1 9d 52 aa b5 0d 56 f3 91 d5 0b 46 c8 2a Aug 26 13:21:37.646315: | e2 b6 97 c8 92 52 81 08 ba b5 f8 36 66 03 ca 69 Aug 26 13:21:37.646316: | e3 84 4a 76 ca fc ef cb cc 37 40 10 e4 5b 2c 07 Aug 26 13:21:37.646318: | 5a 4f 01 13 1b d9 92 23 dc b2 f5 07 93 b7 aa 56 Aug 26 13:21:37.646319: | e1 35 6a a0 c9 09 ab 18 35 11 15 8e 48 14 86 77 Aug 26 13:21:37.646321: | f5 ae 74 f1 21 73 ef e4 85 ae f5 4a 90 81 78 d3 Aug 26 13:21:37.646322: | 28 01 5e 41 8d 8c 05 ec ba 58 9d c4 3a 26 13 f8 Aug 26 13:21:37.646324: | 71 3b 5e 9c 05 3b 8a ed b1 67 7e 16 3e 9e d5 4e Aug 26 13:21:37.646325: | 5c 1f 9b 14 fb c5 d4 98 ed 88 cd e2 c3 dc ed 6c Aug 26 13:21:37.646327: | d8 fa d5 54 98 b5 87 fb cc 80 69 21 80 a7 70 1c Aug 26 13:21:37.646328: | c4 78 b9 54 a8 72 9a 70 ae d0 e3 06 66 5c d3 83 Aug 26 13:21:37.646330: | 8b d9 c3 6b a2 30 c0 59 a2 ee 92 f1 ce 27 28 1c Aug 26 13:21:37.646331: | e0 99 70 fc f8 2b 2a 0c ff ef 4c ad 7d f9 5a 6d Aug 26 13:21:37.646333: | 45 67 3a cc cf 0c e5 de a0 4d c1 00 a8 d4 3a bb Aug 26 13:21:37.646335: | 50 c8 40 ba b9 6f 1c ad 27 5a be 42 88 5f 6f b1 Aug 26 13:21:37.646337: | e3 da 10 1e 8f bd b2 40 f0 5a 1e 09 81 50 7c 7e Aug 26 13:21:37.646338: | 22 60 be fd 20 76 01 bb 9c 7b a1 a5 06 a8 48 3d Aug 26 13:21:37.646340: | 41 b3 71 3a f0 fe f0 6f 6b b9 3c 0e a5 f4 43 80 Aug 26 13:21:37.646341: | 87 d9 9e 80 fe 5e 03 ed 6b 41 ea b8 36 90 e7 c6 Aug 26 13:21:37.646343: | bd 77 61 c0 67 17 f9 92 50 82 c8 8b 41 fa ed 38 Aug 26 13:21:37.646344: | ee 2a 04 d8 ca cc 39 05 2a d5 8f 9c ea d1 a5 ff Aug 26 13:21:37.646346: | 12 f5 92 26 8f d5 0a 79 c4 78 47 5d 56 ac 67 63 Aug 26 13:21:37.646347: | fc 34 5c 37 70 28 e4 ac 82 f7 35 b6 e2 72 ff 26 Aug 26 13:21:37.646349: | ff 53 b7 ef 73 ef bd 3c 1b 70 24 11 06 de fc cb Aug 26 13:21:37.646350: | 74 da ca 72 20 3f 93 70 f7 0f 06 a2 4a d5 3c 68 Aug 26 13:21:37.646352: | 2f a5 ae e7 93 79 b8 87 f4 b5 af 44 74 45 e7 e7 Aug 26 13:21:37.646353: | 40 81 4d 24 9a 34 0e 3d 76 25 ad cc 34 23 0d ac Aug 26 13:21:37.646355: | b5 96 ef fd 69 9d 82 be ec 36 f4 80 63 f0 e9 59 Aug 26 13:21:37.646356: | bf f7 23 9e 45 ed fb 81 b0 6a a2 31 92 e8 47 fc Aug 26 13:21:37.646358: | 2a 57 ff d1 37 e9 a2 ab 98 f5 6d 02 34 c4 4a 3e Aug 26 13:21:37.646359: | 5f a9 03 f3 84 0f e1 70 1c 93 1d d1 27 26 5c 7d Aug 26 13:21:37.646361: | b9 b4 4a e2 3d ea f4 94 2d 84 2c 95 54 ee 3a 0c Aug 26 13:21:37.646362: | b1 e5 5e ff 7f d9 92 07 91 2e bd d9 2d 21 8e 83 Aug 26 13:21:37.646364: | 6f c9 73 69 30 1c 55 e5 c0 59 38 13 53 97 ea 3f Aug 26 13:21:37.646365: | 7c d4 c9 33 ba 50 0a a1 02 df 26 59 57 79 08 1a Aug 26 13:21:37.646366: | 65 5d 23 a9 b3 1f 3f c8 31 13 8c 42 c6 2c 20 6d Aug 26 13:21:37.646368: | 1a 0b 1b e0 e9 9f 40 d7 80 ef ff 57 d1 4d 59 11 Aug 26 13:21:37.646369: | 24 14 fb c0 8a 70 19 2b 59 dc 51 85 9f f5 b1 04 Aug 26 13:21:37.646371: | c0 aa ee c7 3a 45 18 fd da f7 b0 90 19 b8 39 5c Aug 26 13:21:37.646372: | 1c 07 c7 2d a5 38 4c 53 1f ea 56 f6 38 dd 47 7c Aug 26 13:21:37.646374: | b2 ba fb f9 8c 85 19 aa 6f e0 27 16 bb 77 6f ad Aug 26 13:21:37.646376: | a8 06 27 55 0e 09 18 60 c1 fa d3 ef 5f ca fd ab Aug 26 13:21:37.646378: | 4e 74 3a 2a 7d 3e 8b f8 f5 e5 1f 9b d6 8b da bb Aug 26 13:21:37.646379: | ca 2f 1f 5c 42 6b 21 13 08 b2 d3 26 24 32 b6 c9 Aug 26 13:21:37.646381: | c3 8c 89 96 0b 8a 9c 09 e1 9d 00 26 16 3c fe 6b Aug 26 13:21:37.646382: | b3 e5 7a f6 25 68 0e a5 7f 82 9e 91 bc 0e 9b 3f Aug 26 13:21:37.646384: | 6c c5 f2 50 7d dd 5c a0 2b dd 82 ad e3 5b 3d 64 Aug 26 13:21:37.646385: | 63 df e1 a1 b7 0f 54 da 3f bf dc ad 47 25 c7 12 Aug 26 13:21:37.646387: | e0 97 e6 63 45 6b 75 75 18 ca 85 ec 3c dc 3d 20 Aug 26 13:21:37.646388: | ad 07 fd c0 25 ef 5f 1c ca 39 62 37 1e 04 02 8f Aug 26 13:21:37.646390: | 6f d3 42 23 a8 28 85 3c b8 7b 3c 6e 68 87 45 69 Aug 26 13:21:37.646391: | f4 72 e7 87 e9 a2 47 88 b4 33 f1 c4 95 48 42 e3 Aug 26 13:21:37.646393: | 6d 6c 00 f8 75 c4 84 59 73 8e 4c 37 c0 85 69 77 Aug 26 13:21:37.646394: | 93 de 34 7e 5b 93 89 0c 0b 44 33 e9 14 3c dc 8a Aug 26 13:21:37.646396: | a8 b9 63 64 78 b8 09 db 6f 32 8d f3 a1 7c a9 27 Aug 26 13:21:37.646397: | b9 14 12 d8 b2 9e ef 8c 1c 13 66 07 7a 09 66 8d Aug 26 13:21:37.646399: | 46 69 3a ed 48 46 c7 da 19 3d a6 99 d2 17 34 a4 Aug 26 13:21:37.646400: | d6 c7 32 d5 18 36 92 ee 23 f7 f2 7d 32 89 d2 ae Aug 26 13:21:37.646402: | ac ed d4 da 5e 49 24 f2 e0 c2 60 50 23 86 bd 6d Aug 26 13:21:37.646403: | 8d c7 3d c5 0d 6c 94 ed 76 b9 75 4c 56 ae c7 6f Aug 26 13:21:37.646404: | c2 2b 1e 34 ab ea 03 af c8 c2 ad 2a ac 5e 56 1b Aug 26 13:21:37.646406: | 4b 97 a4 08 fd e9 4f 7e b1 af e0 8c 3a 57 ed 3d Aug 26 13:21:37.646407: | 6c 25 d1 97 14 b3 7d 78 3e 63 dd d1 ca f9 55 c6 Aug 26 13:21:37.646409: | e7 13 11 53 aa 8a 66 af fb 1f 9a 01 34 14 19 24 Aug 26 13:21:37.646410: | 5e 28 0d a3 ec 96 00 f2 74 f6 9e 2f 3a b0 61 aa Aug 26 13:21:37.646412: | 6a 8c 7b 51 08 b0 6f fe 3e a9 76 6c b2 5d 35 d9 Aug 26 13:21:37.646413: | b8 c0 66 5e 15 a8 90 e3 72 96 26 95 90 32 0c 35 Aug 26 13:21:37.646415: | 38 86 6d 40 4b ab e8 77 1f ea 92 ae da 7a b5 b3 Aug 26 13:21:37.646416: | c1 d1 14 7f 90 41 6d f1 d2 f6 9c 0c b6 ee 07 22 Aug 26 13:21:37.646418: | 6b 17 bd 90 6c dc 33 9c da 92 05 ee 21 57 1c b8 Aug 26 13:21:37.646419: | 9d 23 60 72 6e a5 10 d6 c5 05 3c 00 a4 87 1d 5a Aug 26 13:21:37.646421: | 79 52 1d 93 67 69 e6 26 8b 9d 6c 3d 3d 72 9e 1e Aug 26 13:21:37.646422: | 19 e9 e3 6a 69 ba 06 86 6d 7d c0 b3 bb 3f 13 77 Aug 26 13:21:37.646424: | c2 c5 8c 6c 86 04 88 05 1e c2 df 78 03 47 1f 2e Aug 26 13:21:37.646425: | 5f c4 1c 65 5a 71 1a da 3b 30 c3 05 57 fa 50 23 Aug 26 13:21:37.646427: | ea a4 7d 6b af d6 67 ca 65 51 34 06 fc de 89 45 Aug 26 13:21:37.646428: | 63 55 86 d1 2e 72 fb bf dd 3a 7d fe 92 48 f1 bf Aug 26 13:21:37.646430: | 3f b4 ca c0 30 4b 53 b2 7c 32 a4 cd d8 92 99 fd Aug 26 13:21:37.646431: | 59 46 e9 16 4c f9 8a 45 c2 ce 74 3a d7 85 51 75 Aug 26 13:21:37.646433: | 9c 99 49 98 78 0a 2d 73 9d 04 cc 3f 51 ab 82 a3 Aug 26 13:21:37.646434: | 3d bd b0 00 b9 7d 91 67 d4 3a 8a 81 a2 5a d6 fb Aug 26 13:21:37.646436: | 49 aa 03 a9 8a e7 c8 14 b5 09 9b 69 13 33 f2 06 Aug 26 13:21:37.646437: | 81 7f 7e c5 7f c9 c0 e0 5e 3d 1b fa 00 71 41 29 Aug 26 13:21:37.646439: | 7d c5 f7 b4 40 e5 b6 78 dd a2 25 42 fd e4 25 45 Aug 26 13:21:37.646440: | e2 dc d0 f2 47 ac 81 71 aa 0c a4 fd d7 b6 74 91 Aug 26 13:21:37.646442: | d5 9b e3 d2 23 42 af b9 3c d9 1a a8 9f a5 67 8a Aug 26 13:21:37.646443: | de c4 2b e5 ca be 58 5a 14 5f 3d 39 3c d1 33 fe Aug 26 13:21:37.646445: | 54 b0 74 9d 24 68 11 5a 33 de 5f ce eb 03 54 a6 Aug 26 13:21:37.646446: | 10 ed 2f bb 8d 5f 82 60 d5 8e 38 15 86 a6 c2 21 Aug 26 13:21:37.646448: | c7 71 f2 86 64 c8 5d b2 76 2c ba 2a 8c 11 ec b4 Aug 26 13:21:37.646449: | be 75 a9 c4 bd 30 26 a7 b5 a9 9c 53 fc 12 e6 c5 Aug 26 13:21:37.646451: | 0a 49 62 3b ab 47 fb 7f ff d4 be db 6c 6a 97 af Aug 26 13:21:37.646453: | 79 9a 95 ab 77 a1 de f4 a0 49 8e ca b4 5f 3f 05 Aug 26 13:21:37.646454: | 5f 25 fc 69 f9 5a c9 5f 91 36 6c 14 e8 19 61 15 Aug 26 13:21:37.646456: | 07 a1 84 82 af e2 a0 d1 5c 6c e8 ef 9e 86 9b e8 Aug 26 13:21:37.646457: | c6 1d 4b 86 6a ee 5b 4f 56 95 48 4f 36 c7 84 97 Aug 26 13:21:37.646459: | 5b 21 cb 38 6f 51 b0 f2 37 f4 7a ee 46 91 55 86 Aug 26 13:21:37.646460: | d5 3f 4a 50 93 fc e4 2c 95 b7 1f 64 d2 bf 8c 76 Aug 26 13:21:37.646462: | 9f 76 dd 9b 6c e4 fb 8e c0 04 86 de 97 3c 79 4d Aug 26 13:21:37.646463: | d3 a8 99 ef 3e 14 4c 1b 20 d9 c7 92 4a 23 3e cc Aug 26 13:21:37.646465: | 84 86 d3 ca bd 40 f5 05 b7 95 9c e1 24 97 2a 81 Aug 26 13:21:37.646466: | c6 e7 69 4d 20 02 de e6 3a 06 8c 43 bd ed 32 9d Aug 26 13:21:37.646468: | 63 93 56 78 8e 50 ca ae 8d b3 aa 0c c4 f2 41 33 Aug 26 13:21:37.646469: | ef 22 74 22 c3 b7 83 24 d6 b2 0d 7a 86 14 72 49 Aug 26 13:21:37.646471: | 3a f4 e3 10 a0 c9 c0 a3 a7 b7 d8 7e 4d 04 79 53 Aug 26 13:21:37.646472: | a9 35 03 b0 5e 30 02 d1 47 ff 4f 63 b7 1d 6e 95 Aug 26 13:21:37.646474: | 37 7e 1a b0 d3 39 08 ec 44 74 a2 3e ce f8 f3 54 Aug 26 13:21:37.646475: | d7 c9 87 26 6c 8c c3 ec 3d c2 5d e4 ff 40 ab 81 Aug 26 13:21:37.646477: | 47 29 9e 10 83 cd 3d 4c 68 05 d9 11 c3 34 44 bf Aug 26 13:21:37.646478: | 49 91 12 5c 63 0c a8 34 dc f2 57 75 c7 79 28 c4 Aug 26 13:21:37.646480: | 65 06 ca 72 b5 5b 67 00 f9 46 4c 72 7b 11 ba 7d Aug 26 13:21:37.646481: | f6 62 f0 f1 f5 e7 42 ef e3 78 9f 7c 2b e7 bb 17 Aug 26 13:21:37.646483: | 1c 9c 66 50 a9 bf 84 1c 06 f1 be eb Aug 26 13:21:37.646502: | !event_already_set at reschedule Aug 26 13:21:37.646505: | event_schedule: new EVENT_RETRANSMIT-pe@0x560749ac6aa8 Aug 26 13:21:37.646508: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1 Aug 26 13:21:37.646511: | libevent_malloc: new ptr-libevent@0x560749ac5718 size 128 Aug 26 13:21:37.646514: | #1 STATE_MAIN_I3: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10983.388972 Aug 26 13:21:37.646517: "north-a-dpd" #1: STATE_MAIN_I3: sent MI3, expecting MR3 Aug 26 13:21:37.646525: | modecfg pull: noquirk policy:push not-client Aug 26 13:21:37.646527: | phase 1 is done, looking for phase 2 to unpend Aug 26 13:21:37.646529: | resume sending helper answer for #1 suppresed complete_v1_state_transition() Aug 26 13:21:37.646535: | #1 spent 6.52 milliseconds in resume sending helper answer Aug 26 13:21:37.646538: | stop processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:21:37.646541: | libevent_free: release ptr-libevent@0x7f0f04000f48 Aug 26 13:21:37.660784: | spent 0.00307 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:21:37.660811: | *received 1884 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Aug 26 13:21:37.660815: | b2 8a 78 70 6d 40 cb f8 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.660817: | 05 10 02 01 00 00 00 00 00 00 07 5c cd a9 cb 67 Aug 26 13:21:37.660820: | 64 68 0f 1c 48 fb db 99 2c b5 4f a1 e6 da 37 cc Aug 26 13:21:37.660822: | 2d 29 0d 46 d4 1c c9 a7 85 b1 a8 0b c8 4c a1 38 Aug 26 13:21:37.660825: | 0b f2 87 59 90 2b 3d 5d 85 8e 9f 7e e3 43 fd b0 Aug 26 13:21:37.660827: | c6 8b 5c 8a 96 f6 ef 22 94 c4 94 ca 94 a4 28 16 Aug 26 13:21:37.660830: | 2f 6b 00 5b ff d2 74 ff 31 6b 28 55 45 82 a1 9d Aug 26 13:21:37.660832: | 0d 38 82 64 f5 e0 90 3e eb ff 7d 12 86 e5 79 ee Aug 26 13:21:37.660835: | b2 e1 e6 92 c7 1c 7d 9a c0 1b 41 e4 de 55 73 65 Aug 26 13:21:37.660837: | f1 0c 76 92 b9 68 b7 4f e9 35 7e 4a 91 39 fa c5 Aug 26 13:21:37.660840: | 2e bc 93 e7 64 21 a2 f4 02 7f 65 41 53 e9 48 65 Aug 26 13:21:37.660842: | 3d 59 73 fe 31 e8 3d e6 8b a2 63 30 7b 0c dd 66 Aug 26 13:21:37.660845: | e4 06 d1 ef 06 ea ac 9f d5 66 cf 60 61 ce e2 3f Aug 26 13:21:37.660847: | 65 1e ec 0f 19 8d 4f 97 96 c1 52 80 00 3f 7d 7d Aug 26 13:21:37.660849: | 03 49 05 19 40 46 a8 62 d2 29 94 d7 13 ff c0 c1 Aug 26 13:21:37.660854: | b6 4b 55 0c 6b 1a 3d 90 10 64 03 08 54 ef 50 db Aug 26 13:21:37.660857: | 6f 6f b9 2f 7c df 97 52 18 fe 78 0e 36 4d d0 d0 Aug 26 13:21:37.660859: | 05 43 ea 4b 7e f6 5a b9 f6 fc b5 67 e9 1a 3c 98 Aug 26 13:21:37.660861: | 76 df d6 59 ed 92 ae 8e e4 80 9a 30 e9 e4 d3 16 Aug 26 13:21:37.660864: | b5 36 d7 80 0e 09 76 4a b7 7a 56 31 25 b0 66 8b Aug 26 13:21:37.660866: | bb be 5c e6 87 fc 5a 8d e1 bb d4 8b e0 5f 16 7a Aug 26 13:21:37.660868: | 96 b8 f1 be c4 5b 38 2e c9 df 2d 88 55 a2 b6 cc Aug 26 13:21:37.660871: | eb 72 27 08 98 f0 61 e1 72 2a fa 47 1b e4 9b e4 Aug 26 13:21:37.660873: | 75 59 c9 3d 5f b4 0b 30 0d d1 39 d9 13 e3 41 c3 Aug 26 13:21:37.660875: | cc 7e cb e7 5a ff 9b 14 1e 91 6b 82 ac 96 df 5f Aug 26 13:21:37.660878: | 4f 38 79 42 c3 8c 63 ef 2d c8 ec 19 83 4c c6 b3 Aug 26 13:21:37.660880: | 0c 3b 7b 11 f0 1d 7d 43 34 26 53 16 4b b3 b7 51 Aug 26 13:21:37.660882: | d4 a7 a2 da 9d bc 72 f2 0a 75 bb 2b 9c 89 94 df Aug 26 13:21:37.660885: | 2c ee e1 78 04 27 0a 86 16 f8 d5 a5 06 e4 0d 7e Aug 26 13:21:37.660887: | 12 fa 14 3f 04 da 0b 14 b0 87 3d c6 ff e9 d6 18 Aug 26 13:21:37.660889: | 17 3c 26 2f a9 6b 0d e7 9f 96 8e 22 63 c2 9b 6a Aug 26 13:21:37.660892: | 8d 59 14 15 b8 e7 11 ea 5c 44 05 1b a2 cc b1 71 Aug 26 13:21:37.660894: | 6e 30 fe 9c f5 37 6e 9e ca ae 97 1b e4 d8 d7 fe Aug 26 13:21:37.660896: | fe b3 38 d8 d0 c4 fc 96 c7 70 d2 b1 13 18 0e 90 Aug 26 13:21:37.660899: | 89 be da 80 06 a5 60 ea 21 b7 2c de d0 1b de 49 Aug 26 13:21:37.660901: | 0d fa 3e 1a 53 f6 e5 65 b7 15 cf f0 9d 7b e8 eb Aug 26 13:21:37.660903: | 72 0c 2b 4b 36 95 cc af ec a6 23 9a bc f1 68 02 Aug 26 13:21:37.660906: | ba 98 b9 9b d1 b0 46 f7 83 56 79 08 5a 6a 02 13 Aug 26 13:21:37.660908: | cb 1e d9 fc db f0 3d 8f 9d 26 3b f2 77 8f 45 7b Aug 26 13:21:37.660910: | c4 90 b0 3d f1 f5 3b 36 2f 92 f9 c9 42 26 2f 02 Aug 26 13:21:37.660912: | 32 2f fa e7 b5 74 f4 22 cb 46 88 21 a8 e8 ca 66 Aug 26 13:21:37.660915: | 8f dd e5 13 84 2d 8d 69 ad 22 19 53 12 a8 72 b3 Aug 26 13:21:37.660917: | 6b 56 e1 c3 4c 65 b7 26 f7 68 fc 88 04 3f 56 6b Aug 26 13:21:37.660919: | 9b 0b ad 40 3f e8 2d dd db f0 d7 56 3d 65 2c b3 Aug 26 13:21:37.660922: | 38 e0 20 a2 10 5f bf a6 10 0d 1a 39 eb f3 3a 65 Aug 26 13:21:37.660924: | 3d 4a 3b 81 ae 9d 9e 8c c9 73 7a 7c ea 59 7a ef Aug 26 13:21:37.660926: | dc d8 93 8a 9a 10 ed e5 34 dd 1e 32 94 66 20 1f Aug 26 13:21:37.660928: | 40 ec e1 bb 02 8c c1 1e ed 1d 24 77 3d 0a e4 53 Aug 26 13:21:37.660931: | d8 b0 dc cc be 02 ee be 6c 44 d0 d1 4b 1f 7c 6f Aug 26 13:21:37.660933: | 86 50 b1 f5 70 83 1d 5f 3b 7d 78 72 50 58 92 81 Aug 26 13:21:37.660935: | 76 d4 3b 00 6a 10 6d a1 07 da 29 8c ac fe 60 f6 Aug 26 13:21:37.660937: | 31 91 d3 6a 37 73 8b 3d 22 48 fe 97 50 13 a9 b6 Aug 26 13:21:37.660939: | c9 12 96 d9 dc 5b 39 7b ff a5 5f 7a 26 78 ac f4 Aug 26 13:21:37.660942: | ac 5c d0 a0 ad 3a a8 26 9b c9 aa 8e f2 f5 6d aa Aug 26 13:21:37.660944: | 6c 97 da 2b 3b ad 41 bc 8d 75 ae eb 95 a7 5d 5b Aug 26 13:21:37.660946: | bf 0c 2f 23 f8 8e bc ac 72 b7 42 2a 92 cd 14 ea Aug 26 13:21:37.660948: | f0 33 d9 b8 c5 c7 8a 54 f1 9c ff a4 8c cd 46 0e Aug 26 13:21:37.660951: | 2d ee b2 8e ef b0 a0 64 83 2c a2 af 03 94 51 5b Aug 26 13:21:37.660953: | 1d cc 9c 09 e1 8c b2 86 c0 74 b3 d4 09 c4 42 6a Aug 26 13:21:37.660955: | 4e 21 b0 35 b4 ff d4 6b 5c 6d f3 66 8d 87 02 30 Aug 26 13:21:37.660957: | 37 b6 09 60 99 d1 f1 b3 bb 7a 9d 5b 3f 44 4d 26 Aug 26 13:21:37.660960: | 21 1d 1a e1 c5 5e 73 66 41 46 b3 00 fc 80 36 27 Aug 26 13:21:37.660962: | 93 a2 49 af 9e 95 26 fe b5 aa 57 a5 d3 b1 62 ec Aug 26 13:21:37.660964: | 2e 06 2f 85 97 82 51 51 69 1b 20 a4 f2 27 25 56 Aug 26 13:21:37.660966: | ba e5 07 f2 4f 63 cc 74 5e 17 d3 c6 3e ba e5 2f Aug 26 13:21:37.660969: | 77 df c9 b1 cb 85 e1 c6 6c bb 31 e0 40 f3 78 cf Aug 26 13:21:37.660971: | 03 05 cd 70 9e c0 56 65 4a 9f 0c 54 2f 45 3f db Aug 26 13:21:37.660977: | ac 96 94 5f 9f 5c 64 65 83 81 61 25 ef a7 f5 74 Aug 26 13:21:37.660980: | 68 c9 8a d2 45 3c e0 92 a1 c0 45 fe fb 98 69 dc Aug 26 13:21:37.660983: | e2 ec ae a7 55 2c db a1 e2 7c b3 a6 ce 4e ff 3c Aug 26 13:21:37.660985: | b5 aa ec 83 30 71 33 de f2 d9 8b 6a d1 9d 13 d2 Aug 26 13:21:37.660988: | 2f 1b d2 d3 3d da f0 d0 1e 1b d3 bd 15 f8 fd 7c Aug 26 13:21:37.660990: | 16 c8 eb a3 6c 99 d9 47 1c 5e a0 72 52 bc bb 6b Aug 26 13:21:37.660992: | 7b b2 17 e4 2c 11 f1 a3 4b 1b be 9e cd 81 64 30 Aug 26 13:21:37.660995: | 25 79 48 00 34 09 99 83 63 2e f0 85 16 32 5f 20 Aug 26 13:21:37.660997: | 3a 8d d9 7d 81 04 57 74 ab a1 95 5f b9 7d 7a 66 Aug 26 13:21:37.661000: | 3a f1 f4 b7 72 c5 ac 10 8b c3 22 2c c5 4d 76 99 Aug 26 13:21:37.661002: | 28 09 30 cb d5 07 e6 af f6 83 c6 a0 83 a0 95 36 Aug 26 13:21:37.661005: | 01 a4 29 d8 89 a5 6d dc 6d b1 42 43 30 3e 28 04 Aug 26 13:21:37.661007: | 8a 9e 9f 0f e5 aa 2e 6a 9d 36 b1 7c 10 46 c7 83 Aug 26 13:21:37.661010: | 2a 7b 5f ee a6 d1 e0 51 21 e1 4f 63 b8 c4 03 1f Aug 26 13:21:37.661012: | c8 88 56 7f ec 5f 86 44 4b be 5e 04 60 e0 f7 1b Aug 26 13:21:37.661014: | 2e dd 8a 48 b9 08 e3 23 1a 22 8e a3 14 e3 ff 47 Aug 26 13:21:37.661017: | cf 73 6a dc c4 e1 10 c6 33 74 20 77 ad 08 f4 8a Aug 26 13:21:37.661019: | 2b 59 af a1 15 f0 72 3b c5 29 6c e5 98 01 33 9f Aug 26 13:21:37.661022: | 7d b0 77 d1 56 fa df 9c c1 1a 62 98 9f a1 c0 14 Aug 26 13:21:37.661024: | 8e 70 4c 21 f1 35 3a 73 c1 be 7c 2a 2a 2f 55 33 Aug 26 13:21:37.661027: | cb 0f d4 f3 22 da e9 12 f6 96 ae 5d fd 77 29 15 Aug 26 13:21:37.661030: | a6 fb f3 4f 34 7c aa 14 84 c7 34 4f 82 a4 70 dc Aug 26 13:21:37.661032: | 5c 9b ea a1 74 1c f0 93 ca 9b 08 aa be 0c 06 ef Aug 26 13:21:37.661035: | a0 ae b6 21 a6 63 fb 4d 2b 1a 6f 81 f4 60 c7 26 Aug 26 13:21:37.661037: | 55 0a 9a 7c bd 12 43 98 dd 2a 74 a3 06 db c9 49 Aug 26 13:21:37.661040: | a0 c9 7a 29 17 d2 d6 17 41 12 8f a8 96 83 36 6a Aug 26 13:21:37.661042: | 56 e6 7a 71 84 23 be 8b de bf c4 0c 99 af 2c 15 Aug 26 13:21:37.661045: | a8 6a b9 b0 fd 8f 20 ff d7 59 58 eb 8b 6c 08 c0 Aug 26 13:21:37.661047: | df c0 e4 33 3b 5e 46 39 dd 95 f0 2c c5 a4 db 17 Aug 26 13:21:37.661050: | f2 01 34 b5 2c 58 52 7b 60 27 0b c5 2f 5e e3 e6 Aug 26 13:21:37.661053: | fc 3c b3 da c9 fe 1e 1b 9b 7d db 6b 8f 78 f9 44 Aug 26 13:21:37.661055: | dd a9 13 98 c8 90 1a c3 28 c7 be 51 7a 97 5e 98 Aug 26 13:21:37.661058: | 33 63 30 df cf 46 22 b8 05 3c 07 1d 9d fb 54 53 Aug 26 13:21:37.661060: | 9c 26 33 be 45 e0 93 01 4e 06 4d 52 f3 4a 51 e5 Aug 26 13:21:37.661063: | 8b af ed 4c bf 27 96 8c 0c d1 03 a5 b0 59 96 3d Aug 26 13:21:37.661065: | c8 3e 56 2b cf 2f 01 d6 26 90 10 f1 ea 63 b5 5e Aug 26 13:21:37.661068: | 32 fe 1c ba 1a b0 a0 fe 3b d4 8c 24 c3 58 2d 61 Aug 26 13:21:37.661071: | dd e1 83 0d d0 78 6f 98 1a 9a f2 f5 5d d3 4e 04 Aug 26 13:21:37.661074: | 71 1f d2 92 86 02 6f 7b 1e fc 00 71 6e d8 99 38 Aug 26 13:21:37.661076: | e9 9a f3 a8 00 7f ed 25 40 49 11 40 24 93 c2 fc Aug 26 13:21:37.661079: | b9 aa 16 b8 f1 e2 7a c8 05 d0 5b 32 bd ce 38 ec Aug 26 13:21:37.661081: | de c3 30 02 6c db 52 36 e8 04 b7 17 cc 39 0f 24 Aug 26 13:21:37.661084: | 2d 94 74 fc b7 78 54 72 12 bc 27 64 82 bc 93 d9 Aug 26 13:21:37.661087: | 42 dd 15 47 33 bd ed 77 d6 2e 1a 14 3a eb 0b 7d Aug 26 13:21:37.661089: | c3 68 dd 98 75 1c 24 36 a4 48 e9 16 46 b1 81 ba Aug 26 13:21:37.661092: | c6 b8 4d d4 ec 56 96 55 67 eb c6 e4 2c 8a c4 3b Aug 26 13:21:37.661095: | b3 2d 30 01 46 02 06 15 e2 08 3b 7d e1 4a bd dc Aug 26 13:21:37.661097: | f7 53 4a e7 5f a5 f6 55 4e 6d 76 22 38 11 61 2f Aug 26 13:21:37.661100: | f1 87 43 6c f5 54 6f 40 7f ec 4f fe 03 e8 91 6d Aug 26 13:21:37.661103: | ba 32 c1 9e e7 23 71 61 24 24 fa 1b 7a 38 9b 8f Aug 26 13:21:37.661105: | 72 d5 00 e0 79 12 a8 2f df 5e 76 01 Aug 26 13:21:37.661111: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:21:37.661119: | **parse ISAKMP Message: Aug 26 13:21:37.661122: | initiator cookie: Aug 26 13:21:37.661125: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:37.661128: | responder cookie: Aug 26 13:21:37.661131: | 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.661134: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:21:37.661138: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:21:37.661141: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:21:37.661143: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:21:37.661146: | Message ID: 0 (0x0) Aug 26 13:21:37.661149: | length: 1884 (0x75c) Aug 26 13:21:37.661153: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:21:37.661158: | State DB: found IKEv1 state #1 in MAIN_I3 (find_state_ikev1) Aug 26 13:21:37.661164: | start processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) Aug 26 13:21:37.661167: | #1 is idle Aug 26 13:21:37.661170: | #1 idle Aug 26 13:21:37.661174: | received encrypted packet from 192.1.2.23:500 Aug 26 13:21:37.661202: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x220 opt: 0x20c0 Aug 26 13:21:37.661207: | ***parse ISAKMP Identification Payload: Aug 26 13:21:37.661210: | next payload type: ISAKMP_NEXT_CERT (0x6) Aug 26 13:21:37.661213: | length: 191 (0xbf) Aug 26 13:21:37.661216: | ID type: ID_DER_ASN1_DN (0x9) Aug 26 13:21:37.661219: | DOI specific A: 0 (0x0) Aug 26 13:21:37.661222: | DOI specific B: 0 (0x0) Aug 26 13:21:37.661225: | obj: 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 Aug 26 13:21:37.661228: | obj: 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 Aug 26 13:21:37.661231: | obj: 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 Aug 26 13:21:37.661233: | obj: 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c Aug 26 13:21:37.661236: | obj: 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 Aug 26 13:21:37.661238: | obj: 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 Aug 26 13:21:37.661241: | obj: 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 65 61 73 Aug 26 13:21:37.661244: | obj: 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 Aug 26 13:21:37.661247: | obj: 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 Aug 26 13:21:37.661249: | obj: 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 65 61 73 Aug 26 13:21:37.661252: | obj: 74 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 Aug 26 13:21:37.661255: | obj: 77 61 6e 2e 6f 72 67 Aug 26 13:21:37.661258: | got payload 0x40 (ISAKMP_NEXT_CERT) needed: 0x200 opt: 0x20c0 Aug 26 13:21:37.661262: | ***parse ISAKMP Certificate Payload: Aug 26 13:21:37.661264: | next payload type: ISAKMP_NEXT_SIG (0x9) Aug 26 13:21:37.661267: | length: 1265 (0x4f1) Aug 26 13:21:37.661270: | cert encoding: CERT_X509_SIGNATURE (0x4) Aug 26 13:21:37.661273: | got payload 0x200 (ISAKMP_NEXT_SIG) needed: 0x200 opt: 0x20c0 Aug 26 13:21:37.661276: | ***parse ISAKMP Signature Payload: Aug 26 13:21:37.661279: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.661282: | length: 388 (0x184) Aug 26 13:21:37.661285: | removing 12 bytes of padding Aug 26 13:21:37.661314: | message 'main_inR3' HASH payload not checked early Aug 26 13:21:37.661323: | DER ASN1 DN: 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 Aug 26 13:21:37.661327: | DER ASN1 DN: 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 Aug 26 13:21:37.661330: | DER ASN1 DN: 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 Aug 26 13:21:37.661332: | DER ASN1 DN: 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c Aug 26 13:21:37.661335: | DER ASN1 DN: 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 Aug 26 13:21:37.661337: | DER ASN1 DN: 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 Aug 26 13:21:37.661340: | DER ASN1 DN: 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 65 61 73 Aug 26 13:21:37.661342: | DER ASN1 DN: 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 Aug 26 13:21:37.661347: | DER ASN1 DN: 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 Aug 26 13:21:37.661350: | DER ASN1 DN: 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 65 61 73 Aug 26 13:21:37.661352: | DER ASN1 DN: 74 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 Aug 26 13:21:37.661355: | DER ASN1 DN: 77 61 6e 2e 6f 72 67 Aug 26 13:21:37.661364: "north-a-dpd" #1: Peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' Aug 26 13:21:37.661381: | global one-shot timer EVENT_FREE_ROOT_CERTS scheduled in 300 seconds Aug 26 13:21:37.661385: loading root certificate cache Aug 26 13:21:37.665253: | spent 3.83 milliseconds in get_root_certs() calling PK11_ListCertsInSlot() Aug 26 13:21:37.665302: | spent 0.029 milliseconds in get_root_certs() filtering CAs Aug 26 13:21:37.665310: | #1 spent 3.9 milliseconds in find_and_verify_certs() calling get_root_certs() Aug 26 13:21:37.665316: | checking for known CERT payloads Aug 26 13:21:37.665319: | saving certificate of type 'X509_SIGNATURE' Aug 26 13:21:37.665363: | decoded cert: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA Aug 26 13:21:37.665370: | #1 spent 0.053 milliseconds in find_and_verify_certs() calling decode_cert_payloads() Aug 26 13:21:37.665373: | cert_issuer_has_current_crl: looking for a CRL issued by E=testing@libreswan.org,CN=Libreswan test CA for mainca,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA Aug 26 13:21:37.665410: | #1 spent 0.0361 milliseconds in find_and_verify_certs() calling crl_update_check() Aug 26 13:21:37.665414: | missing or expired CRL Aug 26 13:21:37.665416: | crl_strict: 0, ocsp: 0, ocsp_strict: 0, ocsp_post: 0 Aug 26 13:21:37.665418: | verify_end_cert trying profile IPsec Aug 26 13:21:37.665507: | certificate is valid (profile IPsec) Aug 26 13:21:37.665513: | #1 spent 0.0956 milliseconds in find_and_verify_certs() calling verify_end_cert() Aug 26 13:21:37.665517: "north-a-dpd" #1: certificate verified OK: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA Aug 26 13:21:37.665576: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749adf8f8 Aug 26 13:21:37.665581: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749ae2bf8 Aug 26 13:21:37.665583: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749ae2a48 Aug 26 13:21:37.665584: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749ae2898 Aug 26 13:21:37.665586: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749ae1ed8 Aug 26 13:21:37.665733: | unreference key: 0x560749ae6d58 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- Aug 26 13:21:37.665741: | #1 spent 0.212 milliseconds in decode_certs() calling add_pubkey_from_nss_cert() Aug 26 13:21:37.665744: | #1 spent 4.34 milliseconds in decode_certs() Aug 26 13:21:37.665751: | ID_DER_ASN1_DN 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' needs further ID comparison against 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' Aug 26 13:21:37.665753: | ID_DER_ASN1_DN 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' matched our ID Aug 26 13:21:37.665755: | SAN ID matched, updating that.cert Aug 26 13:21:37.665757: | X509: CERT and ID matches current connection Aug 26 13:21:37.665784: | required RSA CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:21:37.665791: | checking RSA keyid 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' for match with 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' Aug 26 13:21:37.665798: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:21:37.665801: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:21:37.665805: | key issuer CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:21:37.665906: | an RSA Sig check passed with *AwEAAbEef [remote certificates] Aug 26 13:21:37.665910: | #1 spent 0.102 milliseconds in try_all_RSA_keys() trying a pubkey Aug 26 13:21:37.665912: "north-a-dpd" #1: Authenticated using RSA Aug 26 13:21:37.665919: | FOR_EACH_CONNECTION_... in ISAKMP_SA_established Aug 26 13:21:37.666020: | complete v1 state transition with STF_OK Aug 26 13:21:37.666030: | [RE]START processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:21:37.666032: | #1 is idle Aug 26 13:21:37.666034: | doing_xauth:no, t_xauth_client_done:no Aug 26 13:21:37.666036: | IKEv1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 Aug 26 13:21:37.666039: | parent state #1: MAIN_I3(open IKE SA) => MAIN_I4(established IKE SA) Aug 26 13:21:37.666041: | event_already_set, deleting event Aug 26 13:21:37.666043: | state #1 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:21:37.666045: | #1 STATE_MAIN_I4: retransmits: cleared Aug 26 13:21:37.666049: | libevent_free: release ptr-libevent@0x560749ac5718 Aug 26 13:21:37.666051: | free_event_entry: release EVENT_RETRANSMIT-pe@0x560749ac6aa8 Aug 26 13:21:37.666054: | !event_already_set at reschedule Aug 26 13:21:37.666057: | event_schedule: new EVENT_SA_REPLACE-pe@0x560749ac6aa8 Aug 26 13:21:37.666060: | inserting event EVENT_SA_REPLACE, timeout in 2607 seconds for #1 Aug 26 13:21:37.666062: | libevent_malloc: new ptr-libevent@0x560749ae8988 size 128 Aug 26 13:21:37.666065: | pstats #1 ikev1.isakmp established Aug 26 13:21:37.666068: "north-a-dpd" #1: STATE_MAIN_I4: ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} Aug 26 13:21:37.666075: | DPD: dpd_init() called on ISAKMP SA Aug 26 13:21:37.666077: | DPD: Peer supports Dead Peer Detection Aug 26 13:21:37.666079: | modecfg pull: noquirk policy:push not-client Aug 26 13:21:37.666081: | phase 1 is done, looking for phase 2 to unpend Aug 26 13:21:37.666082: | unpending state #1 Aug 26 13:21:37.666087: | creating state object #2 at 0x560749ae5b78 Aug 26 13:21:37.666089: | State DB: adding IKEv1 state #2 in UNDEFINED Aug 26 13:21:37.666091: | pstats #2 ikev1.ipsec started Aug 26 13:21:37.666093: | duplicating state object #1 "north-a-dpd" as #2 for IPSEC SA Aug 26 13:21:37.666097: | #2 setting local endpoint to 192.1.3.33:500 from #1.st_localport (in duplicate_state() at state.c:1484) Aug 26 13:21:37.666101: | suspend processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) Aug 26 13:21:37.666104: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) Aug 26 13:21:37.666110: | child state #2: UNDEFINED(ignore) => QUICK_I1(established CHILD SA) Aug 26 13:21:37.666115: "north-a-dpd" #2: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#1 msgid:e29de7e5 proposal=defaults pfsgroup=MODP2048} Aug 26 13:21:37.666120: | adding quick_outI1 KE work-order 3 for state #2 Aug 26 13:21:37.666123: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x560749ac97d8 Aug 26 13:21:37.666126: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2 Aug 26 13:21:37.666128: | libevent_malloc: new ptr-libevent@0x560749abc1f8 size 128 Aug 26 13:21:37.666130: | libevent_realloc: release ptr-libevent@0x560749a54608 Aug 26 13:21:37.666132: | libevent_realloc: new ptr-libevent@0x560749abb478 size 128 Aug 26 13:21:37.666147: | stop processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) Aug 26 13:21:37.666151: | crypto helper 2 resuming Aug 26 13:21:37.666152: | resume processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) Aug 26 13:21:37.666162: | crypto helper 2 starting work-order 3 for state #2 Aug 26 13:21:37.666165: | unqueuing pending Quick Mode with 192.1.2.23 "north-a-dpd" Aug 26 13:21:37.666168: | removing pending policy for no connection {0x5607499a8898} Aug 26 13:21:37.666170: | crypto helper 2 doing build KE and nonce (quick_outI1 KE); request ID 3 Aug 26 13:21:37.666172: | close_any(fd@24) (in release_whack() at state.c:654) Aug 26 13:21:37.666178: | #1 spent 4.81 milliseconds in process_packet_tail() Aug 26 13:21:37.666183: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:21:37.666188: | stop processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 13:21:37.666191: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:21:37.666195: | spent 5.33 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:21:37.666742: | crypto helper 2 finished build KE and nonce (quick_outI1 KE); request ID 3 time elapsed 0.000576 seconds Aug 26 13:21:37.666750: | (#2) spent 0.563 milliseconds in crypto helper computing work-order 3: quick_outI1 KE (pcr) Aug 26 13:21:37.666753: | crypto helper 2 sending results from work-order 3 for state #2 to event queue Aug 26 13:21:37.666755: | scheduling resume sending helper answer for #2 Aug 26 13:21:37.666757: | libevent_malloc: new ptr-libevent@0x7f0f08003f28 size 128 Aug 26 13:21:37.666763: | crypto helper 2 waiting (nothing to do) Aug 26 13:21:37.666770: | processing resume sending helper answer for #2 Aug 26 13:21:37.666776: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:21:37.666779: | crypto helper 2 replies to request ID 3 Aug 26 13:21:37.666780: | calling continuation function 0x5607486cbb50 Aug 26 13:21:37.666782: | quick_outI1_continue for #2: calculated ke+nonce, sending I1 Aug 26 13:21:37.666786: | **emit ISAKMP Message: Aug 26 13:21:37.666788: | initiator cookie: Aug 26 13:21:37.666790: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:37.666791: | responder cookie: Aug 26 13:21:37.666793: | 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.666795: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.666797: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:21:37.666799: | exchange type: ISAKMP_XCHG_QUICK (0x20) Aug 26 13:21:37.666800: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:21:37.666802: | Message ID: 3801999333 (0xe29de7e5) Aug 26 13:21:37.666804: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:21:37.666806: | ***emit ISAKMP Hash Payload: Aug 26 13:21:37.666808: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.666810: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:21:37.666812: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.666814: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:21:37.666816: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:21:37.666818: | emitting quick defaults using policy none Aug 26 13:21:37.666820: | empty esp_info, returning defaults for ENCRYPT Aug 26 13:21:37.666823: | ***emit ISAKMP Security Association Payload: Aug 26 13:21:37.666824: | next payload type: ISAKMP_NEXT_NONCE (0xa) Aug 26 13:21:37.666826: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:21:37.666828: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE Aug 26 13:21:37.666830: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:21:37.666834: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.666836: | ****emit IPsec DOI SIT: Aug 26 13:21:37.666837: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:21:37.666839: | ikev1_out_sa pcn: 0 has 1 valid proposals Aug 26 13:21:37.666841: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2 Aug 26 13:21:37.666843: | ****emit ISAKMP Proposal Payload: Aug 26 13:21:37.666845: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.666846: | proposal number: 0 (0x0) Aug 26 13:21:37.666848: | protocol ID: PROTO_IPSEC_ESP (0x3) Aug 26 13:21:37.666850: | SPI size: 4 (0x4) Aug 26 13:21:37.666851: | number of transforms: 2 (0x2) Aug 26 13:21:37.666853: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' Aug 26 13:21:37.666867: | netlink_get_spi: allocated 0x8a4073bc for esp.0@192.1.3.33 Aug 26 13:21:37.666870: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload Aug 26 13:21:37.666872: | SPI 8a 40 73 bc Aug 26 13:21:37.666873: | *****emit ISAKMP Transform Payload (ESP): Aug 26 13:21:37.666875: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.666877: | ESP transform number: 0 (0x0) Aug 26 13:21:37.666878: | ESP transform ID: ESP_AES (0xc) Aug 26 13:21:37.666880: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' Aug 26 13:21:37.666882: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:21:37.666884: | af+type: AF+GROUP_DESCRIPTION (0x8003) Aug 26 13:21:37.666886: | length/value: 14 (0xe) Aug 26 13:21:37.666888: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:37.666889: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:21:37.666891: | af+type: AF+ENCAPSULATION_MODE (0x8004) Aug 26 13:21:37.666893: | length/value: 1 (0x1) Aug 26 13:21:37.666895: | [1 is ENCAPSULATION_MODE_TUNNEL] Aug 26 13:21:37.666896: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:21:37.666898: | af+type: AF+SA_LIFE_TYPE (0x8001) Aug 26 13:21:37.666899: | length/value: 1 (0x1) Aug 26 13:21:37.666901: | [1 is SA_LIFE_TYPE_SECONDS] Aug 26 13:21:37.666902: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:21:37.666904: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) Aug 26 13:21:37.666906: | length/value: 28800 (0x7080) Aug 26 13:21:37.666907: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:21:37.666909: | af+type: AF+AUTH_ALGORITHM (0x8005) Aug 26 13:21:37.666910: | length/value: 2 (0x2) Aug 26 13:21:37.666912: | [2 is AUTH_ALGORITHM_HMAC_SHA1] Aug 26 13:21:37.666914: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:21:37.666915: | af+type: AF+KEY_LENGTH (0x8006) Aug 26 13:21:37.666917: | length/value: 128 (0x80) Aug 26 13:21:37.666919: | emitting length of ISAKMP Transform Payload (ESP): 32 Aug 26 13:21:37.666920: | *****emit ISAKMP Transform Payload (ESP): Aug 26 13:21:37.666922: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.666923: | ESP transform number: 1 (0x1) Aug 26 13:21:37.666925: | ESP transform ID: ESP_3DES (0x3) Aug 26 13:21:37.666927: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:37.666929: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' Aug 26 13:21:37.666930: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:21:37.666932: | af+type: AF+GROUP_DESCRIPTION (0x8003) Aug 26 13:21:37.666934: | length/value: 14 (0xe) Aug 26 13:21:37.666935: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:37.666937: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:21:37.666938: | af+type: AF+ENCAPSULATION_MODE (0x8004) Aug 26 13:21:37.666940: | length/value: 1 (0x1) Aug 26 13:21:37.666941: | [1 is ENCAPSULATION_MODE_TUNNEL] Aug 26 13:21:37.666944: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:21:37.666946: | af+type: AF+SA_LIFE_TYPE (0x8001) Aug 26 13:21:37.666947: | length/value: 1 (0x1) Aug 26 13:21:37.666949: | [1 is SA_LIFE_TYPE_SECONDS] Aug 26 13:21:37.666950: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:21:37.666952: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) Aug 26 13:21:37.666953: | length/value: 28800 (0x7080) Aug 26 13:21:37.666955: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:21:37.666957: | af+type: AF+AUTH_ALGORITHM (0x8005) Aug 26 13:21:37.666958: | length/value: 2 (0x2) Aug 26 13:21:37.666960: | [2 is AUTH_ALGORITHM_HMAC_SHA1] Aug 26 13:21:37.666961: | emitting length of ISAKMP Transform Payload (ESP): 28 Aug 26 13:21:37.666963: | emitting length of ISAKMP Proposal Payload: 72 Aug 26 13:21:37.666965: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0 Aug 26 13:21:37.666966: | emitting length of ISAKMP Security Association Payload: 84 Aug 26 13:21:37.666968: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 Aug 26 13:21:37.666971: | ***emit ISAKMP Nonce Payload: Aug 26 13:21:37.666972: | next payload type: ISAKMP_NEXT_KE (0x4) Aug 26 13:21:37.666974: | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE Aug 26 13:21:37.666976: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) Aug 26 13:21:37.666978: | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.666980: | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload Aug 26 13:21:37.666982: | Ni b3 06 2a 86 d9 00 bf ab a8 c1 68 20 ae 2d a3 17 Aug 26 13:21:37.666983: | Ni 04 28 f7 04 ed a7 c8 78 b5 f5 a5 64 8f 3a 93 ae Aug 26 13:21:37.666985: | emitting length of ISAKMP Nonce Payload: 36 Aug 26 13:21:37.666987: | ***emit ISAKMP Key Exchange Payload: Aug 26 13:21:37.666989: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:21:37.666991: | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID Aug 26 13:21:37.666993: | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) Aug 26 13:21:37.666994: | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.666997: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload Aug 26 13:21:37.666998: | keyex value 77 ea c4 fe 0b 69 80 c0 38 16 80 bc 8a 85 5c a1 Aug 26 13:21:37.667000: | keyex value 04 b7 77 f5 5b f0 40 27 8c fd c1 cf 94 86 de f6 Aug 26 13:21:37.667001: | keyex value ab e6 68 3d 47 35 1c 26 d7 31 05 69 6f f3 07 b9 Aug 26 13:21:37.667003: | keyex value 52 5e 01 ef 99 a2 1b 8d bc 84 8d 0e 11 d8 c6 05 Aug 26 13:21:37.667004: | keyex value ce 10 79 0e 1d 50 8b 8f 96 b3 13 4e 88 0f 86 2f Aug 26 13:21:37.667006: | keyex value 38 ed 13 b4 07 1a c5 48 4f 83 8b 1c 32 a0 e2 2e Aug 26 13:21:37.667007: | keyex value a6 11 d7 c2 4c c1 cf 24 64 62 b3 e8 8c 8c e7 69 Aug 26 13:21:37.667009: | keyex value 94 c3 a6 5a ca 75 51 64 cd c7 91 d1 1a 1c a4 ec Aug 26 13:21:37.667010: | keyex value bf 17 ee 4d ec fd 48 e1 15 a7 49 60 20 a9 03 3d Aug 26 13:21:37.667012: | keyex value ea bd 2d aa e0 55 c2 ef e5 06 8b f6 e1 55 44 17 Aug 26 13:21:37.667014: | keyex value 78 96 7a fd 75 65 a2 66 6f 9f 15 03 cd e2 30 d9 Aug 26 13:21:37.667015: | keyex value fa be 15 7d f5 4d 07 4c 4c b6 f8 fe c9 9f 5c ac Aug 26 13:21:37.667017: | keyex value 70 30 37 c3 eb 09 2d 84 32 60 f0 7c 19 57 e8 89 Aug 26 13:21:37.667018: | keyex value a3 5c c9 62 b9 61 e1 3e 4c f0 5b 6b 8f 7d a5 59 Aug 26 13:21:37.667020: | keyex value 7e d4 2d 66 3c 5e 4e d3 a9 cc 70 97 2f c2 a4 1e Aug 26 13:21:37.667024: | keyex value 88 b0 86 64 39 0f db 92 d9 eb 02 87 84 cd 18 de Aug 26 13:21:37.667025: | emitting length of ISAKMP Key Exchange Payload: 260 Aug 26 13:21:37.667027: | ***emit ISAKMP Identification Payload (IPsec DOI): Aug 26 13:21:37.667029: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:21:37.667031: | ID type: ID_IPV4_ADDR_SUBNET (0x4) Aug 26 13:21:37.667032: | Protocol ID: 0 (0x0) Aug 26 13:21:37.667034: | port: 0 (0x0) Aug 26 13:21:37.667036: | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID Aug 26 13:21:37.667038: | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) Aug 26 13:21:37.667040: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' Aug 26 13:21:37.667042: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:21:37.667043: | client network c0 00 03 00 Aug 26 13:21:37.667046: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:21:37.667047: | client mask ff ff ff 00 Aug 26 13:21:37.667049: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 Aug 26 13:21:37.667050: | ***emit ISAKMP Identification Payload (IPsec DOI): Aug 26 13:21:37.667052: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.667053: | ID type: ID_IPV4_ADDR_SUBNET (0x4) Aug 26 13:21:37.667055: | Protocol ID: 0 (0x0) Aug 26 13:21:37.667056: | port: 0 (0x0) Aug 26 13:21:37.667058: | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) Aug 26 13:21:37.667060: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' Aug 26 13:21:37.667062: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:21:37.667064: | client network c0 00 16 00 Aug 26 13:21:37.667065: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:21:37.667067: | client mask ff ff ff 00 Aug 26 13:21:37.667068: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 Aug 26 13:21:37.667085: | outI1 HASH(1): Aug 26 13:21:37.667087: | e5 cc ee c9 5d 98 7b 69 d1 fe 5c 10 75 7a ed a4 Aug 26 13:21:37.667089: | d0 84 b2 9a d6 bf 25 a5 d5 43 a2 56 6a 0c ea f3 Aug 26 13:21:37.667094: | no IKEv1 message padding required Aug 26 13:21:37.667096: | emitting length of ISAKMP Message: 476 Aug 26 13:21:37.667107: | sending 476 bytes for reply packet from quick_outI1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #2) Aug 26 13:21:37.667109: | b2 8a 78 70 6d 40 cb f8 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.667110: | 08 10 20 01 e2 9d e7 e5 00 00 01 dc 28 97 e5 74 Aug 26 13:21:37.667112: | c5 2d 92 c4 d2 7e 98 14 c4 d1 fc 19 06 c9 01 20 Aug 26 13:21:37.667113: | 90 c7 ed 1d 64 fa 3a d0 34 28 f3 d3 02 c0 be 2e Aug 26 13:21:37.667115: | 3a 70 68 cb 07 1c 82 5c 2c 80 8f 29 d2 b3 7b 58 Aug 26 13:21:37.667116: | a8 82 ba bc c5 92 9a 9f a8 66 aa 59 57 5a a6 96 Aug 26 13:21:37.667118: | 09 ac e0 b3 e5 f8 ec 70 a7 4b c9 16 f7 bc ba b0 Aug 26 13:21:37.667119: | 22 87 f5 a4 22 dd fe 38 43 14 28 26 9e 12 93 32 Aug 26 13:21:37.667121: | 87 cf 45 63 7b e4 5a 96 a4 42 78 56 b8 e7 b3 50 Aug 26 13:21:37.667122: | 15 df 0c ef a0 96 c1 ed c4 77 60 6d 35 6c a2 4b Aug 26 13:21:37.667124: | 3e 92 98 13 7e 1e 05 a5 b1 4f f1 44 9d 4d 8f 6e Aug 26 13:21:37.667125: | f9 cf 50 b9 59 79 dd 6d 6a 77 3f 65 b9 a7 b7 60 Aug 26 13:21:37.667127: | ed d6 7c 97 de ff f8 00 56 7d 83 64 8f 83 ce ad Aug 26 13:21:37.667128: | 8d db 76 a6 d5 6c 88 f1 af 53 17 05 b9 3a 6b ce Aug 26 13:21:37.667129: | 40 26 5f c9 e0 8c 7b b6 9a 80 1f 76 a9 b4 85 63 Aug 26 13:21:37.667132: | 90 aa 8e 53 55 dc 1e b2 5e 2f e9 3b 40 db b7 23 Aug 26 13:21:37.667134: | 03 a1 01 e5 5e 13 75 7e e2 79 21 0e 66 ec 06 b6 Aug 26 13:21:37.667135: | b0 d4 b9 ab 7b 17 a0 15 c8 77 4a 0c a3 3d cf 96 Aug 26 13:21:37.667137: | dd bb 72 b6 04 33 49 4a c8 70 8e 5c 69 11 90 06 Aug 26 13:21:37.667138: | 2b d2 cc 11 e4 0b 81 0b 28 9e a4 5b e6 84 6b 9d Aug 26 13:21:37.667140: | b4 97 37 d1 02 fe 13 01 dd be 6c 60 df 8f 5b 9c Aug 26 13:21:37.667141: | c7 e0 b9 cf 0b 00 16 99 1f 47 98 4b eb 2d e3 5a Aug 26 13:21:37.667143: | 1a 64 f4 41 4e d6 a9 89 63 45 85 33 9f cc d7 1a Aug 26 13:21:37.667144: | dd 66 09 bd c1 3c da f5 36 2c 63 ea 83 8c cb 47 Aug 26 13:21:37.667146: | 3e 97 35 f6 44 6e 28 71 23 ab 58 90 6b d8 4b 40 Aug 26 13:21:37.667147: | 3b 31 29 ad 4d 0e 59 e6 8a 84 10 99 0f 74 b3 b3 Aug 26 13:21:37.667149: | 8d 71 32 29 aa 75 66 31 3e a8 dd 65 55 ac 20 2e Aug 26 13:21:37.667150: | 2b 13 85 f9 07 05 42 5a c7 e6 82 d2 a6 f0 de 94 Aug 26 13:21:37.667152: | 20 1f 07 d8 99 8a 6f c0 f9 41 20 68 a8 96 89 0f Aug 26 13:21:37.667153: | 0d f9 d9 b7 ba fc 38 e3 d7 47 f8 9e Aug 26 13:21:37.667195: | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:21:37.667199: | libevent_free: release ptr-libevent@0x560749abc1f8 Aug 26 13:21:37.667201: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x560749ac97d8 Aug 26 13:21:37.667203: | event_schedule: new EVENT_RETRANSMIT-pe@0x560749ac97d8 Aug 26 13:21:37.667206: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #2 Aug 26 13:21:37.667208: | libevent_malloc: new ptr-libevent@0x560749ad3ba8 size 128 Aug 26 13:21:37.667211: | #2 STATE_QUICK_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10983.40967 Aug 26 13:21:37.667218: | resume sending helper answer for #2 suppresed complete_v1_state_transition() Aug 26 13:21:37.667222: | #2 spent 0.418 milliseconds in resume sending helper answer Aug 26 13:21:37.667226: | stop processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:21:37.667230: | libevent_free: release ptr-libevent@0x7f0f08003f28 Aug 26 13:21:37.669840: | spent 0.00259 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:21:37.669861: | *received 460 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Aug 26 13:21:37.669865: | b2 8a 78 70 6d 40 cb f8 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.669868: | 08 10 20 01 e2 9d e7 e5 00 00 01 cc 3d 2b 49 fa Aug 26 13:21:37.669871: | 0a fe 28 7d 18 2b f2 cb c3 70 a3 2d b2 17 67 45 Aug 26 13:21:37.669874: | fc 62 aa 8b d8 c0 54 69 47 55 54 9d f1 ae 18 57 Aug 26 13:21:37.669877: | fc 52 33 6b e4 2d 23 ed 18 66 61 c5 98 09 67 87 Aug 26 13:21:37.669880: | dd 30 c4 63 7a 8b 6d 41 f2 80 ab 56 ea 1b 54 13 Aug 26 13:21:37.669883: | d4 1c bc d0 d6 8d 8e 29 84 9b 56 db 83 ad 3a 3d Aug 26 13:21:37.669885: | 20 38 3f 6c f7 a7 da f2 b0 47 88 c2 8c ae a7 5f Aug 26 13:21:37.669886: | 43 68 be 5e 11 e9 50 86 af 64 47 75 52 bd 00 3e Aug 26 13:21:37.669888: | cc 7c e0 fa cb 09 fa 15 05 a6 24 e8 23 76 7f 3a Aug 26 13:21:37.669889: | 7e 64 79 ba e6 c6 ac 13 46 4f 3d 30 29 ee 0c 79 Aug 26 13:21:37.669891: | 52 65 11 3b 21 37 40 c9 a3 8b 8a a9 30 08 63 30 Aug 26 13:21:37.669892: | a4 c5 b6 3a 18 46 48 8f b6 48 7d 19 ce b4 45 d7 Aug 26 13:21:37.669894: | 99 a4 09 8f 4a 66 17 ad 93 5e c5 cf 24 43 27 0d Aug 26 13:21:37.669895: | 60 75 fa 5c 57 bb 4f 42 0c 03 81 ae 96 28 ab e6 Aug 26 13:21:37.669897: | c2 80 eb 30 0b 87 a4 9f bf 8f b2 34 05 8d de 59 Aug 26 13:21:37.669898: | 22 89 2b 44 48 a4 89 7e c1 a7 96 16 3f ec 25 55 Aug 26 13:21:37.669900: | 94 73 8b a5 e4 05 f3 9a fe d0 75 ce 53 44 66 55 Aug 26 13:21:37.669901: | 27 54 a6 a5 58 2e 49 6e 6d 88 53 67 c9 16 17 2e Aug 26 13:21:37.669903: | fb 26 6a 5c 8a 91 8e 70 83 af ef 59 75 be 7a c9 Aug 26 13:21:37.669904: | 2e 32 6f f9 19 2d b1 3f 91 f5 df 6c 2d 97 9a 6e Aug 26 13:21:37.669908: | c3 71 36 fd 82 c7 2f 09 ad c6 ec 8d 14 99 c7 2f Aug 26 13:21:37.669910: | ae ab a7 55 ef 5d 2f f1 52 94 1c 7e 67 17 46 ea Aug 26 13:21:37.669911: | 5b dc 1f 70 64 02 35 ab ed ac b3 dc 04 94 5d eb Aug 26 13:21:37.669913: | 57 41 02 9f 78 52 1c 55 91 51 09 fa e6 fa 70 fc Aug 26 13:21:37.669914: | 59 4d 79 fe 6e 34 15 2d 11 cf e6 02 0d fd dc be Aug 26 13:21:37.669916: | fd fa e4 89 2e 5d b7 55 9e 78 a4 d3 c3 42 f4 12 Aug 26 13:21:37.669917: | 3e cb c9 5f 48 9a 0e 9c 2d c5 4e f1 61 06 d9 cd Aug 26 13:21:37.669919: | a3 79 69 60 f3 71 2e 84 bc 6d 33 07 Aug 26 13:21:37.669922: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:21:37.669924: | **parse ISAKMP Message: Aug 26 13:21:37.669926: | initiator cookie: Aug 26 13:21:37.669927: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:37.669929: | responder cookie: Aug 26 13:21:37.669930: | 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.669932: | next payload type: ISAKMP_NEXT_HASH (0x8) Aug 26 13:21:37.669934: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:21:37.669936: | exchange type: ISAKMP_XCHG_QUICK (0x20) Aug 26 13:21:37.669937: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:21:37.669939: | Message ID: 3801999333 (0xe29de7e5) Aug 26 13:21:37.669941: | length: 460 (0x1cc) Aug 26 13:21:37.669943: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32) Aug 26 13:21:37.669945: | State DB: found IKEv1 state #2 in QUICK_I1 (find_state_ikev1) Aug 26 13:21:37.669948: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1633) Aug 26 13:21:37.669950: | #2 is idle Aug 26 13:21:37.669952: | #2 idle Aug 26 13:21:37.669954: | received encrypted packet from 192.1.2.23:500 Aug 26 13:21:37.669964: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030 Aug 26 13:21:37.669966: | ***parse ISAKMP Hash Payload: Aug 26 13:21:37.669968: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:21:37.669970: | length: 36 (0x24) Aug 26 13:21:37.669972: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030 Aug 26 13:21:37.669973: | ***parse ISAKMP Security Association Payload: Aug 26 13:21:37.669975: | next payload type: ISAKMP_NEXT_NONCE (0xa) Aug 26 13:21:37.669977: | length: 56 (0x38) Aug 26 13:21:37.669978: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:21:37.669980: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030 Aug 26 13:21:37.669982: | ***parse ISAKMP Nonce Payload: Aug 26 13:21:37.669983: | next payload type: ISAKMP_NEXT_KE (0x4) Aug 26 13:21:37.669985: | length: 36 (0x24) Aug 26 13:21:37.669987: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030 Aug 26 13:21:37.669988: | ***parse ISAKMP Key Exchange Payload: Aug 26 13:21:37.669990: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:21:37.669991: | length: 260 (0x104) Aug 26 13:21:37.669993: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 Aug 26 13:21:37.669995: | ***parse ISAKMP Identification Payload (IPsec DOI): Aug 26 13:21:37.669996: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:21:37.669998: | length: 16 (0x10) Aug 26 13:21:37.669999: | ID type: ID_IPV4_ADDR_SUBNET (0x4) Aug 26 13:21:37.670001: | Protocol ID: 0 (0x0) Aug 26 13:21:37.670003: | port: 0 (0x0) Aug 26 13:21:37.670004: | obj: c0 00 03 00 ff ff ff 00 Aug 26 13:21:37.670006: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 Aug 26 13:21:37.670008: | ***parse ISAKMP Identification Payload (IPsec DOI): Aug 26 13:21:37.670009: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.670011: | length: 16 (0x10) Aug 26 13:21:37.670012: | ID type: ID_IPV4_ADDR_SUBNET (0x4) Aug 26 13:21:37.670014: | Protocol ID: 0 (0x0) Aug 26 13:21:37.670015: | port: 0 (0x0) Aug 26 13:21:37.670017: | obj: c0 00 16 00 ff ff ff 00 Aug 26 13:21:37.670018: | removing 12 bytes of padding Aug 26 13:21:37.670033: | quick_inR1_outI2 HASH(2): Aug 26 13:21:37.670036: | 45 f9 22 61 77 32 a9 db c5 25 d9 13 61 8d 6f 53 Aug 26 13:21:37.670038: | 37 35 59 1d 3b 55 48 14 b0 c5 ba dc 35 c5 c8 35 Aug 26 13:21:37.670040: | received 'quick_inR1_outI2' message HASH(2) data ok Aug 26 13:21:37.670043: | ****parse IPsec DOI SIT: Aug 26 13:21:37.670044: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:21:37.670046: | ****parse ISAKMP Proposal Payload: Aug 26 13:21:37.670048: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.670049: | length: 44 (0x2c) Aug 26 13:21:37.670051: | proposal number: 0 (0x0) Aug 26 13:21:37.670053: | protocol ID: PROTO_IPSEC_ESP (0x3) Aug 26 13:21:37.670054: | SPI size: 4 (0x4) Aug 26 13:21:37.670056: | number of transforms: 1 (0x1) Aug 26 13:21:37.670058: | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI Aug 26 13:21:37.670059: | SPI 87 49 26 28 Aug 26 13:21:37.670061: | *****parse ISAKMP Transform Payload (ESP): Aug 26 13:21:37.670063: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.670064: | length: 32 (0x20) Aug 26 13:21:37.670066: | ESP transform number: 0 (0x0) Aug 26 13:21:37.670067: | ESP transform ID: ESP_AES (0xc) Aug 26 13:21:37.670069: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:21:37.670071: | af+type: AF+GROUP_DESCRIPTION (0x8003) Aug 26 13:21:37.670073: | length/value: 14 (0xe) Aug 26 13:21:37.670074: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:37.670076: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:21:37.670078: | af+type: AF+ENCAPSULATION_MODE (0x8004) Aug 26 13:21:37.670080: | length/value: 1 (0x1) Aug 26 13:21:37.670081: | [1 is ENCAPSULATION_MODE_TUNNEL] Aug 26 13:21:37.670083: | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none Aug 26 13:21:37.670085: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:21:37.670086: | af+type: AF+SA_LIFE_TYPE (0x8001) Aug 26 13:21:37.670088: | length/value: 1 (0x1) Aug 26 13:21:37.670089: | [1 is SA_LIFE_TYPE_SECONDS] Aug 26 13:21:37.670091: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:21:37.670093: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) Aug 26 13:21:37.670094: | length/value: 28800 (0x7080) Aug 26 13:21:37.670096: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:21:37.670098: | af+type: AF+AUTH_ALGORITHM (0x8005) Aug 26 13:21:37.670099: | length/value: 2 (0x2) Aug 26 13:21:37.670101: | [2 is AUTH_ALGORITHM_HMAC_SHA1] Aug 26 13:21:37.670103: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:21:37.670104: | af+type: AF+KEY_LENGTH (0x8006) Aug 26 13:21:37.670106: | length/value: 128 (0x80) Aug 26 13:21:37.670108: | ESP IPsec Transform verified unconditionally; no alg_info to check against Aug 26 13:21:37.670117: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK Aug 26 13:21:37.670121: | actually looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK Aug 26 13:21:37.670127: | line 0: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA Aug 26 13:21:37.670130: | line 1: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA Aug 26 13:21:37.670132: | concluding with best_match=000 best=(nil) (lineno=-1) Aug 26 13:21:37.670133: | no PreShared Key Found Aug 26 13:21:37.670136: | adding quick outI2 DH work-order 4 for state #2 Aug 26 13:21:37.670138: | state #2 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:21:37.670141: | #2 STATE_QUICK_I1: retransmits: cleared Aug 26 13:21:37.670143: | libevent_free: release ptr-libevent@0x560749ad3ba8 Aug 26 13:21:37.670145: | free_event_entry: release EVENT_RETRANSMIT-pe@0x560749ac97d8 Aug 26 13:21:37.670147: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x560749ac97d8 Aug 26 13:21:37.670150: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2 Aug 26 13:21:37.670152: | libevent_malloc: new ptr-libevent@0x7f0f08003f28 size 128 Aug 26 13:21:37.670158: | complete v1 state transition with STF_SUSPEND Aug 26 13:21:37.670162: | [RE]START processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) Aug 26 13:21:37.670163: | suspending state #2 and saving MD Aug 26 13:21:37.670165: | #2 is busy; has a suspended MD Aug 26 13:21:37.670168: | #2 spent 0.125 milliseconds in process_packet_tail() Aug 26 13:21:37.670171: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:21:37.670174: | stop processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 13:21:37.670176: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:21:37.670179: | spent 0.327 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:21:37.670189: | crypto helper 3 resuming Aug 26 13:21:37.670198: | crypto helper 3 starting work-order 4 for state #2 Aug 26 13:21:37.670202: | crypto helper 3 doing compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 4 Aug 26 13:21:37.670743: | crypto helper 3 finished compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 4 time elapsed 0.000541 seconds Aug 26 13:21:37.670752: | (#2) spent 0.539 milliseconds in crypto helper computing work-order 4: quick outI2 DH (pcr) Aug 26 13:21:37.670754: | crypto helper 3 sending results from work-order 4 for state #2 to event queue Aug 26 13:21:37.670756: | scheduling resume sending helper answer for #2 Aug 26 13:21:37.670759: | libevent_malloc: new ptr-libevent@0x7f0efc001f78 size 128 Aug 26 13:21:37.670764: | crypto helper 3 waiting (nothing to do) Aug 26 13:21:37.670798: | processing resume sending helper answer for #2 Aug 26 13:21:37.670807: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:21:37.670811: | crypto helper 3 replies to request ID 4 Aug 26 13:21:37.670813: | calling continuation function 0x5607486cbb50 Aug 26 13:21:37.670815: | quick_inR1_outI2_continue for #2: calculated ke+nonce, calculating DH Aug 26 13:21:37.670818: | **emit ISAKMP Message: Aug 26 13:21:37.670820: | initiator cookie: Aug 26 13:21:37.670822: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:37.670823: | responder cookie: Aug 26 13:21:37.670825: | 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.670827: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.670829: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:21:37.670830: | exchange type: ISAKMP_XCHG_QUICK (0x20) Aug 26 13:21:37.670832: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:21:37.670834: | Message ID: 3801999333 (0xe29de7e5) Aug 26 13:21:37.670836: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:21:37.670838: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address Aug 26 13:21:37.670840: | ID address c0 00 03 00 Aug 26 13:21:37.670842: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask Aug 26 13:21:37.670843: | ID mask ff ff ff 00 Aug 26 13:21:37.670846: | our client is subnet 192.0.3.0/24 Aug 26 13:21:37.670848: | our client protocol/port is 0/0 Aug 26 13:21:37.670850: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address Aug 26 13:21:37.670851: | ID address c0 00 16 00 Aug 26 13:21:37.670853: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask Aug 26 13:21:37.670854: | ID mask ff ff ff 00 Aug 26 13:21:37.670857: | peer client is subnet 192.0.22.0/24 Aug 26 13:21:37.670860: | peer client protocol/port is 0/0 Aug 26 13:21:37.670862: | ***emit ISAKMP Hash Payload: Aug 26 13:21:37.670864: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:37.670866: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:21:37.670868: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' Aug 26 13:21:37.670870: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:21:37.670872: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:21:37.670887: | quick_inR1_outI2 HASH(3): Aug 26 13:21:37.670889: | e3 d8 30 06 d1 d8 6a 1a a0 04 22 48 34 55 fb d0 Aug 26 13:21:37.670891: | 42 1f 8d ff 6d 07 bc 18 b8 a5 4f 04 7d c0 b1 14 Aug 26 13:21:37.670893: | compute_proto_keymat: needed_len (after ESP enc)=16 Aug 26 13:21:37.670894: | compute_proto_keymat: needed_len (after ESP auth)=36 Aug 26 13:21:37.670959: | install_ipsec_sa() for #2: inbound and outbound Aug 26 13:21:37.670962: | could_route called for north-a-dpd (kind=CK_PERMANENT) Aug 26 13:21:37.670964: | FOR_EACH_CONNECTION_... in route_owner Aug 26 13:21:37.670966: | conn north-a-dpd mark 0/00000000, 0/00000000 vs Aug 26 13:21:37.670968: | conn north-a-dpd mark 0/00000000, 0/00000000 Aug 26 13:21:37.670969: | conn north-a-dpd mark 0/00000000, 0/00000000 vs Aug 26 13:21:37.670971: | conn northnet-eastnet-b mark 0/00000000, 0/00000000 Aug 26 13:21:37.670974: | route owner of "north-a-dpd" unrouted: NULL; eroute owner: NULL Aug 26 13:21:37.670976: | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 Aug 26 13:21:37.670978: | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 Aug 26 13:21:37.670980: | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 Aug 26 13:21:37.670983: | setting IPsec SA replay-window to 32 Aug 26 13:21:37.670985: | NIC esp-hw-offload not for connection 'north-a-dpd' not available on interface eth1 Aug 26 13:21:37.670987: | netlink: enabling tunnel mode Aug 26 13:21:37.670988: | netlink: setting IPsec SA replay-window to 32 using old-style req Aug 26 13:21:37.670990: | netlink: esp-hw-offload not set for IPsec SA Aug 26 13:21:37.671031: | netlink response for Add SA esp.87492628@192.1.2.23 included non-error error Aug 26 13:21:37.671035: | set up outgoing SA, ref=0/0 Aug 26 13:21:37.671039: | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 Aug 26 13:21:37.671042: | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 Aug 26 13:21:37.671044: | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 Aug 26 13:21:37.671048: | setting IPsec SA replay-window to 32 Aug 26 13:21:37.671051: | NIC esp-hw-offload not for connection 'north-a-dpd' not available on interface eth1 Aug 26 13:21:37.671054: | netlink: enabling tunnel mode Aug 26 13:21:37.671057: | netlink: setting IPsec SA replay-window to 32 using old-style req Aug 26 13:21:37.671059: | netlink: esp-hw-offload not set for IPsec SA Aug 26 13:21:37.671086: | netlink response for Add SA esp.8a4073bc@192.1.3.33 included non-error error Aug 26 13:21:37.671090: | priority calculation of connection "north-a-dpd" is 0xfe7e7 Aug 26 13:21:37.671094: | add inbound eroute 192.0.22.0/24:0 --0-> 192.0.3.0/24:0 => tun.10000@192.1.3.33 (raw_eroute) Aug 26 13:21:37.671096: | IPsec Sa SPD priority set to 1042407 Aug 26 13:21:37.671115: | raw_eroute result=success Aug 26 13:21:37.671117: | set up incoming SA, ref=0/0 Aug 26 13:21:37.671119: | sr for #2: unrouted Aug 26 13:21:37.671121: | route_and_eroute() for proto 0, and source port 0 dest port 0 Aug 26 13:21:37.671123: | FOR_EACH_CONNECTION_... in route_owner Aug 26 13:21:37.671124: | conn north-a-dpd mark 0/00000000, 0/00000000 vs Aug 26 13:21:37.671126: | conn north-a-dpd mark 0/00000000, 0/00000000 Aug 26 13:21:37.671128: | conn north-a-dpd mark 0/00000000, 0/00000000 vs Aug 26 13:21:37.671130: | conn northnet-eastnet-b mark 0/00000000, 0/00000000 Aug 26 13:21:37.671134: | route owner of "north-a-dpd" unrouted: NULL; eroute owner: NULL Aug 26 13:21:37.671136: | route_and_eroute with c: north-a-dpd (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #2 Aug 26 13:21:37.671138: | priority calculation of connection "north-a-dpd" is 0xfe7e7 Aug 26 13:21:37.671143: | eroute_connection add eroute 192.0.3.0/24:0 --0-> 192.0.22.0/24:0 => tun.0@192.1.2.23 (raw_eroute) Aug 26 13:21:37.671144: | IPsec Sa SPD priority set to 1042407 Aug 26 13:21:37.671153: | raw_eroute result=success Aug 26 13:21:37.671155: | running updown command "ipsec _updown" for verb up Aug 26 13:21:37.671157: | command executing up-client Aug 26 13:21:37.671174: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:21:37.671178: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:21:37.671190: | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENC Aug 26 13:21:37.671193: | popen cmd is 1398 chars long Aug 26 13:21:37.671195: | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_: Aug 26 13:21:37.671196: | cmd( 80):INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID=: Aug 26 13:21:37.671198: | cmd( 160):'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.: Aug 26 13:21:37.671200: | cmd( 240):libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24: Aug 26 13:21:37.671201: | cmd( 320):' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_: Aug 26 13:21:37.671203: | cmd( 400):PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_: Aug 26 13:21:37.671205: | cmd( 480):PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Te: Aug 26 13:21:37.671206: | cmd( 560):st Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org': Aug 26 13:21:37.671208: | cmd( 640): PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER: Aug 26 13:21:37.671210: | cmd( 720):_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_P: Aug 26 13:21:37.671211: | cmd( 800):EER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libresw: Aug 26 13:21:37.671213: | cmd( 880):an test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTI: Aug 26 13:21:37.671215: | cmd( 960):ME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+I: Aug 26 13:21:37.671216: | cmd(1040):KE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4: Aug 26 13:21:37.671218: | cmd(1120):' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAI: Aug 26 13:21:37.671220: | cmd(1200):N_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_N: Aug 26 13:21:37.671221: | cmd(1280):M_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x87492628: Aug 26 13:21:37.671226: | cmd(1360): SPI_OUT=0x8a4073bc ipsec _updown 2>&1: Aug 26 13:21:37.679198: | route_and_eroute: firewall_notified: true Aug 26 13:21:37.679212: | running updown command "ipsec _updown" for verb prepare Aug 26 13:21:37.679215: | command executing prepare-client Aug 26 13:21:37.679237: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:21:37.679241: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:21:37.679257: | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY=' Aug 26 13:21:37.679260: | popen cmd is 1403 chars long Aug 26 13:21:37.679262: | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' P: Aug 26 13:21:37.679264: | cmd( 80):LUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_M: Aug 26 13:21:37.679266: | cmd( 160):Y_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.tes: Aug 26 13:21:37.679267: | cmd( 240):ting.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3: Aug 26 13:21:37.679269: | cmd( 320):.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUT: Aug 26 13:21:37.679271: | cmd( 400):O_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' P: Aug 26 13:21:37.679272: | cmd( 480):LUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, : Aug 26 13:21:37.679274: | cmd( 560):OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan: Aug 26 13:21:37.679276: | cmd( 640):.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO: Aug 26 13:21:37.679277: | cmd( 720):_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PL: Aug 26 13:21:37.679279: | cmd( 800):UTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Li: Aug 26 13:21:37.679281: | cmd( 880):breswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_: Aug 26 13:21:37.679282: | cmd( 960):ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TR: Aug 26 13:21:37.679284: | cmd(1040):ACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY=: Aug 26 13:21:37.679286: | cmd(1120):'ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_: Aug 26 13:21:37.679287: | cmd(1200):DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PL: Aug 26 13:21:37.679296: | cmd(1280):UTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x874: Aug 26 13:21:37.679297: | cmd(1360):92628 SPI_OUT=0x8a4073bc ipsec _updown 2>&1: Aug 26 13:21:37.688412: | running updown command "ipsec _updown" for verb route Aug 26 13:21:37.688435: | command executing route-client Aug 26 13:21:37.688470: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:21:37.688481: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:21:37.688503: | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSAS Aug 26 13:21:37.688507: | popen cmd is 1401 chars long Aug 26 13:21:37.688510: | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLU: Aug 26 13:21:37.688513: | cmd( 80):TO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_: Aug 26 13:21:37.688516: | cmd( 160):ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testi: Aug 26 13:21:37.688519: | cmd( 240):ng.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0: Aug 26 13:21:37.688522: | cmd( 320):/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_: Aug 26 13:21:37.688524: | cmd( 400):MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLU: Aug 26 13:21:37.688527: | cmd( 480):TO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU: Aug 26 13:21:37.688530: | cmd( 560):=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.o: Aug 26 13:21:37.688533: | cmd( 640):rg' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_P: Aug 26 13:21:37.688535: | cmd( 720):EER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUT: Aug 26 13:21:37.688538: | cmd( 800):O_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libr: Aug 26 13:21:37.688541: | cmd( 880):eswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_AD: Aug 26 13:21:37.688544: | cmd( 960):DTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRAC: Aug 26 13:21:37.688547: | cmd(1040):K+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='i: Aug 26 13:21:37.688550: | cmd(1120):pv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DO: Aug 26 13:21:37.688552: | cmd(1200):MAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUT: Aug 26 13:21:37.688555: | cmd(1280):O_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x87492: Aug 26 13:21:37.688558: | cmd(1360):628 SPI_OUT=0x8a4073bc ipsec _updown 2>&1: Aug 26 13:21:37.698238: | route_and_eroute: instance "north-a-dpd", setting eroute_owner {spd=0x560749abaf38,sr=0x560749abaf38} to #2 (was #0) (newest_ipsec_sa=#0) Aug 26 13:21:37.698314: | #1 spent 1.72 milliseconds in install_ipsec_sa() Aug 26 13:21:37.698320: | emitting 12 zero bytes of encryption padding into ISAKMP Message Aug 26 13:21:37.698327: | no IKEv1 message padding required Aug 26 13:21:37.698329: | emitting length of ISAKMP Message: 76 Aug 26 13:21:37.698363: | inR1_outI2: instance north-a-dpd[0], setting IKEv1 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1 Aug 26 13:21:37.698366: | DPD: dpd_init() called on IPsec SA Aug 26 13:21:37.698371: | State DB: found IKEv1 state #1 in MAIN_I4 (find_state_ikev1) Aug 26 13:21:37.698375: | event_schedule: new EVENT_DPD-pe@0x7f0f08004218 Aug 26 13:21:37.698378: | inserting event EVENT_DPD, timeout in 3 seconds for #2 Aug 26 13:21:37.698381: | libevent_malloc: new ptr-libevent@0x560749abc1f8 size 128 Aug 26 13:21:37.698390: | complete v1 state transition with STF_OK Aug 26 13:21:37.698395: | [RE]START processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:21:37.698397: | #2 is idle Aug 26 13:21:37.698399: | doing_xauth:no, t_xauth_client_done:no Aug 26 13:21:37.698402: | IKEv1: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 Aug 26 13:21:37.698404: | child state #2: QUICK_I1(established CHILD SA) => QUICK_I2(established CHILD SA) Aug 26 13:21:37.698406: | event_already_set, deleting event Aug 26 13:21:37.698408: | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:21:37.698412: | libevent_free: release ptr-libevent@0x7f0f08003f28 Aug 26 13:21:37.698416: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x560749ac97d8 Aug 26 13:21:37.698424: | sending reply packet to 192.1.2.23:500 (from 192.1.3.33:500) Aug 26 13:21:37.698431: | sending 76 bytes for STATE_QUICK_I1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #2) Aug 26 13:21:37.698433: | b2 8a 78 70 6d 40 cb f8 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:37.698435: | 08 10 20 01 e2 9d e7 e5 00 00 00 4c 5d d4 13 99 Aug 26 13:21:37.698436: | a8 16 3c 3a 39 07 6f aa 64 ec 1e be 34 7b 5b 5b Aug 26 13:21:37.698438: | 24 c7 e0 dd 46 a7 e4 46 58 c9 42 5b b0 01 9b 87 Aug 26 13:21:37.698439: | a5 54 60 68 45 56 a9 03 5d a0 08 58 Aug 26 13:21:37.698472: | !event_already_set at reschedule Aug 26 13:21:37.698475: | event_schedule: new EVENT_SA_REPLACE-pe@0x560749ac97d8 Aug 26 13:21:37.698478: | inserting event EVENT_SA_REPLACE, timeout in 28048 seconds for #2 Aug 26 13:21:37.698480: | libevent_malloc: new ptr-libevent@0x7f0f08003f28 size 128 Aug 26 13:21:37.698482: | pstats #2 ikev1.ipsec established Aug 26 13:21:37.698487: | NAT-T: encaps is 'auto' Aug 26 13:21:37.698490: "north-a-dpd" #2: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x87492628 <0x8a4073bc xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=active} Aug 26 13:21:37.698497: | modecfg pull: noquirk policy:push not-client Aug 26 13:21:37.698499: | phase 1 is done, looking for phase 2 to unpend Aug 26 13:21:37.698504: | close_any(fd@25) (in release_whack() at state.c:654) Aug 26 13:21:37.698511: | resume sending helper answer for #2 suppresed complete_v1_state_transition() Aug 26 13:21:37.698516: | #2 spent 2.05 milliseconds in resume sending helper answer Aug 26 13:21:37.698519: | stop processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:21:37.698523: | libevent_free: release ptr-libevent@0x7f0efc001f78 Aug 26 13:21:37.698534: | processing signal PLUTO_SIGCHLD Aug 26 13:21:37.698538: | waitpid returned ECHILD (no child processes left) Aug 26 13:21:37.698541: | spent 0.00369 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 13:21:37.698543: | processing signal PLUTO_SIGCHLD Aug 26 13:21:37.698545: | waitpid returned ECHILD (no child processes left) Aug 26 13:21:37.698548: | spent 0.0024 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 13:21:37.698549: | processing signal PLUTO_SIGCHLD Aug 26 13:21:37.698552: | waitpid returned ECHILD (no child processes left) Aug 26 13:21:37.698554: | spent 0.00235 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 13:21:39.908229: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:21:39.908422: | FOR_EACH_STATE_... in show_traffic_status (sort_states) Aug 26 13:21:39.908431: | FOR_EACH_STATE_... in sort_states Aug 26 13:21:39.908456: | get_sa_info esp.8a4073bc@192.1.3.33 Aug 26 13:21:39.908487: | get_sa_info esp.87492628@192.1.2.23 Aug 26 13:21:39.908512: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:21:39.908523: | spent 0.301 milliseconds in whack Aug 26 13:21:40.012244: | kernel_process_msg_cb process netlink message Aug 26 13:21:40.012557: | netlink_get: XFRM_MSG_EXPIRE message Aug 26 13:21:40.012572: | spent 0.29 milliseconds in kernel message Aug 26 13:21:40.673254: | timer_event_cb: processing event@0x7f0f08004218 Aug 26 13:21:40.673269: | handling event EVENT_DPD for child state #2 Aug 26 13:21:40.673275: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:21:40.673279: | [RE]START processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) Aug 26 13:21:40.673281: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:21:40.673284: | DPD: processing for state #2 ("north-a-dpd") Aug 26 13:21:40.673293: | get_sa_info esp.8a4073bc@192.1.3.33 Aug 26 13:21:40.673309: | event_schedule: new EVENT_DPD-pe@0x560749a54608 Aug 26 13:21:40.673313: | inserting event EVENT_DPD, timeout in 3 seconds for #2 Aug 26 13:21:40.673316: | libevent_malloc: new ptr-libevent@0x7f0efc001f78 size 128 Aug 26 13:21:40.673343: | DPD: scheduling timeout to 10 Aug 26 13:21:40.673347: | event_schedule: new EVENT_DPD_TIMEOUT-pe@0x7f0f0c002b78 Aug 26 13:21:40.673349: | inserting event EVENT_DPD_TIMEOUT, timeout in 10 seconds for #1 Aug 26 13:21:40.673352: | libevent_malloc: new ptr-libevent@0x560749ada478 size 128 Aug 26 13:21:40.673354: | DPD: sending R_U_THERE 24780 to 192.1.2.23:500 (state #1) Aug 26 13:21:40.673376: | **emit ISAKMP Message: Aug 26 13:21:40.673379: | initiator cookie: Aug 26 13:21:40.673380: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:40.673382: | responder cookie: Aug 26 13:21:40.673383: | 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:40.673385: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:40.673387: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:21:40.673389: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:21:40.673391: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:21:40.673393: | Message ID: 2788433154 (0xa6341d02) Aug 26 13:21:40.673396: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:21:40.673398: | ***emit ISAKMP Hash Payload: Aug 26 13:21:40.673399: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:40.673401: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:21:40.673403: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' Aug 26 13:21:40.673406: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:21:40.673407: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:21:40.673409: | ***emit ISAKMP Notification Payload: Aug 26 13:21:40.673411: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:40.673412: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:21:40.673414: | protocol ID: 1 (0x1) Aug 26 13:21:40.673415: | SPI size: 16 (0x10) Aug 26 13:21:40.673417: | Notify Message Type: R_U_THERE (0x8d28) Aug 26 13:21:40.673419: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:21:40.673421: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' Aug 26 13:21:40.673423: | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload Aug 26 13:21:40.673425: | notify icookie b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:40.673427: | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload Aug 26 13:21:40.673428: | notify rcookie 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:40.673430: | emitting 4 raw bytes of notify data into ISAKMP Notification Payload Aug 26 13:21:40.673431: | notify data 00 00 60 cc Aug 26 13:21:40.673433: | emitting length of ISAKMP Notification Payload: 32 Aug 26 13:21:40.673465: | notification HASH(1): Aug 26 13:21:40.673467: | 42 48 59 7b 07 a2 d3 cd 29 4a 11 39 9f 0a 1f bf Aug 26 13:21:40.673471: | 88 7a e4 d0 7e 37 66 80 8d 27 34 27 e4 70 33 ce Aug 26 13:21:40.673478: | emitting 12 zero bytes of encryption padding into ISAKMP Message Aug 26 13:21:40.673480: | no IKEv1 message padding required Aug 26 13:21:40.673481: | emitting length of ISAKMP Message: 108 Aug 26 13:21:40.673493: | sending 108 bytes for ISAKMP notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1) Aug 26 13:21:40.673495: | b2 8a 78 70 6d 40 cb f8 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:40.673497: | 08 10 05 01 a6 34 1d 02 00 00 00 6c 73 04 a8 d2 Aug 26 13:21:40.673498: | ee 22 8d a0 49 f1 6d 52 1e da 7b 1e 6f 04 50 a0 Aug 26 13:21:40.673500: | 50 68 cd 26 4f 80 1e 5a b2 4d 3b 2f 12 32 90 40 Aug 26 13:21:40.673501: | 41 4b ed e8 79 fc 73 f6 05 8c 58 3f ca 2c 40 63 Aug 26 13:21:40.673502: | e6 24 8f b8 92 18 34 8e a7 14 ab 93 09 6f 10 17 Aug 26 13:21:40.673504: | e3 95 b7 8e c0 5a 54 d5 c8 ee a0 03 Aug 26 13:21:40.673515: ERROR: "north-a-dpd" #2: sendto on eth1 to 192.1.2.23:500 failed in ISAKMP notify. Errno 113: No route to host Aug 26 13:21:40.673518: | libevent_free: release ptr-libevent@0x560749abc1f8 Aug 26 13:21:40.673520: | free_event_entry: release EVENT_DPD-pe@0x7f0f08004218 Aug 26 13:21:40.673526: | #2 spent 0.271 milliseconds in timer_event_cb() EVENT_DPD Aug 26 13:21:40.673529: | stop processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:557) Aug 26 13:21:43.676340: | timer_event_cb: processing event@0x560749a54608 Aug 26 13:21:43.676371: | handling event EVENT_DPD for child state #2 Aug 26 13:21:43.676380: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:21:43.676387: | [RE]START processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) Aug 26 13:21:43.676390: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:21:43.676395: | DPD: processing for state #2 ("north-a-dpd") Aug 26 13:21:43.676401: | get_sa_info esp.8a4073bc@192.1.3.33 Aug 26 13:21:43.676419: | event_schedule: new EVENT_DPD-pe@0x7f0f08004218 Aug 26 13:21:43.676424: | inserting event EVENT_DPD, timeout in 3 seconds for #2 Aug 26 13:21:43.676428: | libevent_malloc: new ptr-libevent@0x560749ae29c8 size 128 Aug 26 13:21:43.676433: | DPD: sending R_U_THERE 24781 to 192.1.2.23:500 (state #1) Aug 26 13:21:43.676446: | **emit ISAKMP Message: Aug 26 13:21:43.676449: | initiator cookie: Aug 26 13:21:43.676451: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:43.676454: | responder cookie: Aug 26 13:21:43.676456: | 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:43.676459: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:43.676462: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:21:43.676464: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:21:43.676467: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:21:43.676469: | Message ID: 3383579148 (0xc9ad520c) Aug 26 13:21:43.676472: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:21:43.676475: | ***emit ISAKMP Hash Payload: Aug 26 13:21:43.676478: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:43.676481: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:21:43.676484: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' Aug 26 13:21:43.676487: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:21:43.676490: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:21:43.676492: | ***emit ISAKMP Notification Payload: Aug 26 13:21:43.676495: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:43.676497: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:21:43.676500: | protocol ID: 1 (0x1) Aug 26 13:21:43.676502: | SPI size: 16 (0x10) Aug 26 13:21:43.676505: | Notify Message Type: R_U_THERE (0x8d28) Aug 26 13:21:43.676508: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:21:43.676513: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' Aug 26 13:21:43.676517: | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload Aug 26 13:21:43.676520: | notify icookie b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:43.676523: | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload Aug 26 13:21:43.676525: | notify rcookie 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:43.676528: | emitting 4 raw bytes of notify data into ISAKMP Notification Payload Aug 26 13:21:43.676530: | notify data 00 00 60 cd Aug 26 13:21:43.676532: | emitting length of ISAKMP Notification Payload: 32 Aug 26 13:21:43.676565: | notification HASH(1): Aug 26 13:21:43.676569: | c9 65 8a 61 04 10 ba 14 c0 ce 1a cd 6c 9d 5c 4e Aug 26 13:21:43.676572: | 76 b6 7e 0c dd 33 48 35 03 2b 71 de 7d c8 78 0c Aug 26 13:21:43.676581: | emitting 12 zero bytes of encryption padding into ISAKMP Message Aug 26 13:21:43.676585: | no IKEv1 message padding required Aug 26 13:21:43.676587: | emitting length of ISAKMP Message: 108 Aug 26 13:21:43.676617: | sending 108 bytes for ISAKMP notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1) Aug 26 13:21:43.676621: | b2 8a 78 70 6d 40 cb f8 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:43.676623: | 08 10 05 01 c9 ad 52 0c 00 00 00 6c cd 3e 96 bd Aug 26 13:21:43.676625: | f5 ed fe 52 8c cf c2 59 7d 77 cb 66 80 e1 c0 e7 Aug 26 13:21:43.676628: | 54 50 79 b9 82 98 a2 a7 38 51 f6 b3 08 80 af 54 Aug 26 13:21:43.676630: | 25 c1 6e 88 e0 ae ed fc d1 7c eb f1 43 8a 80 65 Aug 26 13:21:43.676633: | 76 fe 2c d1 c3 35 6a 36 e7 fd 02 3c 12 62 b2 b4 Aug 26 13:21:43.676635: | 51 8d 6c 80 56 7e fd df a1 6e cc 15 Aug 26 13:21:43.676662: ERROR: "north-a-dpd" #2: sendto on eth1 to 192.1.2.23:500 failed in ISAKMP notify. Errno 113: No route to host Aug 26 13:21:43.676667: | libevent_free: release ptr-libevent@0x7f0efc001f78 Aug 26 13:21:43.676690: | free_event_entry: release EVENT_DPD-pe@0x560749a54608 Aug 26 13:21:43.676698: | #2 spent 0.359 milliseconds in timer_event_cb() EVENT_DPD Aug 26 13:21:43.676703: | stop processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:557) Aug 26 13:21:46.680028: | timer_event_cb: processing event@0x7f0f08004218 Aug 26 13:21:46.680092: | handling event EVENT_DPD for child state #2 Aug 26 13:21:46.680114: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:21:46.680134: | [RE]START processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) Aug 26 13:21:46.680143: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:21:46.680154: | DPD: processing for state #2 ("north-a-dpd") Aug 26 13:21:46.680173: | get_sa_info esp.8a4073bc@192.1.3.33 Aug 26 13:21:46.680230: | event_schedule: new EVENT_DPD-pe@0x560749a54608 Aug 26 13:21:46.680244: | inserting event EVENT_DPD, timeout in 3 seconds for #2 Aug 26 13:21:46.680255: | libevent_malloc: new ptr-libevent@0x560749abc1f8 size 128 Aug 26 13:21:46.680270: | DPD: sending R_U_THERE 24782 to 192.1.2.23:500 (state #1) Aug 26 13:21:46.680345: | **emit ISAKMP Message: Aug 26 13:21:46.680364: | initiator cookie: Aug 26 13:21:46.680372: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:46.680380: | responder cookie: Aug 26 13:21:46.680387: | 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:46.680396: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:46.680405: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:21:46.680414: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:21:46.680423: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:21:46.680432: | Message ID: 1246801287 (0x4a50ad87) Aug 26 13:21:46.680442: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:21:46.680452: | ***emit ISAKMP Hash Payload: Aug 26 13:21:46.680474: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:46.680486: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:21:46.680495: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' Aug 26 13:21:46.680505: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:21:46.680514: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:21:46.680522: | ***emit ISAKMP Notification Payload: Aug 26 13:21:46.680530: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:46.680538: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:21:46.680546: | protocol ID: 1 (0x1) Aug 26 13:21:46.680554: | SPI size: 16 (0x10) Aug 26 13:21:46.680563: | Notify Message Type: R_U_THERE (0x8d28) Aug 26 13:21:46.680573: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:21:46.680582: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' Aug 26 13:21:46.680593: | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload Aug 26 13:21:46.680601: | notify icookie b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:46.680610: | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload Aug 26 13:21:46.680617: | notify rcookie 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:46.680626: | emitting 4 raw bytes of notify data into ISAKMP Notification Payload Aug 26 13:21:46.680633: | notify data 00 00 60 ce Aug 26 13:21:46.680641: | emitting length of ISAKMP Notification Payload: 32 Aug 26 13:21:46.680731: | notification HASH(1): Aug 26 13:21:46.680742: | cf 95 fe b4 07 4a 2d 5f 15 5c 99 07 28 e4 5c 8f Aug 26 13:21:46.680750: | c7 73 87 ea 46 c8 2a a1 06 be e1 a7 31 da 6c f8 Aug 26 13:21:46.680776: | emitting 12 zero bytes of encryption padding into ISAKMP Message Aug 26 13:21:46.680784: | no IKEv1 message padding required Aug 26 13:21:46.680793: | emitting length of ISAKMP Message: 108 Aug 26 13:21:46.680831: | sending 108 bytes for ISAKMP notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1) Aug 26 13:21:46.680840: | b2 8a 78 70 6d 40 cb f8 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:46.680848: | 08 10 05 01 4a 50 ad 87 00 00 00 6c df f4 e8 59 Aug 26 13:21:46.680855: | 4d 56 25 1b 8a 55 f8 96 dd 64 ad 9a 30 ce 2d 93 Aug 26 13:21:46.680862: | 0d 2e f8 e8 7c 36 3b 17 72 e5 5e f1 9a 3a cb af Aug 26 13:21:46.680869: | 48 03 f3 10 42 6d bb a1 80 e9 88 e4 26 67 5d b8 Aug 26 13:21:46.680877: | ac c0 81 76 4b b6 2d 01 8e ba e5 6d 59 01 b0 f2 Aug 26 13:21:46.680884: | 9f 3f d1 87 46 62 3b f8 65 54 46 03 Aug 26 13:21:46.680924: ERROR: "north-a-dpd" #2: sendto on eth1 to 192.1.2.23:500 failed in ISAKMP notify. Errno 113: No route to host Aug 26 13:21:46.680940: | libevent_free: release ptr-libevent@0x560749ae29c8 Aug 26 13:21:46.680950: | free_event_entry: release EVENT_DPD-pe@0x7f0f08004218 Aug 26 13:21:46.680971: | #2 spent 0.911 milliseconds in timer_event_cb() EVENT_DPD Aug 26 13:21:46.680986: | stop processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:557) Aug 26 13:21:49.683354: | timer_event_cb: processing event@0x560749a54608 Aug 26 13:21:49.683380: | handling event EVENT_DPD for child state #2 Aug 26 13:21:49.683387: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:21:49.683391: | [RE]START processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) Aug 26 13:21:49.683393: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:21:49.683396: | DPD: processing for state #2 ("north-a-dpd") Aug 26 13:21:49.683401: | get_sa_info esp.8a4073bc@192.1.3.33 Aug 26 13:21:49.683417: | event_schedule: new EVENT_DPD-pe@0x7f0f08004218 Aug 26 13:21:49.683420: | inserting event EVENT_DPD, timeout in 3 seconds for #2 Aug 26 13:21:49.683422: | libevent_malloc: new ptr-libevent@0x560749ae2b88 size 128 Aug 26 13:21:49.683428: | DPD: sending R_U_THERE 24783 to 192.1.2.23:500 (state #1) Aug 26 13:21:49.683436: | **emit ISAKMP Message: Aug 26 13:21:49.683439: | initiator cookie: Aug 26 13:21:49.683440: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:49.683442: | responder cookie: Aug 26 13:21:49.683443: | 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:49.683445: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:49.683447: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:21:49.683449: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:21:49.683451: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:21:49.683453: | Message ID: 2360085321 (0x8cac0b49) Aug 26 13:21:49.683455: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:21:49.683457: | ***emit ISAKMP Hash Payload: Aug 26 13:21:49.683458: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:49.683460: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:21:49.683462: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'ISAKMP notify' Aug 26 13:21:49.683465: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:21:49.683466: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:21:49.683468: | ***emit ISAKMP Notification Payload: Aug 26 13:21:49.683470: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:49.683471: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:21:49.683473: | protocol ID: 1 (0x1) Aug 26 13:21:49.683475: | SPI size: 16 (0x10) Aug 26 13:21:49.683476: | Notify Message Type: R_U_THERE (0x8d28) Aug 26 13:21:49.683478: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:21:49.683480: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'ISAKMP notify' Aug 26 13:21:49.683483: | emitting 8 raw bytes of notify icookie into ISAKMP Notification Payload Aug 26 13:21:49.683484: | notify icookie b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:49.683486: | emitting 8 raw bytes of notify rcookie into ISAKMP Notification Payload Aug 26 13:21:49.683487: | notify rcookie 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:49.683489: | emitting 4 raw bytes of notify data into ISAKMP Notification Payload Aug 26 13:21:49.683491: | notify data 00 00 60 cf Aug 26 13:21:49.683492: | emitting length of ISAKMP Notification Payload: 32 Aug 26 13:21:49.683511: | notification HASH(1): Aug 26 13:21:49.683513: | 3f 8a 30 f9 fc cb 73 f7 76 02 92 a9 f5 2c a9 67 Aug 26 13:21:49.683514: | a0 18 dc 53 66 23 f0 8d d7 69 5d 80 c5 e8 22 8b Aug 26 13:21:49.683520: | emitting 12 zero bytes of encryption padding into ISAKMP Message Aug 26 13:21:49.683522: | no IKEv1 message padding required Aug 26 13:21:49.683524: | emitting length of ISAKMP Message: 108 Aug 26 13:21:49.683533: | sending 108 bytes for ISAKMP notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1) Aug 26 13:21:49.683535: | b2 8a 78 70 6d 40 cb f8 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:49.683536: | 08 10 05 01 8c ac 0b 49 00 00 00 6c 61 82 30 a6 Aug 26 13:21:49.683538: | a7 7c 9e 3d 72 92 84 1e 07 ac 9e b8 ef f3 4e 02 Aug 26 13:21:49.683539: | 3b 69 59 8b 8e 76 1f 58 57 da 78 fe 6a 98 9e 4a Aug 26 13:21:49.683541: | 16 8b 37 d7 ae 08 ca 4f 71 93 d1 a4 ee 96 00 47 Aug 26 13:21:49.683542: | 9a 12 cd 0d c8 cb 50 b0 31 1f cd 0f 13 91 07 25 Aug 26 13:21:49.683544: | 91 f9 a1 a5 64 bc 1c 11 1f 7c d2 bc Aug 26 13:21:49.683554: ERROR: "north-a-dpd" #2: sendto on eth1 to 192.1.2.23:500 failed in ISAKMP notify. Errno 113: No route to host Aug 26 13:21:49.683557: | libevent_free: release ptr-libevent@0x560749abc1f8 Aug 26 13:21:49.683559: | free_event_entry: release EVENT_DPD-pe@0x560749a54608 Aug 26 13:21:49.683565: | #2 spent 0.211 milliseconds in timer_event_cb() EVENT_DPD Aug 26 13:21:49.683567: | stop processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:557) Aug 26 13:21:50.674618: | timer_event_cb: processing event@0x7f0f0c002b78 Aug 26 13:21:50.674658: | handling event EVENT_DPD_TIMEOUT for parent state #1 Aug 26 13:21:50.674665: | start processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:21:50.674670: | [RE]START processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in dpd_timeout() at ikev1_dpd.c:569) Aug 26 13:21:50.674686: "north-a-dpd" #1: IKEv1 DPD action - restarting all connections that share this peer Aug 26 13:21:50.674689: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:21:50.674691: | start processing: connection "northnet-eastnet-b" (BACKGROUND) (in terminate_a_connection() at terminate.c:69) Aug 26 13:21:50.674693: "north-a-dpd" #1: terminating SAs using this connection Aug 26 13:21:50.674695: | connection 'northnet-eastnet-b' -POLICY_UP Aug 26 13:21:50.674702: | connection not shared - terminating IKE and IPsec SA Aug 26 13:21:50.674704: | Deleting states for connection - not including other IPsec SA's Aug 26 13:21:50.674705: | pass 0 Aug 26 13:21:50.674707: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 13:21:50.674709: | state #2 Aug 26 13:21:50.674711: | state #1 Aug 26 13:21:50.674712: | pass 1 Aug 26 13:21:50.674714: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 13:21:50.674715: | state #2 Aug 26 13:21:50.674717: | state #1 Aug 26 13:21:50.674719: | stop processing: connection "northnet-eastnet-b" (BACKGROUND) (in terminate_a_connection() at terminate.c:87) Aug 26 13:21:50.674721: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:21:50.674723: | start processing: connection "north-a-dpd" (BACKGROUND) (in terminate_a_connection() at terminate.c:69) Aug 26 13:21:50.674725: "north-a-dpd" #1: terminating SAs using this connection Aug 26 13:21:50.674726: | connection 'north-a-dpd' -POLICY_UP Aug 26 13:21:50.674729: | FOR_EACH_STATE_... in shared_phase1_connection Aug 26 13:21:50.674731: | connection not shared - terminating IKE and IPsec SA Aug 26 13:21:50.674732: | Deleting states for connection - not including other IPsec SA's Aug 26 13:21:50.674734: | pass 0 Aug 26 13:21:50.674735: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 13:21:50.674737: | state #2 Aug 26 13:21:50.674740: | suspend processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:21:50.674742: | start processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:21:50.674745: | pstats #2 ikev1.ipsec deleted completed Aug 26 13:21:50.674748: | [RE]START processing: state #2 connection "north-a-dpd" from 192.1.2.23 (in delete_state() at state.c:879) Aug 26 13:21:50.674751: "north-a-dpd" #2: deleting state (STATE_QUICK_I2) aged 13.008s and sending notification Aug 26 13:21:50.674753: | child state #2: QUICK_I2(established CHILD SA) => delete Aug 26 13:21:50.674757: | get_sa_info esp.87492628@192.1.2.23 Aug 26 13:21:50.674777: | get_sa_info esp.8a4073bc@192.1.3.33 Aug 26 13:21:50.674785: "north-a-dpd" #2: ESP traffic information: in=0B out=168B Aug 26 13:21:50.674788: | state #2 requesting EVENT_DPD-pe@0x7f0f08004218 be deleted Aug 26 13:21:50.674791: | libevent_free: release ptr-libevent@0x560749ae2b88 Aug 26 13:21:50.674794: | free_event_entry: release EVENT_DPD-pe@0x7f0f08004218 Aug 26 13:21:50.674797: | #2 send IKEv1 delete notification for STATE_QUICK_I2 Aug 26 13:21:50.674799: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:21:50.674809: | **emit ISAKMP Message: Aug 26 13:21:50.674811: | initiator cookie: Aug 26 13:21:50.674813: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:50.674815: | responder cookie: Aug 26 13:21:50.674816: | 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:50.674818: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:50.674820: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:21:50.674825: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:21:50.674828: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:21:50.674830: | Message ID: 2801975220 (0xa702bfb4) Aug 26 13:21:50.674832: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:21:50.674834: | ***emit ISAKMP Hash Payload: Aug 26 13:21:50.674836: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:50.674839: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:21:50.674841: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg' Aug 26 13:21:50.674844: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:21:50.674846: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:21:50.674848: | ***emit ISAKMP Delete Payload: Aug 26 13:21:50.674850: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:50.674852: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:21:50.674853: | protocol ID: 3 (0x3) Aug 26 13:21:50.674855: | SPI size: 4 (0x4) Aug 26 13:21:50.674856: | number of SPIs: 1 (0x1) Aug 26 13:21:50.674859: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D) Aug 26 13:21:50.674860: | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg' Aug 26 13:21:50.674862: | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload Aug 26 13:21:50.674864: | delete payload 8a 40 73 bc Aug 26 13:21:50.674866: | emitting length of ISAKMP Delete Payload: 16 Aug 26 13:21:50.674891: | send delete HASH(1): Aug 26 13:21:50.674895: | c3 b3 cd 9c 8a ce cf cd 1c 41 6d 99 d4 0e ea ed Aug 26 13:21:50.674897: | 74 f9 1b ba b3 e1 ad 9e f9 de 75 69 bd f2 e4 00 Aug 26 13:21:50.674905: | emitting 12 zero bytes of encryption padding into ISAKMP Message Aug 26 13:21:50.674907: | no IKEv1 message padding required Aug 26 13:21:50.674908: | emitting length of ISAKMP Message: 92 Aug 26 13:21:50.674925: | sending 92 bytes for delete notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1) Aug 26 13:21:50.674927: | b2 8a 78 70 6d 40 cb f8 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:50.674929: | 08 10 05 01 a7 02 bf b4 00 00 00 5c ea 7b 32 56 Aug 26 13:21:50.674930: | 2a 71 a0 b5 35 c9 d9 48 04 cb 46 a9 a7 db 7b 88 Aug 26 13:21:50.674932: | 52 3f d5 e0 47 a9 de 4d 8d 79 67 c4 0f 71 8b 3c Aug 26 13:21:50.674933: | e1 28 e6 c6 82 bd 23 45 c3 ec 01 f1 8d cc e2 e1 Aug 26 13:21:50.674934: | 99 48 23 8f aa 3b 74 25 eb df 98 a6 Aug 26 13:21:50.674947: ERROR: "north-a-dpd" #2: sendto on eth1 to 192.1.2.23:500 failed in delete notify. Errno 113: No route to host Aug 26 13:21:50.674950: | state #2 requesting EVENT_SA_REPLACE to be deleted Aug 26 13:21:50.674953: | libevent_free: release ptr-libevent@0x7f0f08003f28 Aug 26 13:21:50.674955: | free_event_entry: release EVENT_SA_REPLACE-pe@0x560749ac97d8 Aug 26 13:21:50.675021: | running updown command "ipsec _updown" for verb down Aug 26 13:21:50.675026: | command executing down-client Aug 26 13:21:50.675046: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:21:50.675051: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:21:50.675081: | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566825697' PLUTO_CONN_POLIC Aug 26 13:21:50.675088: | popen cmd is 1406 chars long Aug 26 13:21:50.675105: | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUT: Aug 26 13:21:50.675107: | cmd( 80):O_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_I: Aug 26 13:21:50.675110: | cmd( 160):D='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testin: Aug 26 13:21:50.675113: | cmd( 240):g.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/: Aug 26 13:21:50.675115: | cmd( 320):24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_M: Aug 26 13:21:50.675118: | cmd( 400):Y_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUT: Aug 26 13:21:50.675120: | cmd( 480):O_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=: Aug 26 13:21:50.675122: | cmd( 560):Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.or: Aug 26 13:21:50.675124: | cmd( 640):g' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PE: Aug 26 13:21:50.675127: | cmd( 720):ER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO: Aug 26 13:21:50.675128: | cmd( 800):_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libre: Aug 26 13:21:50.675130: | cmd( 880):swan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADD: Aug 26 13:21:50.675132: | cmd( 960):TIME='1566825697' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF: Aug 26 13:21:50.675135: | cmd(1040):_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMI: Aug 26 13:21:50.675137: | cmd(1120):LY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PE: Aug 26 13:21:50.675139: | cmd(1200):ER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0': Aug 26 13:21:50.675140: | cmd(1280): PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x: Aug 26 13:21:50.675142: | cmd(1360):87492628 SPI_OUT=0x8a4073bc ipsec _updown 2>&1: Aug 26 13:21:50.682161: | shunt_eroute() called for connection 'north-a-dpd' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0 Aug 26 13:21:50.682175: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 Aug 26 13:21:50.682178: | priority calculation of connection "north-a-dpd" is 0xfe7e7 Aug 26 13:21:50.682182: | IPsec Sa SPD priority set to 1042407 Aug 26 13:21:50.682215: | delete esp.87492628@192.1.2.23 Aug 26 13:21:50.682228: | netlink response for Del SA esp.87492628@192.1.2.23 included non-error error Aug 26 13:21:50.682232: | priority calculation of connection "north-a-dpd" is 0xfe7e7 Aug 26 13:21:50.682237: | delete inbound eroute 192.0.22.0/24:0 --0-> 192.0.3.0/24:0 => unk255.10000@192.1.3.33 (raw_eroute) Aug 26 13:21:50.682265: | raw_eroute result=success Aug 26 13:21:50.682271: | delete esp.8a4073bc@192.1.3.33 Aug 26 13:21:50.682282: | netlink response for Del SA esp.8a4073bc@192.1.3.33 included non-error error Aug 26 13:21:50.682315: | stop processing: connection "north-a-dpd" (BACKGROUND) (in update_state_connection() at connections.c:4076) Aug 26 13:21:50.682323: | start processing: connection NULL (in update_state_connection() at connections.c:4077) Aug 26 13:21:50.682327: | in connection_discard for connection north-a-dpd Aug 26 13:21:50.682343: | State DB: deleting IKEv1 state #2 in QUICK_I2 Aug 26 13:21:50.682351: | child state #2: QUICK_I2(established CHILD SA) => UNDEFINED(ignore) Aug 26 13:21:50.682398: | stop processing: state #2 from 192.1.2.23 (in delete_state() at state.c:1143) Aug 26 13:21:50.682421: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:21:50.682424: | resume processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:21:50.682426: | state #1 Aug 26 13:21:50.682427: | pass 1 Aug 26 13:21:50.682429: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 13:21:50.682430: | state #1 Aug 26 13:21:50.682433: | [RE]START processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:21:50.682435: | pstats #1 ikev1.isakmp deleted completed Aug 26 13:21:50.682439: | [RE]START processing: state #1 connection "north-a-dpd" from 192.1.2.23 (in delete_state() at state.c:879) Aug 26 13:21:50.682442: "north-a-dpd" #1: deleting state (STATE_MAIN_I4) aged 13.048s and sending notification Aug 26 13:21:50.682444: | parent state #1: MAIN_I4(established IKE SA) => delete Aug 26 13:21:50.682479: | #1 send IKEv1 delete notification for STATE_MAIN_I4 Aug 26 13:21:50.682490: | **emit ISAKMP Message: Aug 26 13:21:50.682492: | initiator cookie: Aug 26 13:21:50.682494: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:50.682496: | responder cookie: Aug 26 13:21:50.682497: | 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:50.682499: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:50.682501: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:21:50.682502: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:21:50.682505: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:21:50.682507: | Message ID: 1947948158 (0x741b547e) Aug 26 13:21:50.682511: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:21:50.682514: | ***emit ISAKMP Hash Payload: Aug 26 13:21:50.682518: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:50.682522: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:21:50.682526: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg' Aug 26 13:21:50.682530: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:21:50.682533: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:21:50.682536: | ***emit ISAKMP Delete Payload: Aug 26 13:21:50.682539: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:50.682543: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:21:50.682546: | protocol ID: 1 (0x1) Aug 26 13:21:50.682548: | SPI size: 16 (0x10) Aug 26 13:21:50.682550: | number of SPIs: 1 (0x1) Aug 26 13:21:50.682552: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D) Aug 26 13:21:50.682554: | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg' Aug 26 13:21:50.682556: | emitting 8 raw bytes of initiator SPI into ISAKMP Delete Payload Aug 26 13:21:50.682558: | initiator SPI b2 8a 78 70 6d 40 cb f8 Aug 26 13:21:50.682560: | emitting 8 raw bytes of responder SPI into ISAKMP Delete Payload Aug 26 13:21:50.682561: | responder SPI 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:50.682563: | emitting length of ISAKMP Delete Payload: 28 Aug 26 13:21:50.682588: | send delete HASH(1): Aug 26 13:21:50.682590: | b1 68 4f 78 55 32 00 2e 31 a5 59 9f 65 d3 d7 44 Aug 26 13:21:50.682592: | 15 b2 69 96 f5 93 ad b8 b3 2b fc 1d b7 dd 75 d9 Aug 26 13:21:50.682598: | no IKEv1 message padding required Aug 26 13:21:50.682600: | emitting length of ISAKMP Message: 92 Aug 26 13:21:50.682617: | sending 92 bytes for delete notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #1) Aug 26 13:21:50.682619: | b2 8a 78 70 6d 40 cb f8 82 e3 e7 2c 18 0e 64 06 Aug 26 13:21:50.682621: | 08 10 05 01 74 1b 54 7e 00 00 00 5c 87 87 23 cf Aug 26 13:21:50.682624: | 93 75 25 d7 12 22 0c 0b 11 d8 08 d9 60 e9 8e 8c Aug 26 13:21:50.682625: | df e0 a1 c3 62 86 6c bf ea e3 3d 17 19 a8 2d 76 Aug 26 13:21:50.682627: | ce fe 82 df 53 c8 df 38 69 69 a2 a7 9c 3c f5 c4 Aug 26 13:21:50.682628: | 10 8c c3 41 4d 3e db 0d 69 53 a5 7d Aug 26 13:21:50.682650: ERROR: "north-a-dpd" #1: sendto on eth1 to 192.1.2.23:500 failed in delete notify. Errno 113: No route to host Aug 26 13:21:50.682652: | state #1 requesting EVENT_SA_REPLACE to be deleted Aug 26 13:21:50.682658: | libevent_free: release ptr-libevent@0x560749ae8988 Aug 26 13:21:50.682661: | free_event_entry: release EVENT_SA_REPLACE-pe@0x560749ac6aa8 Aug 26 13:21:50.682663: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:21:50.682666: | in connection_discard for connection north-a-dpd Aug 26 13:21:50.682667: | State DB: deleting IKEv1 state #1 in MAIN_I4 Aug 26 13:21:50.682669: | parent state #1: MAIN_I4(established IKE SA) => UNDEFINED(ignore) Aug 26 13:21:50.682675: | unreference key: 0x560749ae2a98 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 2-- Aug 26 13:21:50.682688: | stop processing: state #1 from 192.1.2.23 (in delete_state() at state.c:1143) Aug 26 13:21:50.682696: | unreference key: 0x560749ae2a98 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- Aug 26 13:21:50.682699: | unreference key: 0x560749ac69b8 user-east@testing.libreswan.org cnt 1-- Aug 26 13:21:50.682702: | unreference key: 0x560749ad5078 @east.testing.libreswan.org cnt 1-- Aug 26 13:21:50.682705: | unreference key: 0x560749ae0988 east@testing.libreswan.org cnt 1-- Aug 26 13:21:50.682711: | unreference key: 0x560749ad52c8 192.1.2.23 cnt 1-- Aug 26 13:21:50.682727: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:21:50.682729: | processing: STOP connection NULL (in terminate_a_connection() at terminate.c:87) Aug 26 13:21:50.682732: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:21:50.682735: | start processing: connection "northnet-eastnet-b" (in initiate_a_connection() at initiate.c:186) Aug 26 13:21:50.682738: | empty esp_info, returning defaults for ENCRYPT Aug 26 13:21:50.682740: | connection 'northnet-eastnet-b' +POLICY_UP Aug 26 13:21:50.682742: | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) Aug 26 13:21:50.682744: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:21:50.682747: | creating state object #3 at 0x560749ac7f88 Aug 26 13:21:50.682749: | State DB: adding IKEv1 state #3 in UNDEFINED Aug 26 13:21:50.682753: | pstats #3 ikev1.isakmp started Aug 26 13:21:50.682758: | suspend processing: connection "northnet-eastnet-b" (in main_outI1() at ikev1_main.c:118) Aug 26 13:21:50.682760: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118) Aug 26 13:21:50.682762: | parent state #3: UNDEFINED(ignore) => MAIN_I1(half-open IKE SA) Aug 26 13:21:50.682764: | dup_any(fd@-1) -> fd@-1 (in main_outI1() at ikev1_main.c:123) Aug 26 13:21:50.682767: | Queuing pending IPsec SA negotiating with 192.1.2.23 "northnet-eastnet-b" IKE SA #3 "northnet-eastnet-b" Aug 26 13:21:50.682769: "northnet-eastnet-b" #3: initiating Main Mode Aug 26 13:21:50.682787: | **emit ISAKMP Message: Aug 26 13:21:50.682789: | initiator cookie: Aug 26 13:21:50.682790: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:21:50.682792: | responder cookie: Aug 26 13:21:50.682793: | 00 00 00 00 00 00 00 00 Aug 26 13:21:50.682795: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:21:50.682797: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:21:50.682798: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:21:50.682800: | flags: none (0x0) Aug 26 13:21:50.682801: | Message ID: 0 (0x0) Aug 26 13:21:50.682803: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:21:50.682806: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:21:50.682809: | no specific IKE algorithms specified - using defaults Aug 26 13:21:50.682826: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP2048=14 eklen=0 Aug 26 13:21:50.682829: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP2048=14 eklen=0 Aug 26 13:21:50.682832: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP2048=14 eklen=0 Aug 26 13:21:50.682835: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP1536=5 eklen=0 Aug 26 13:21:50.682839: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP1536=5 eklen=0 Aug 26 13:21:50.682843: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP1536=5 eklen=0 Aug 26 13:21:50.682848: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP2048=14 eklen=0 Aug 26 13:21:50.682851: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP2048=14 eklen=0 Aug 26 13:21:50.682856: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP2048=14 eklen=0 Aug 26 13:21:50.682859: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP1536=5 eklen=0 Aug 26 13:21:50.682862: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP1536=5 eklen=0 Aug 26 13:21:50.682865: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP1536=5 eklen=0 Aug 26 13:21:50.682868: | oakley_alg_makedb() returning 0x560749ad33d8 Aug 26 13:21:50.682872: | ***emit ISAKMP Security Association Payload: Aug 26 13:21:50.682874: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:21:50.682875: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:21:50.682877: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:21:50.682879: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:21:50.682881: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:21:50.682883: | ****emit IPsec DOI SIT: Aug 26 13:21:50.682884: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:21:50.682886: | ikev1_out_sa pcn: 0 has 1 valid proposals Aug 26 13:21:50.682888: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 18 Aug 26 13:21:50.682890: | ****emit ISAKMP Proposal Payload: Aug 26 13:21:50.682891: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:50.682893: | proposal number: 0 (0x0) Aug 26 13:21:50.682894: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:21:50.682896: | SPI size: 0 (0x0) Aug 26 13:21:50.682897: | number of transforms: 18 (0x12) Aug 26 13:21:50.682899: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' Aug 26 13:21:50.682901: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.682902: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.682904: | ISAKMP transform number: 0 (0x0) Aug 26 13:21:50.682905: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.682907: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.682909: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.682911: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.682913: | length/value: 1 (0x1) Aug 26 13:21:50.682915: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.682916: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.682918: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.682920: | length/value: 3600 (0xe10) Aug 26 13:21:50.682921: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.682923: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.682924: | length/value: 7 (0x7) Aug 26 13:21:50.682926: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:50.682928: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.682930: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.682931: | length/value: 4 (0x4) Aug 26 13:21:50.682933: | [4 is OAKLEY_SHA2_256] Aug 26 13:21:50.682934: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.682936: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.682937: | length/value: 3 (0x3) Aug 26 13:21:50.682939: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.682940: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.682942: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.682943: | length/value: 14 (0xe) Aug 26 13:21:50.682945: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:50.682946: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.682948: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:50.682950: | length/value: 256 (0x100) Aug 26 13:21:50.682951: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:50.682953: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.682954: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.682956: | ISAKMP transform number: 1 (0x1) Aug 26 13:21:50.682957: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.682959: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.682961: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.682963: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.682964: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.682966: | length/value: 1 (0x1) Aug 26 13:21:50.682967: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.682969: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.682970: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.682972: | length/value: 3600 (0xe10) Aug 26 13:21:50.682973: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.682975: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.682976: | length/value: 7 (0x7) Aug 26 13:21:50.682978: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:50.682979: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.682981: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.682982: | length/value: 4 (0x4) Aug 26 13:21:50.682983: | [4 is OAKLEY_SHA2_256] Aug 26 13:21:50.682985: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.682986: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.682988: | length/value: 3 (0x3) Aug 26 13:21:50.682989: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.682991: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.682992: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.682994: | length/value: 14 (0xe) Aug 26 13:21:50.682995: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:50.682997: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.682998: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:50.683000: | length/value: 128 (0x80) Aug 26 13:21:50.683001: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:50.683003: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.683004: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683006: | ISAKMP transform number: 2 (0x2) Aug 26 13:21:50.683007: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.683009: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683011: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.683012: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683014: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.683015: | length/value: 1 (0x1) Aug 26 13:21:50.683017: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.683018: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683021: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.683022: | length/value: 3600 (0xe10) Aug 26 13:21:50.683024: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683025: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.683027: | length/value: 7 (0x7) Aug 26 13:21:50.683028: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:50.683030: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683031: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.683032: | length/value: 6 (0x6) Aug 26 13:21:50.683034: | [6 is OAKLEY_SHA2_512] Aug 26 13:21:50.683035: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683037: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.683038: | length/value: 3 (0x3) Aug 26 13:21:50.683040: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.683041: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683043: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.683044: | length/value: 14 (0xe) Aug 26 13:21:50.683046: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:50.683047: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683049: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:50.683050: | length/value: 256 (0x100) Aug 26 13:21:50.683052: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:50.683053: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.683055: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683056: | ISAKMP transform number: 3 (0x3) Aug 26 13:21:50.683058: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.683059: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683061: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.683063: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683064: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.683066: | length/value: 1 (0x1) Aug 26 13:21:50.683067: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.683069: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683070: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.683072: | length/value: 3600 (0xe10) Aug 26 13:21:50.683073: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683075: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.683076: | length/value: 7 (0x7) Aug 26 13:21:50.683077: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:50.683079: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683080: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.683082: | length/value: 6 (0x6) Aug 26 13:21:50.683083: | [6 is OAKLEY_SHA2_512] Aug 26 13:21:50.683085: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683086: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.683088: | length/value: 3 (0x3) Aug 26 13:21:50.683089: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.683091: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683092: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.683094: | length/value: 14 (0xe) Aug 26 13:21:50.683095: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:50.683096: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683098: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:50.683099: | length/value: 128 (0x80) Aug 26 13:21:50.683101: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:50.683103: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.683104: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683106: | ISAKMP transform number: 4 (0x4) Aug 26 13:21:50.683107: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.683109: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683111: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.683113: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683114: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.683116: | length/value: 1 (0x1) Aug 26 13:21:50.683117: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.683119: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683120: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.683122: | length/value: 3600 (0xe10) Aug 26 13:21:50.683123: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683125: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.683126: | length/value: 7 (0x7) Aug 26 13:21:50.683128: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:50.683129: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683131: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.683132: | length/value: 2 (0x2) Aug 26 13:21:50.683133: | [2 is OAKLEY_SHA1] Aug 26 13:21:50.683135: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683136: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.683138: | length/value: 3 (0x3) Aug 26 13:21:50.683139: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.683141: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683142: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.683144: | length/value: 14 (0xe) Aug 26 13:21:50.683145: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:50.683147: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683148: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:50.683150: | length/value: 256 (0x100) Aug 26 13:21:50.683151: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:50.683153: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.683154: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683156: | ISAKMP transform number: 5 (0x5) Aug 26 13:21:50.683157: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.683159: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683161: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.683162: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683164: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.683165: | length/value: 1 (0x1) Aug 26 13:21:50.683166: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.683168: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683169: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.683171: | length/value: 3600 (0xe10) Aug 26 13:21:50.683172: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683174: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.683175: | length/value: 7 (0x7) Aug 26 13:21:50.683177: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:50.683178: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683180: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.683181: | length/value: 2 (0x2) Aug 26 13:21:50.683183: | [2 is OAKLEY_SHA1] Aug 26 13:21:50.683184: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683186: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.683187: | length/value: 3 (0x3) Aug 26 13:21:50.683188: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.683190: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683191: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.683193: | length/value: 14 (0xe) Aug 26 13:21:50.683194: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:50.683196: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683197: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:50.683199: | length/value: 128 (0x80) Aug 26 13:21:50.683200: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:50.683202: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.683204: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683206: | ISAKMP transform number: 6 (0x6) Aug 26 13:21:50.683207: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.683209: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683211: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.683212: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683214: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.683215: | length/value: 1 (0x1) Aug 26 13:21:50.683216: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.683218: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683219: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.683221: | length/value: 3600 (0xe10) Aug 26 13:21:50.683222: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683224: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.683225: | length/value: 7 (0x7) Aug 26 13:21:50.683227: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:50.683228: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683230: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.683231: | length/value: 4 (0x4) Aug 26 13:21:50.683233: | [4 is OAKLEY_SHA2_256] Aug 26 13:21:50.683234: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683236: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.683237: | length/value: 3 (0x3) Aug 26 13:21:50.683239: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.683240: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683242: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.683243: | length/value: 5 (0x5) Aug 26 13:21:50.683244: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:50.683246: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683247: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:50.683249: | length/value: 256 (0x100) Aug 26 13:21:50.683250: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:50.683252: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.683253: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683255: | ISAKMP transform number: 7 (0x7) Aug 26 13:21:50.683256: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.683258: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683260: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.683261: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683263: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.683264: | length/value: 1 (0x1) Aug 26 13:21:50.683266: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.683267: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683269: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.683270: | length/value: 3600 (0xe10) Aug 26 13:21:50.683272: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683273: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.683275: | length/value: 7 (0x7) Aug 26 13:21:50.683276: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:50.683277: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683279: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.683280: | length/value: 4 (0x4) Aug 26 13:21:50.683282: | [4 is OAKLEY_SHA2_256] Aug 26 13:21:50.683283: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683285: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.683286: | length/value: 3 (0x3) Aug 26 13:21:50.683291: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.683294: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683296: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.683298: | length/value: 5 (0x5) Aug 26 13:21:50.683300: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:50.683301: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683303: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:50.683321: | length/value: 128 (0x80) Aug 26 13:21:50.683323: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:50.683325: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.683328: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683329: | ISAKMP transform number: 8 (0x8) Aug 26 13:21:50.683331: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.683333: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683335: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.683336: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683338: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.683352: | length/value: 1 (0x1) Aug 26 13:21:50.683353: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.683355: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683357: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.683358: | length/value: 3600 (0xe10) Aug 26 13:21:50.683360: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683361: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.683363: | length/value: 7 (0x7) Aug 26 13:21:50.683364: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:50.683366: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683367: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.683368: | length/value: 6 (0x6) Aug 26 13:21:50.683370: | [6 is OAKLEY_SHA2_512] Aug 26 13:21:50.683371: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683373: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.683374: | length/value: 3 (0x3) Aug 26 13:21:50.683376: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.683377: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683379: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.683380: | length/value: 5 (0x5) Aug 26 13:21:50.683382: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:50.683383: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683385: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:50.683386: | length/value: 256 (0x100) Aug 26 13:21:50.683388: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:50.683389: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.683391: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683392: | ISAKMP transform number: 9 (0x9) Aug 26 13:21:50.683394: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.683395: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683397: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.683399: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683400: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.683401: | length/value: 1 (0x1) Aug 26 13:21:50.683403: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.683404: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683406: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.683407: | length/value: 3600 (0xe10) Aug 26 13:21:50.683409: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683410: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.683412: | length/value: 7 (0x7) Aug 26 13:21:50.683413: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:50.683415: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683416: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.683418: | length/value: 6 (0x6) Aug 26 13:21:50.683419: | [6 is OAKLEY_SHA2_512] Aug 26 13:21:50.683421: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683423: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.683424: | length/value: 3 (0x3) Aug 26 13:21:50.683426: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.683427: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683429: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.683430: | length/value: 5 (0x5) Aug 26 13:21:50.683432: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:50.683433: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683435: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:50.683436: | length/value: 128 (0x80) Aug 26 13:21:50.683438: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:50.683439: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.683441: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683442: | ISAKMP transform number: 10 (0xa) Aug 26 13:21:50.683444: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.683445: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683447: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.683449: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683450: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.683452: | length/value: 1 (0x1) Aug 26 13:21:50.683453: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.683455: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683456: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.683458: | length/value: 3600 (0xe10) Aug 26 13:21:50.683459: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683461: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.683462: | length/value: 7 (0x7) Aug 26 13:21:50.683463: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:50.683465: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683466: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.683468: | length/value: 2 (0x2) Aug 26 13:21:50.683469: | [2 is OAKLEY_SHA1] Aug 26 13:21:50.683471: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683472: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.683474: | length/value: 3 (0x3) Aug 26 13:21:50.683475: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.683477: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683478: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.683480: | length/value: 5 (0x5) Aug 26 13:21:50.683481: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:50.683482: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683484: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:50.683485: | length/value: 256 (0x100) Aug 26 13:21:50.683487: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:50.683489: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.683490: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683491: | ISAKMP transform number: 11 (0xb) Aug 26 13:21:50.683493: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.683495: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683496: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.683498: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683499: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.683501: | length/value: 1 (0x1) Aug 26 13:21:50.683502: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.683504: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683505: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.683507: | length/value: 3600 (0xe10) Aug 26 13:21:50.683508: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683511: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.683512: | length/value: 7 (0x7) Aug 26 13:21:50.683514: | [7 is OAKLEY_AES_CBC] Aug 26 13:21:50.683515: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683517: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.683518: | length/value: 2 (0x2) Aug 26 13:21:50.683520: | [2 is OAKLEY_SHA1] Aug 26 13:21:50.683521: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683523: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.683524: | length/value: 3 (0x3) Aug 26 13:21:50.683526: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.683527: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683529: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.683530: | length/value: 5 (0x5) Aug 26 13:21:50.683531: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:50.683533: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683534: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:21:50.683536: | length/value: 128 (0x80) Aug 26 13:21:50.683537: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:21:50.683539: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.683540: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683542: | ISAKMP transform number: 12 (0xc) Aug 26 13:21:50.683543: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.683545: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683547: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.683548: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683550: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.683551: | length/value: 1 (0x1) Aug 26 13:21:50.683553: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.683554: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683556: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.683557: | length/value: 3600 (0xe10) Aug 26 13:21:50.683559: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683560: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.683562: | length/value: 5 (0x5) Aug 26 13:21:50.683563: | [5 is OAKLEY_3DES_CBC] Aug 26 13:21:50.683565: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683566: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.683568: | length/value: 4 (0x4) Aug 26 13:21:50.683569: | [4 is OAKLEY_SHA2_256] Aug 26 13:21:50.683570: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683572: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.683573: | length/value: 3 (0x3) Aug 26 13:21:50.683575: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.683576: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683578: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.683579: | length/value: 14 (0xe) Aug 26 13:21:50.683581: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:50.683582: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:21:50.683584: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.683585: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683587: | ISAKMP transform number: 13 (0xd) Aug 26 13:21:50.683588: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.683590: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683592: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.683593: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683595: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.683596: | length/value: 1 (0x1) Aug 26 13:21:50.683598: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.683599: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683601: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.683603: | length/value: 3600 (0xe10) Aug 26 13:21:50.683604: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683606: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.683607: | length/value: 5 (0x5) Aug 26 13:21:50.683609: | [5 is OAKLEY_3DES_CBC] Aug 26 13:21:50.683625: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683627: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.683628: | length/value: 6 (0x6) Aug 26 13:21:50.683630: | [6 is OAKLEY_SHA2_512] Aug 26 13:21:50.683631: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683633: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.683634: | length/value: 3 (0x3) Aug 26 13:21:50.683636: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.683637: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683639: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.683640: | length/value: 14 (0xe) Aug 26 13:21:50.683642: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:50.683643: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:21:50.683645: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.683646: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683648: | ISAKMP transform number: 14 (0xe) Aug 26 13:21:50.683649: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.683651: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683665: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.683667: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683669: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.683670: | length/value: 1 (0x1) Aug 26 13:21:50.683671: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.683673: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683674: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.683676: | length/value: 3600 (0xe10) Aug 26 13:21:50.683677: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683679: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.683680: | length/value: 5 (0x5) Aug 26 13:21:50.683682: | [5 is OAKLEY_3DES_CBC] Aug 26 13:21:50.683683: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683685: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.683686: | length/value: 2 (0x2) Aug 26 13:21:50.683688: | [2 is OAKLEY_SHA1] Aug 26 13:21:50.683689: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683705: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.683707: | length/value: 3 (0x3) Aug 26 13:21:50.683708: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.683710: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683711: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.683713: | length/value: 14 (0xe) Aug 26 13:21:50.683714: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:21:50.683716: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:21:50.683717: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.683719: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683720: | ISAKMP transform number: 15 (0xf) Aug 26 13:21:50.683722: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.683723: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683725: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.683727: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683728: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.683730: | length/value: 1 (0x1) Aug 26 13:21:50.683731: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.683734: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683735: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.683737: | length/value: 3600 (0xe10) Aug 26 13:21:50.683738: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683740: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.683741: | length/value: 5 (0x5) Aug 26 13:21:50.683743: | [5 is OAKLEY_3DES_CBC] Aug 26 13:21:50.683744: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683746: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.683747: | length/value: 4 (0x4) Aug 26 13:21:50.683749: | [4 is OAKLEY_SHA2_256] Aug 26 13:21:50.683750: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683752: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.683753: | length/value: 3 (0x3) Aug 26 13:21:50.683755: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.683756: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683758: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.683759: | length/value: 5 (0x5) Aug 26 13:21:50.683761: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:50.683762: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:21:50.683764: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.683765: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683767: | ISAKMP transform number: 16 (0x10) Aug 26 13:21:50.683768: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.683770: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683772: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.683774: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683775: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.683777: | length/value: 1 (0x1) Aug 26 13:21:50.683778: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.683780: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683781: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.683783: | length/value: 3600 (0xe10) Aug 26 13:21:50.683784: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683786: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.683787: | length/value: 5 (0x5) Aug 26 13:21:50.683789: | [5 is OAKLEY_3DES_CBC] Aug 26 13:21:50.683790: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683792: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.683793: | length/value: 6 (0x6) Aug 26 13:21:50.683795: | [6 is OAKLEY_SHA2_512] Aug 26 13:21:50.683796: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683798: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.683799: | length/value: 3 (0x3) Aug 26 13:21:50.683801: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.683802: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683804: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.683805: | length/value: 5 (0x5) Aug 26 13:21:50.683807: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:50.683808: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:21:50.683810: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:21:50.683811: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:50.683813: | ISAKMP transform number: 17 (0x11) Aug 26 13:21:50.683814: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:21:50.683816: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:21:50.683818: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:21:50.683820: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683821: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:21:50.683823: | length/value: 1 (0x1) Aug 26 13:21:50.683825: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:21:50.683826: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683828: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:21:50.683830: | length/value: 3600 (0xe10) Aug 26 13:21:50.683831: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683833: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:21:50.683834: | length/value: 5 (0x5) Aug 26 13:21:50.683836: | [5 is OAKLEY_3DES_CBC] Aug 26 13:21:50.683837: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683839: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:21:50.683853: | length/value: 2 (0x2) Aug 26 13:21:50.683854: | [2 is OAKLEY_SHA1] Aug 26 13:21:50.683856: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683857: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:21:50.683859: | length/value: 3 (0x3) Aug 26 13:21:50.683860: | [3 is OAKLEY_RSA_SIG] Aug 26 13:21:50.683876: | ******emit ISAKMP Oakley attribute: Aug 26 13:21:50.683878: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:21:50.683879: | length/value: 5 (0x5) Aug 26 13:21:50.683881: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:21:50.683882: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:21:50.683884: | emitting length of ISAKMP Proposal Payload: 632 Aug 26 13:21:50.683886: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0 Aug 26 13:21:50.683887: | emitting length of ISAKMP Security Association Payload: 644 Aug 26 13:21:50.683889: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 Aug 26 13:21:50.683892: | out_vid(): sending [FRAGMENTATION] Aug 26 13:21:50.683894: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:21:50.683895: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:21:50.683897: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:21:50.683899: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:21:50.683901: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:21:50.683903: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:21:50.683905: | V_ID 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 Aug 26 13:21:50.683907: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:21:50.683908: | out_vid(): sending [Dead Peer Detection] Aug 26 13:21:50.683910: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:21:50.683911: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:50.683913: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:21:50.683915: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:21:50.683917: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:21:50.683918: | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 Aug 26 13:21:50.683920: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:21:50.683921: | nat add vid Aug 26 13:21:50.683923: | sending draft and RFC NATT VIDs Aug 26 13:21:50.683925: | out_vid(): sending [RFC 3947] Aug 26 13:21:50.683926: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:21:50.683928: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:21:50.683929: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:21:50.683931: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:21:50.683933: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:21:50.683935: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:21:50.683937: | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f Aug 26 13:21:50.683939: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:21:50.683940: | skipping VID_NATT_RFC Aug 26 13:21:50.683942: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-03] Aug 26 13:21:50.683943: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:21:50.683945: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:21:50.683946: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:21:50.683948: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:21:50.683950: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:21:50.683952: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:21:50.683953: | V_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Aug 26 13:21:50.683955: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:21:50.683956: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02_n] Aug 26 13:21:50.683958: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:21:50.683959: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:21:50.683961: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:21:50.683963: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:21:50.683965: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:21:50.683966: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:21:50.683968: | V_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f Aug 26 13:21:50.683969: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:21:50.683971: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02] Aug 26 13:21:50.683972: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:21:50.683974: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:21:50.683976: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:21:50.683978: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:21:50.683979: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:21:50.683981: | V_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 Aug 26 13:21:50.683982: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:21:50.683984: | no IKEv1 message padding required Aug 26 13:21:50.683985: | emitting length of ISAKMP Message: 792 Aug 26 13:21:50.683992: | sending 792 bytes for reply packet for main_outI1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3) Aug 26 13:21:50.683994: | fc a6 4a c1 e3 3a c1 65 00 00 00 00 00 00 00 00 Aug 26 13:21:50.683996: | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 Aug 26 13:21:50.683997: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Aug 26 13:21:50.683999: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:50.684000: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:21:50.684002: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Aug 26 13:21:50.684003: | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 Aug 26 13:21:50.684005: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Aug 26 13:21:50.684006: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 Aug 26 13:21:50.684008: | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 Aug 26 13:21:50.684009: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:50.684011: | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 Aug 26 13:21:50.684012: | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:50.684013: | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:21:50.684016: | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 Aug 26 13:21:50.684017: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 Aug 26 13:21:50.684019: | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 Aug 26 13:21:50.684020: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 Aug 26 13:21:50.684022: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:21:50.684023: | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:50.684025: | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:21:50.684026: | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:50.684040: | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:21:50.684042: | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 Aug 26 13:21:50.684043: | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 Aug 26 13:21:50.684044: | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 Aug 26 13:21:50.684046: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Aug 26 13:21:50.684047: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:21:50.684049: | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:50.684050: | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:21:50.684052: | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:50.684053: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:21:50.684054: | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:50.684056: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e Aug 26 13:21:50.684057: | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:50.684059: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:21:50.684060: | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:50.684061: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 Aug 26 13:21:50.684063: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:50.684064: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:21:50.684066: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:50.684067: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 Aug 26 13:21:50.684069: | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f Aug 26 13:21:50.684070: | 00 d6 c2 d3 0d 00 00 14 af ca d7 13 68 a1 f1 c9 Aug 26 13:21:50.684071: | 6b 86 96 fc 77 57 01 00 0d 00 00 14 4a 13 1c 81 Aug 26 13:21:50.684073: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 Aug 26 13:21:50.684074: | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Aug 26 13:21:50.684076: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 Aug 26 13:21:50.684077: | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 Aug 26 13:21:50.684078: | 7c fd b2 fc 68 b6 a4 48 Aug 26 13:21:50.684084: ERROR: "northnet-eastnet-b" #3: sendto on eth1 to 192.1.2.23:500 failed in reply packet for main_outI1. Errno 113: No route to host Aug 26 13:21:50.684087: | event_schedule: new EVENT_RETRANSMIT-pe@0x560749ac6aa8 Aug 26 13:21:50.684090: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #3 Aug 26 13:21:50.684092: | libevent_malloc: new ptr-libevent@0x560749ae29c8 size 128 Aug 26 13:21:50.684096: | #3 STATE_MAIN_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 10996.426553 Aug 26 13:21:50.684101: | #3 spent 1.36 milliseconds in main_outI1() Aug 26 13:21:50.684104: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in main_outI1() at ikev1_main.c:228) Aug 26 13:21:50.684106: | resume processing: connection "northnet-eastnet-b" (in main_outI1() at ikev1_main.c:228) Aug 26 13:21:50.684108: | stop processing: connection "northnet-eastnet-b" (in initiate_a_connection() at initiate.c:349) Aug 26 13:21:50.684110: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:21:50.684112: | start processing: connection "north-a-dpd" (in initiate_a_connection() at initiate.c:186) Aug 26 13:21:50.684114: | empty esp_info, returning defaults for ENCRYPT Aug 26 13:21:50.684118: | connection 'north-a-dpd' +POLICY_UP Aug 26 13:21:50.684120: | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) Aug 26 13:21:50.684122: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:21:50.684125: | Queuing pending IPsec SA negotiating with 192.1.2.23 "north-a-dpd" IKE SA #3 "northnet-eastnet-b" Aug 26 13:21:50.684127: | stop processing: connection "north-a-dpd" (in initiate_a_connection() at initiate.c:349) Aug 26 13:21:50.684129: | libevent_free: release ptr-libevent@0x560749ada478 Aug 26 13:21:50.684131: | free_event_entry: release EVENT_DPD_TIMEOUT-pe@0x7f0f0c002b78 Aug 26 13:21:50.684133: | in statetime_stop() and could not find #1 Aug 26 13:21:50.684135: | processing: STOP state #0 (in timer_event_cb() at timer.c:557) Aug 26 13:21:50.684144: | processing signal PLUTO_SIGCHLD Aug 26 13:21:50.684147: | waitpid returned ECHILD (no child processes left) Aug 26 13:21:50.684150: | spent 0.00354 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 13:21:51.176918: | timer_event_cb: processing event@0x560749ac6aa8 Aug 26 13:21:51.176981: | handling event EVENT_RETRANSMIT for parent state #3 Aug 26 13:21:51.177006: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:21:51.177018: | IKEv1 retransmit event Aug 26 13:21:51.177033: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in retransmit_v1_msg() at retry.c:61) Aug 26 13:21:51.177048: | handling event EVENT_RETRANSMIT for 192.1.2.23 "northnet-eastnet-b" #3 keying attempt 1 of 0; retransmit 1 Aug 26 13:21:51.177067: | retransmits: current time 10996.919523; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.49297 exceeds limit? NO Aug 26 13:21:51.177079: | event_schedule: new EVENT_RETRANSMIT-pe@0x7f0f0c002b78 Aug 26 13:21:51.177092: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #3 Aug 26 13:21:51.177103: | libevent_malloc: new ptr-libevent@0x560749ada478 size 128 Aug 26 13:21:51.177117: "northnet-eastnet-b" #3: STATE_MAIN_I1: retransmission; will wait 0.5 seconds for response Aug 26 13:21:51.177137: | sending 792 bytes for EVENT_RETRANSMIT through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3) Aug 26 13:21:51.177145: | fc a6 4a c1 e3 3a c1 65 00 00 00 00 00 00 00 00 Aug 26 13:21:51.177153: | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 Aug 26 13:21:51.177161: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Aug 26 13:21:51.177168: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.177175: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:21:51.177183: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Aug 26 13:21:51.177190: | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 Aug 26 13:21:51.177197: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Aug 26 13:21:51.177204: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 Aug 26 13:21:51.177212: | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 Aug 26 13:21:51.177219: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:51.177226: | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 Aug 26 13:21:51.177233: | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.177241: | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:21:51.177248: | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 Aug 26 13:21:51.177255: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 Aug 26 13:21:51.177263: | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 Aug 26 13:21:51.177270: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 Aug 26 13:21:51.177277: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:21:51.177284: | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:51.177329: | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:21:51.177338: | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.177345: | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:21:51.177365: | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 Aug 26 13:21:51.177373: | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 Aug 26 13:21:51.177380: | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 Aug 26 13:21:51.177387: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Aug 26 13:21:51.177395: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:21:51.177402: | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:51.177409: | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:21:51.177416: | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.177424: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:21:51.177431: | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.177438: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e Aug 26 13:21:51.177445: | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.177453: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:21:51.177460: | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.177467: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 Aug 26 13:21:51.177474: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.177482: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:21:51.177489: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.177496: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 Aug 26 13:21:51.177504: | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f Aug 26 13:21:51.177511: | 00 d6 c2 d3 0d 00 00 14 af ca d7 13 68 a1 f1 c9 Aug 26 13:21:51.177519: | 6b 86 96 fc 77 57 01 00 0d 00 00 14 4a 13 1c 81 Aug 26 13:21:51.177526: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 Aug 26 13:21:51.177533: | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Aug 26 13:21:51.177541: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 Aug 26 13:21:51.177548: | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 Aug 26 13:21:51.177556: | 7c fd b2 fc 68 b6 a4 48 Aug 26 13:21:51.177606: ERROR: "northnet-eastnet-b" #3: sendto on eth1 to 192.1.2.23:500 failed in EVENT_RETRANSMIT. Errno 113: No route to host Aug 26 13:21:51.177628: | libevent_free: release ptr-libevent@0x560749ae29c8 Aug 26 13:21:51.177644: | free_event_entry: release EVENT_RETRANSMIT-pe@0x560749ac6aa8 Aug 26 13:21:51.177673: | #3 spent 0.727 milliseconds in timer_event_cb() EVENT_RETRANSMIT Aug 26 13:21:51.177698: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557) Aug 26 13:21:51.678331: | timer_event_cb: processing event@0x7f0f0c002b78 Aug 26 13:21:51.678382: | handling event EVENT_RETRANSMIT for parent state #3 Aug 26 13:21:51.678406: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:21:51.678418: | IKEv1 retransmit event Aug 26 13:21:51.678433: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in retransmit_v1_msg() at retry.c:61) Aug 26 13:21:51.678447: | handling event EVENT_RETRANSMIT for 192.1.2.23 "northnet-eastnet-b" #3 keying attempt 1 of 0; retransmit 2 Aug 26 13:21:51.678466: | retransmits: current time 10997.420923; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.99437 exceeds limit? NO Aug 26 13:21:51.678478: | event_schedule: new EVENT_RETRANSMIT-pe@0x560749ac6aa8 Aug 26 13:21:51.678490: | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #3 Aug 26 13:21:51.678501: | libevent_malloc: new ptr-libevent@0x560749ae29c8 size 128 Aug 26 13:21:51.678514: "northnet-eastnet-b" #3: STATE_MAIN_I1: retransmission; will wait 1 seconds for response Aug 26 13:21:51.678534: | sending 792 bytes for EVENT_RETRANSMIT through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3) Aug 26 13:21:51.678543: | fc a6 4a c1 e3 3a c1 65 00 00 00 00 00 00 00 00 Aug 26 13:21:51.678551: | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 Aug 26 13:21:51.678568: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Aug 26 13:21:51.678576: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.678584: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:21:51.678591: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Aug 26 13:21:51.678598: | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 Aug 26 13:21:51.678606: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Aug 26 13:21:51.678613: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 Aug 26 13:21:51.678620: | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 Aug 26 13:21:51.678627: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:51.678635: | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 Aug 26 13:21:51.678642: | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.678649: | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:21:51.678657: | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 Aug 26 13:21:51.678664: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 Aug 26 13:21:51.678671: | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 Aug 26 13:21:51.678679: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 Aug 26 13:21:51.678686: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:21:51.678693: | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:51.678700: | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:21:51.678708: | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.678715: | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:21:51.678722: | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 Aug 26 13:21:51.678730: | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 Aug 26 13:21:51.678737: | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 Aug 26 13:21:51.678744: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Aug 26 13:21:51.678752: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:21:51.678759: | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:51.678766: | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:21:51.678774: | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.678781: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:21:51.678788: | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.678795: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e Aug 26 13:21:51.678803: | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.678810: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:21:51.678817: | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.678825: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 Aug 26 13:21:51.678832: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.678839: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:21:51.678846: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:51.678854: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 Aug 26 13:21:51.678861: | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f Aug 26 13:21:51.678868: | 00 d6 c2 d3 0d 00 00 14 af ca d7 13 68 a1 f1 c9 Aug 26 13:21:51.678876: | 6b 86 96 fc 77 57 01 00 0d 00 00 14 4a 13 1c 81 Aug 26 13:21:51.678883: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 Aug 26 13:21:51.678890: | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Aug 26 13:21:51.678897: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 Aug 26 13:21:51.678905: | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 Aug 26 13:21:51.678912: | 7c fd b2 fc 68 b6 a4 48 Aug 26 13:21:51.678950: ERROR: "northnet-eastnet-b" #3: sendto on eth1 to 192.1.2.23:500 failed in EVENT_RETRANSMIT. Errno 113: No route to host Aug 26 13:21:51.678963: | libevent_free: release ptr-libevent@0x560749ada478 Aug 26 13:21:51.678973: | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f0f0c002b78 Aug 26 13:21:51.678997: | #3 spent 0.668 milliseconds in timer_event_cb() EVENT_RETRANSMIT Aug 26 13:21:51.679012: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557) Aug 26 13:21:52.679429: | timer_event_cb: processing event@0x560749ac6aa8 Aug 26 13:21:52.679477: | handling event EVENT_RETRANSMIT for parent state #3 Aug 26 13:21:52.679501: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:21:52.679513: | IKEv1 retransmit event Aug 26 13:21:52.679528: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in retransmit_v1_msg() at retry.c:61) Aug 26 13:21:52.679543: | handling event EVENT_RETRANSMIT for 192.1.2.23 "northnet-eastnet-b" #3 keying attempt 1 of 0; retransmit 3 Aug 26 13:21:52.679562: | retransmits: current time 10998.422018; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.995465 exceeds limit? NO Aug 26 13:21:52.679573: | event_schedule: new EVENT_RETRANSMIT-pe@0x7f0f0c002b78 Aug 26 13:21:52.679586: | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #3 Aug 26 13:21:52.679596: | libevent_malloc: new ptr-libevent@0x560749ada478 size 128 Aug 26 13:21:52.679609: "northnet-eastnet-b" #3: STATE_MAIN_I1: retransmission; will wait 2 seconds for response Aug 26 13:21:52.679629: | sending 792 bytes for EVENT_RETRANSMIT through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3) Aug 26 13:21:52.679638: | fc a6 4a c1 e3 3a c1 65 00 00 00 00 00 00 00 00 Aug 26 13:21:52.679646: | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 Aug 26 13:21:52.679653: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Aug 26 13:21:52.679661: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:52.679668: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:21:52.679676: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Aug 26 13:21:52.679683: | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 Aug 26 13:21:52.679690: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Aug 26 13:21:52.679697: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 Aug 26 13:21:52.679705: | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 Aug 26 13:21:52.679712: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:52.679719: | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 Aug 26 13:21:52.679727: | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:52.679734: | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:21:52.679741: | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 Aug 26 13:21:52.679748: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 Aug 26 13:21:52.679756: | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 Aug 26 13:21:52.679763: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 Aug 26 13:21:52.679770: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:21:52.679778: | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:52.679785: | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:21:52.679792: | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:52.679799: | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:21:52.679807: | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 Aug 26 13:21:52.679814: | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 Aug 26 13:21:52.679821: | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 Aug 26 13:21:52.679829: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Aug 26 13:21:52.679836: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:21:52.679843: | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:52.679850: | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:21:52.679858: | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:52.679865: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:21:52.679872: | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:52.679889: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e Aug 26 13:21:52.679897: | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:52.679904: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:21:52.679912: | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:52.679919: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 Aug 26 13:21:52.679926: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:52.679933: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:21:52.679941: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:52.679948: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 Aug 26 13:21:52.679955: | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f Aug 26 13:21:52.679963: | 00 d6 c2 d3 0d 00 00 14 af ca d7 13 68 a1 f1 c9 Aug 26 13:21:52.679970: | 6b 86 96 fc 77 57 01 00 0d 00 00 14 4a 13 1c 81 Aug 26 13:21:52.679977: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 Aug 26 13:21:52.679984: | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Aug 26 13:21:52.679991: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 Aug 26 13:21:52.679999: | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 Aug 26 13:21:52.680006: | 7c fd b2 fc 68 b6 a4 48 Aug 26 13:21:52.680046: ERROR: "northnet-eastnet-b" #3: sendto on eth1 to 192.1.2.23:500 failed in EVENT_RETRANSMIT. Errno 113: No route to host Aug 26 13:21:52.680059: | libevent_free: release ptr-libevent@0x560749ae29c8 Aug 26 13:21:52.680069: | free_event_entry: release EVENT_RETRANSMIT-pe@0x560749ac6aa8 Aug 26 13:21:52.680089: | #3 spent 0.662 milliseconds in timer_event_cb() EVENT_RETRANSMIT Aug 26 13:21:52.680104: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557) Aug 26 13:21:54.682224: | timer_event_cb: processing event@0x7f0f0c002b78 Aug 26 13:21:54.682273: | handling event EVENT_RETRANSMIT for parent state #3 Aug 26 13:21:54.682316: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:21:54.682336: | IKEv1 retransmit event Aug 26 13:21:54.682352: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in retransmit_v1_msg() at retry.c:61) Aug 26 13:21:54.682366: | handling event EVENT_RETRANSMIT for 192.1.2.23 "northnet-eastnet-b" #3 keying attempt 1 of 0; retransmit 4 Aug 26 13:21:54.682385: | retransmits: current time 11000.424842; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.998289 exceeds limit? NO Aug 26 13:21:54.682397: | event_schedule: new EVENT_RETRANSMIT-pe@0x560749ac6aa8 Aug 26 13:21:54.682409: | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #3 Aug 26 13:21:54.682420: | libevent_malloc: new ptr-libevent@0x560749ae29c8 size 128 Aug 26 13:21:54.682433: "northnet-eastnet-b" #3: STATE_MAIN_I1: retransmission; will wait 4 seconds for response Aug 26 13:21:54.682453: | sending 792 bytes for EVENT_RETRANSMIT through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3) Aug 26 13:21:54.682462: | fc a6 4a c1 e3 3a c1 65 00 00 00 00 00 00 00 00 Aug 26 13:21:54.682470: | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 Aug 26 13:21:54.682477: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Aug 26 13:21:54.682484: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:54.682492: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:21:54.682499: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Aug 26 13:21:54.682506: | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 Aug 26 13:21:54.682513: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Aug 26 13:21:54.682521: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 Aug 26 13:21:54.682528: | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 Aug 26 13:21:54.682535: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:54.682542: | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 Aug 26 13:21:54.682563: | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:54.682574: | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:21:54.682587: | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 Aug 26 13:21:54.682599: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 Aug 26 13:21:54.682610: | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 Aug 26 13:21:54.682623: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 Aug 26 13:21:54.682635: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:21:54.682648: | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:54.682661: | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:21:54.682674: | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:54.682685: | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:21:54.682699: | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 Aug 26 13:21:54.682712: | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 Aug 26 13:21:54.682724: | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 Aug 26 13:21:54.682736: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Aug 26 13:21:54.682750: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:21:54.682762: | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:54.682777: | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:21:54.682791: | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:54.682804: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:21:54.682816: | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:54.682829: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e Aug 26 13:21:54.682843: | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:54.682855: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:21:54.682868: | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:54.682881: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 Aug 26 13:21:54.682893: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:54.682906: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:21:54.682918: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:54.682931: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 Aug 26 13:21:54.682944: | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f Aug 26 13:21:54.682955: | 00 d6 c2 d3 0d 00 00 14 af ca d7 13 68 a1 f1 c9 Aug 26 13:21:54.682968: | 6b 86 96 fc 77 57 01 00 0d 00 00 14 4a 13 1c 81 Aug 26 13:21:54.682980: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 Aug 26 13:21:54.682992: | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Aug 26 13:21:54.683005: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 Aug 26 13:21:54.683017: | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 Aug 26 13:21:54.683029: | 7c fd b2 fc 68 b6 a4 48 Aug 26 13:21:54.683083: ERROR: "northnet-eastnet-b" #3: sendto on eth1 to 192.1.2.23:500 failed in EVENT_RETRANSMIT. Errno 113: No route to host Aug 26 13:21:54.683105: | libevent_free: release ptr-libevent@0x560749ada478 Aug 26 13:21:54.683122: | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f0f0c002b78 Aug 26 13:21:54.683151: | #3 spent 0.915 milliseconds in timer_event_cb() EVENT_RETRANSMIT Aug 26 13:21:54.683174: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557) Aug 26 13:21:57.305360: | processing global timer EVENT_SHUNT_SCAN Aug 26 13:21:57.305374: | expiring aged bare shunts from shunt table Aug 26 13:21:57.305380: | spent 0.00404 milliseconds in global timer EVENT_SHUNT_SCAN Aug 26 13:21:57.639736: | processing global timer EVENT_NAT_T_KEEPALIVE Aug 26 13:21:57.639757: | FOR_EACH_STATE_... in nat_traversal_ka_event (for_each_state) Aug 26 13:21:57.639767: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in for_each_state() at state.c:1575) Aug 26 13:21:57.639771: | not behind NAT: no NAT-T KEEP-ALIVE required for conn northnet-eastnet-b Aug 26 13:21:57.639781: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in for_each_state() at state.c:1577) Aug 26 13:21:57.639788: | spent 0.0295 milliseconds in global timer EVENT_NAT_T_KEEPALIVE Aug 26 13:21:57.640502: | spent 0.00378 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:21:57.640531: | NAT-T keep-alive (bogus ?) should not reach this point. Ignored. Sender: 192.1.2.23:500 Aug 26 13:21:57.640538: | spent 0.0181 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:21:58.683354: | timer_event_cb: processing event@0x560749ac6aa8 Aug 26 13:21:58.683381: | handling event EVENT_RETRANSMIT for parent state #3 Aug 26 13:21:58.683390: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:21:58.683395: | IKEv1 retransmit event Aug 26 13:21:58.683400: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in retransmit_v1_msg() at retry.c:61) Aug 26 13:21:58.683406: | handling event EVENT_RETRANSMIT for 192.1.2.23 "northnet-eastnet-b" #3 keying attempt 1 of 0; retransmit 5 Aug 26 13:21:58.683413: | retransmits: current time 11004.425876; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 7.999323 exceeds limit? NO Aug 26 13:21:58.683417: | event_schedule: new EVENT_RETRANSMIT-pe@0x7f0f0c002b78 Aug 26 13:21:58.683422: | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #3 Aug 26 13:21:58.683426: | libevent_malloc: new ptr-libevent@0x560749ada478 size 128 Aug 26 13:21:58.683431: "northnet-eastnet-b" #3: STATE_MAIN_I1: retransmission; will wait 8 seconds for response Aug 26 13:21:58.683439: | sending 792 bytes for EVENT_RETRANSMIT through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3) Aug 26 13:21:58.683442: | fc a6 4a c1 e3 3a c1 65 00 00 00 00 00 00 00 00 Aug 26 13:21:58.683445: | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 Aug 26 13:21:58.683448: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Aug 26 13:21:58.683450: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:58.683453: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:21:58.683455: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Aug 26 13:21:58.683458: | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 Aug 26 13:21:58.683460: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Aug 26 13:21:58.683463: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 Aug 26 13:21:58.683465: | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 Aug 26 13:21:58.683468: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:58.683471: | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 Aug 26 13:21:58.683473: | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:58.683476: | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:21:58.683478: | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 Aug 26 13:21:58.683481: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 Aug 26 13:21:58.683483: | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 Aug 26 13:21:58.683486: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 Aug 26 13:21:58.683488: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:21:58.683491: | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:58.683493: | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:21:58.683496: | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:58.683499: | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:21:58.683501: | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 Aug 26 13:21:58.683504: | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 Aug 26 13:21:58.683506: | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 Aug 26 13:21:58.683509: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Aug 26 13:21:58.683511: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:21:58.683519: | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:21:58.683521: | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:21:58.683524: | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:58.683526: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:21:58.683529: | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:58.683531: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e Aug 26 13:21:58.683534: | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:58.683537: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:21:58.683539: | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:58.683542: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 Aug 26 13:21:58.683544: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:58.683547: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:21:58.683549: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:21:58.683552: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 Aug 26 13:21:58.683554: | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f Aug 26 13:21:58.683557: | 00 d6 c2 d3 0d 00 00 14 af ca d7 13 68 a1 f1 c9 Aug 26 13:21:58.683559: | 6b 86 96 fc 77 57 01 00 0d 00 00 14 4a 13 1c 81 Aug 26 13:21:58.683562: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 Aug 26 13:21:58.683564: | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Aug 26 13:21:58.683567: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 Aug 26 13:21:58.683569: | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 Aug 26 13:21:58.683572: | 7c fd b2 fc 68 b6 a4 48 Aug 26 13:21:58.683589: ERROR: "northnet-eastnet-b" #3: sendto on eth1 to 192.1.2.23:500 failed in EVENT_RETRANSMIT. Errno 113: No route to host Aug 26 13:21:58.683595: | libevent_free: release ptr-libevent@0x560749ae29c8 Aug 26 13:21:58.683598: | free_event_entry: release EVENT_RETRANSMIT-pe@0x560749ac6aa8 Aug 26 13:21:58.683607: | #3 spent 0.255 milliseconds in timer_event_cb() EVENT_RETRANSMIT Aug 26 13:21:58.683612: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557) Aug 26 13:22:06.691796: | timer_event_cb: processing event@0x7f0f0c002b78 Aug 26 13:22:06.691861: | handling event EVENT_RETRANSMIT for parent state #3 Aug 26 13:22:06.691884: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:22:06.691897: | IKEv1 retransmit event Aug 26 13:22:06.691912: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in retransmit_v1_msg() at retry.c:61) Aug 26 13:22:06.691927: | handling event EVENT_RETRANSMIT for 192.1.2.23 "northnet-eastnet-b" #3 keying attempt 1 of 0; retransmit 6 Aug 26 13:22:06.691947: | retransmits: current time 11012.434402; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007849 exceeds limit? NO Aug 26 13:22:06.691959: | event_schedule: new EVENT_RETRANSMIT-pe@0x560749ac6aa8 Aug 26 13:22:06.691971: | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #3 Aug 26 13:22:06.691982: | libevent_malloc: new ptr-libevent@0x560749ae29c8 size 128 Aug 26 13:22:06.691995: "northnet-eastnet-b" #3: STATE_MAIN_I1: retransmission; will wait 16 seconds for response Aug 26 13:22:06.692016: | sending 792 bytes for EVENT_RETRANSMIT through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3) Aug 26 13:22:06.692025: | fc a6 4a c1 e3 3a c1 65 00 00 00 00 00 00 00 00 Aug 26 13:22:06.692033: | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 Aug 26 13:22:06.692040: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Aug 26 13:22:06.692048: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:06.692055: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:22:06.692062: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Aug 26 13:22:06.692070: | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 Aug 26 13:22:06.692101: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Aug 26 13:22:06.692109: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 Aug 26 13:22:06.692117: | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 Aug 26 13:22:06.692124: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:22:06.692132: | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 Aug 26 13:22:06.692139: | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:06.692146: | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:22:06.692153: | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 Aug 26 13:22:06.692161: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 Aug 26 13:22:06.692168: | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 Aug 26 13:22:06.692175: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 Aug 26 13:22:06.692183: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:22:06.692190: | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:22:06.692197: | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:22:06.692205: | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:06.692212: | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:22:06.692219: | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 Aug 26 13:22:06.692227: | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 Aug 26 13:22:06.692234: | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 Aug 26 13:22:06.692241: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Aug 26 13:22:06.692248: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:22:06.692256: | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:22:06.692263: | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:22:06.692270: | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:06.692278: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:22:06.692285: | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:06.692329: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e Aug 26 13:22:06.692337: | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:06.692345: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:22:06.692352: | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:06.692359: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 Aug 26 13:22:06.692367: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:06.692374: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:22:06.692381: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:06.692388: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 Aug 26 13:22:06.692396: | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f Aug 26 13:22:06.692403: | 00 d6 c2 d3 0d 00 00 14 af ca d7 13 68 a1 f1 c9 Aug 26 13:22:06.692410: | 6b 86 96 fc 77 57 01 00 0d 00 00 14 4a 13 1c 81 Aug 26 13:22:06.692417: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 Aug 26 13:22:06.692425: | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Aug 26 13:22:06.692432: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 Aug 26 13:22:06.692439: | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 Aug 26 13:22:06.692446: | 7c fd b2 fc 68 b6 a4 48 Aug 26 13:22:06.692488: ERROR: "northnet-eastnet-b" #3: sendto on eth1 to 192.1.2.23:500 failed in EVENT_RETRANSMIT. Errno 113: No route to host Aug 26 13:22:06.692502: | libevent_free: release ptr-libevent@0x560749ada478 Aug 26 13:22:06.692513: | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f0f0c002b78 Aug 26 13:22:06.692533: | #3 spent 0.713 milliseconds in timer_event_cb() EVENT_RETRANSMIT Aug 26 13:22:06.692549: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557) Aug 26 13:22:17.308453: | processing global timer EVENT_SHUNT_SCAN Aug 26 13:22:17.308528: | expiring aged bare shunts from shunt table Aug 26 13:22:17.308550: | spent 0.0183 milliseconds in global timer EVENT_SHUNT_SCAN Aug 26 13:22:17.641483: | spent 0.00276 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:22:17.641502: | NAT-T keep-alive (bogus ?) should not reach this point. Ignored. Sender: 192.1.2.23:500 Aug 26 13:22:17.641505: | spent 0.0098 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:22:20.237619: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:22:20.237913: | FOR_EACH_CONNECTION_... in show_connections_status Aug 26 13:22:20.237917: | FOR_EACH_CONNECTION_... in show_connections_status Aug 26 13:22:20.238115: | FOR_EACH_STATE_... in show_states_status (sort_states) Aug 26 13:22:20.238118: | FOR_EACH_STATE_... in sort_states Aug 26 13:22:20.238141: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:22:20.238149: | spent 0.537 milliseconds in whack Aug 26 13:22:20.291734: | kernel_process_msg_cb process netlink message Aug 26 13:22:20.291770: | netlink_get: XFRM_MSG_UPDPOLICY message Aug 26 13:22:20.291786: | spent 0.0177 milliseconds in kernel message Aug 26 13:22:21.462434: | kernel_process_msg_cb process netlink message Aug 26 13:22:21.462453: | netlink_get: XFRM_MSG_ACQUIRE message Aug 26 13:22:21.462455: | xfrm netlink msg len 376 Aug 26 13:22:21.462457: | xfrm acquire rtattribute type 5 Aug 26 13:22:21.462458: | xfrm acquire rtattribute type 16 Aug 26 13:22:21.462467: | add bare shunt 0x560749abbf58 192.0.3.254/32:8 --1--> 192.0.22.254/32:0 => %hold 0 %acquire-netlink Aug 26 13:22:21.462472: initiate on demand from 192.0.3.254:8 to 192.0.22.254:0 proto=1 because: acquire Aug 26 13:22:21.462476: | find_connection: looking for policy for connection: 192.0.3.254:1/8 -> 192.0.22.254:1/0 Aug 26 13:22:21.462478: | FOR_EACH_CONNECTION_... in find_connection_for_clients Aug 26 13:22:21.462481: | find_connection: conn "north-a-dpd" has compatible peers: 192.0.3.0/24 -> 192.0.22.0/24 [pri: 25214986] Aug 26 13:22:21.462483: | find_connection: first OK "north-a-dpd" [pri:25214986]{0x560749abade8} (child none) Aug 26 13:22:21.462486: | find_connection: concluding with "north-a-dpd" [pri:25214986]{0x560749abade8} kind=CK_PERMANENT Aug 26 13:22:21.462488: | assign hold, routing was prospective erouted, needs to be erouted HOLD Aug 26 13:22:21.462490: | assign_holdpass() need broad(er) shunt Aug 26 13:22:21.462492: | priority calculation of connection "north-a-dpd" is 0xfe7e7 Aug 26 13:22:21.462495: | eroute_connection replace %trap with broad %pass or %hold eroute 192.0.3.0/24:0 --0-> 192.0.22.0/24:0 => %hold>%hold (raw_eroute) Aug 26 13:22:21.462500: | netlink_raw_eroute: SPI_HOLD implemented as no-op Aug 26 13:22:21.462502: | raw_eroute result=success Aug 26 13:22:21.462504: | assign_holdpass() eroute_connection() done Aug 26 13:22:21.462505: | fiddle_bare_shunt called Aug 26 13:22:21.462507: | fiddle_bare_shunt with transport_proto 1 Aug 26 13:22:21.462508: | removing specific host-to-host bare shunt Aug 26 13:22:21.462511: | delete narrow %hold eroute 192.0.3.254/32:8 --1-> 192.0.22.254/32:0 => %hold (raw_eroute) Aug 26 13:22:21.462513: | netlink_raw_eroute: SPI_PASS Aug 26 13:22:21.462525: | raw_eroute result=success Aug 26 13:22:21.462528: | raw_eroute with op='delete' for transport_proto='1' kernel shunt succeeded, bare shunt lookup succeeded Aug 26 13:22:21.462531: | delete bare shunt 0x560749abbf58 192.0.3.254/32:8 --1--> 192.0.22.254/32:0 => %hold 0 %acquire-netlink Aug 26 13:22:21.462533: assign_holdpass() delete_bare_shunt() failed Aug 26 13:22:21.462534: initiate_ondemand_body() failed to install negotiation_shunt, Aug 26 13:22:21.462536: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:22:21.462539: | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "north-a-dpd" Aug 26 13:22:21.462542: | initiate on demand using RSASIG from 192.0.3.254 to 192.0.22.254 Aug 26 13:22:21.462548: | spent 0.0968 milliseconds in kernel message Aug 26 13:22:22.692992: | timer_event_cb: processing event@0x560749ac6aa8 Aug 26 13:22:22.693058: | handling event EVENT_RETRANSMIT for parent state #3 Aug 26 13:22:22.693094: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:22:22.693107: | IKEv1 retransmit event Aug 26 13:22:22.693122: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in retransmit_v1_msg() at retry.c:61) Aug 26 13:22:22.693137: | handling event EVENT_RETRANSMIT for 192.1.2.23 "northnet-eastnet-b" #3 keying attempt 1 of 0; retransmit 7 Aug 26 13:22:22.693157: | retransmits: current time 11028.435612; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009059 exceeds limit? NO Aug 26 13:22:22.693169: | event_schedule: new EVENT_RETRANSMIT-pe@0x7f0f0c002b78 Aug 26 13:22:22.693182: | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #3 Aug 26 13:22:22.693193: | libevent_malloc: new ptr-libevent@0x560749ada478 size 128 Aug 26 13:22:22.693206: "northnet-eastnet-b" #3: STATE_MAIN_I1: retransmission; will wait 32 seconds for response Aug 26 13:22:22.693226: | sending 792 bytes for EVENT_RETRANSMIT through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3) Aug 26 13:22:22.693235: | fc a6 4a c1 e3 3a c1 65 00 00 00 00 00 00 00 00 Aug 26 13:22:22.693243: | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 Aug 26 13:22:22.693250: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Aug 26 13:22:22.693257: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:22.693265: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:22:22.693272: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Aug 26 13:22:22.693279: | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 Aug 26 13:22:22.693286: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Aug 26 13:22:22.693355: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 Aug 26 13:22:22.693371: | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 Aug 26 13:22:22.693383: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:22:22.693393: | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 Aug 26 13:22:22.693400: | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:22.693408: | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:22:22.693415: | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 Aug 26 13:22:22.693423: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 Aug 26 13:22:22.693430: | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 Aug 26 13:22:22.693437: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 Aug 26 13:22:22.693445: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:22:22.693452: | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:22:22.693459: | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:22:22.693466: | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:22.693474: | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:22:22.693481: | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 Aug 26 13:22:22.693488: | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 Aug 26 13:22:22.693495: | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 Aug 26 13:22:22.693502: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Aug 26 13:22:22.693510: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:22:22.693517: | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:22:22.693524: | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:22:22.693531: | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:22.693539: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:22:22.693546: | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:22.693553: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e Aug 26 13:22:22.693560: | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:22.693568: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:22:22.693575: | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:22.693589: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 Aug 26 13:22:22.693596: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:22.693604: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:22:22.693611: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:22.693618: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 Aug 26 13:22:22.693625: | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f Aug 26 13:22:22.693633: | 00 d6 c2 d3 0d 00 00 14 af ca d7 13 68 a1 f1 c9 Aug 26 13:22:22.693640: | 6b 86 96 fc 77 57 01 00 0d 00 00 14 4a 13 1c 81 Aug 26 13:22:22.693647: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 Aug 26 13:22:22.693654: | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Aug 26 13:22:22.693662: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 Aug 26 13:22:22.693669: | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 Aug 26 13:22:22.693676: | 7c fd b2 fc 68 b6 a4 48 Aug 26 13:22:22.693806: | libevent_free: release ptr-libevent@0x560749ae29c8 Aug 26 13:22:22.693823: | free_event_entry: release EVENT_RETRANSMIT-pe@0x560749ac6aa8 Aug 26 13:22:22.693845: | #3 spent 0.752 milliseconds in timer_event_cb() EVENT_RETRANSMIT Aug 26 13:22:22.693861: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557) Aug 26 13:22:22.696602: | spent 0.0106 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:22:22.696677: | *received 144 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Aug 26 13:22:22.696690: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.696698: | 01 10 02 00 00 00 00 00 00 00 00 90 0d 00 00 38 Aug 26 13:22:22.696705: | 00 00 00 01 00 00 00 01 00 00 00 2c 00 01 00 01 Aug 26 13:22:22.696712: | 00 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:22.696720: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:22:22.696727: | 80 0e 01 00 0d 00 00 14 40 48 b7 d5 6e bc e8 85 Aug 26 13:22:22.696734: | 25 e7 de 7f 00 d6 c2 d3 0d 00 00 14 af ca d7 13 Aug 26 13:22:22.696742: | 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 00 00 00 14 Aug 26 13:22:22.696749: | 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f Aug 26 13:22:22.696763: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:22:22.696774: | **parse ISAKMP Message: Aug 26 13:22:22.696783: | initiator cookie: Aug 26 13:22:22.696791: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:22.696799: | responder cookie: Aug 26 13:22:22.696806: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.696814: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:22:22.696823: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:22.696831: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:22:22.696839: | flags: none (0x0) Aug 26 13:22:22.696848: | Message ID: 0 (0x0) Aug 26 13:22:22.696856: | length: 144 (0x90) Aug 26 13:22:22.696865: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:22:22.696875: | State DB: IKEv1 state not found (find_state_ikev1) Aug 26 13:22:22.696885: | State DB: found IKEv1 state #3 in MAIN_I1 (find_state_ikev1_init) Aug 26 13:22:22.696901: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) Aug 26 13:22:22.696910: | #3 is idle Aug 26 13:22:22.696918: | #3 idle Aug 26 13:22:22.696928: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:22:22.696938: | ***parse ISAKMP Security Association Payload: Aug 26 13:22:22.696946: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:22:22.696954: | length: 56 (0x38) Aug 26 13:22:22.696962: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:22:22.696971: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Aug 26 13:22:22.696980: | ***parse ISAKMP Vendor ID Payload: Aug 26 13:22:22.696987: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:22:22.696995: | length: 20 (0x14) Aug 26 13:22:22.697013: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Aug 26 13:22:22.697021: | ***parse ISAKMP Vendor ID Payload: Aug 26 13:22:22.697029: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:22:22.697037: | length: 20 (0x14) Aug 26 13:22:22.697045: | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 Aug 26 13:22:22.697052: | ***parse ISAKMP Vendor ID Payload: Aug 26 13:22:22.697060: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.697067: | length: 20 (0x14) Aug 26 13:22:22.697076: | message 'main_inR1_outI2' HASH payload not checked early Aug 26 13:22:22.697090: | received Vendor ID payload [FRAGMENTATION] Aug 26 13:22:22.697101: | received Vendor ID payload [Dead Peer Detection] Aug 26 13:22:22.697110: | quirks.qnat_traversal_vid set to=117 [RFC 3947] Aug 26 13:22:22.697118: | received Vendor ID payload [RFC 3947] Aug 26 13:22:22.697130: | ****parse IPsec DOI SIT: Aug 26 13:22:22.697139: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:22:22.697148: | ****parse ISAKMP Proposal Payload: Aug 26 13:22:22.697156: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.697163: | length: 44 (0x2c) Aug 26 13:22:22.697171: | proposal number: 0 (0x0) Aug 26 13:22:22.697179: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:22:22.697187: | SPI size: 0 (0x0) Aug 26 13:22:22.697194: | number of transforms: 1 (0x1) Aug 26 13:22:22.697203: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:22.697211: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.697218: | length: 36 (0x24) Aug 26 13:22:22.697226: | ISAKMP transform number: 0 (0x0) Aug 26 13:22:22.697234: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:22.697242: | ******parse ISAKMP Oakley attribute: Aug 26 13:22:22.697251: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:22.697258: | length/value: 1 (0x1) Aug 26 13:22:22.697267: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:22.697275: | ******parse ISAKMP Oakley attribute: Aug 26 13:22:22.697284: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:22.697310: | length/value: 3600 (0xe10) Aug 26 13:22:22.697331: | ******parse ISAKMP Oakley attribute: Aug 26 13:22:22.697346: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:22.697359: | length/value: 7 (0x7) Aug 26 13:22:22.697370: | [7 is OAKLEY_AES_CBC] Aug 26 13:22:22.697379: | ******parse ISAKMP Oakley attribute: Aug 26 13:22:22.697387: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:22.697395: | length/value: 4 (0x4) Aug 26 13:22:22.697402: | [4 is OAKLEY_SHA2_256] Aug 26 13:22:22.697410: | ******parse ISAKMP Oakley attribute: Aug 26 13:22:22.697418: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:22.697426: | length/value: 3 (0x3) Aug 26 13:22:22.697433: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:22.697441: | ******parse ISAKMP Oakley attribute: Aug 26 13:22:22.697448: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:22.697456: | length/value: 14 (0xe) Aug 26 13:22:22.697464: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:22.697472: | ******parse ISAKMP Oakley attribute: Aug 26 13:22:22.697479: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:22:22.697487: | length/value: 256 (0x100) Aug 26 13:22:22.697496: | OAKLEY proposal verified unconditionally; no alg_info to check against Aug 26 13:22:22.697504: | Oakley Transform 0 accepted Aug 26 13:22:22.697513: | sender checking NAT-T: enabled; VID 117 Aug 26 13:22:22.697520: | returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC Aug 26 13:22:22.697528: | enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) Aug 26 13:22:22.697542: | adding outI2 KE work-order 5 for state #3 Aug 26 13:22:22.697551: | state #3 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:22:22.697560: | #3 STATE_MAIN_I1: retransmits: cleared Aug 26 13:22:22.697571: | libevent_free: release ptr-libevent@0x560749ada478 Aug 26 13:22:22.697581: | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f0f0c002b78 Aug 26 13:22:22.697598: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x560749ac6aa8 Aug 26 13:22:22.697611: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3 Aug 26 13:22:22.697621: | libevent_malloc: new ptr-libevent@0x560749ae29c8 size 128 Aug 26 13:22:22.697647: | complete v1 state transition with STF_SUSPEND Aug 26 13:22:22.697663: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) Aug 26 13:22:22.697672: | suspending state #3 and saving MD Aug 26 13:22:22.697680: | #3 is busy; has a suspended MD Aug 26 13:22:22.697696: | #3 spent 0.551 milliseconds in process_packet_tail() Aug 26 13:22:22.697710: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:22:22.697723: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 13:22:22.697730: | crypto helper 4 resuming Aug 26 13:22:22.697732: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:22:22.697788: | crypto helper 4 starting work-order 5 for state #3 Aug 26 13:22:22.697800: | spent 1.12 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:22:22.697807: | crypto helper 4 doing build KE and nonce (outI2 KE); request ID 5 Aug 26 13:22:22.700444: | crypto helper 4 finished build KE and nonce (outI2 KE); request ID 5 time elapsed 0.002637 seconds Aug 26 13:22:22.700485: | (#3) spent 2.65 milliseconds in crypto helper computing work-order 5: outI2 KE (pcr) Aug 26 13:22:22.700496: | crypto helper 4 sending results from work-order 5 for state #3 to event queue Aug 26 13:22:22.700506: | scheduling resume sending helper answer for #3 Aug 26 13:22:22.700517: | libevent_malloc: new ptr-libevent@0x7f0f00002888 size 128 Aug 26 13:22:22.700541: | crypto helper 4 waiting (nothing to do) Aug 26 13:22:22.700611: | processing resume sending helper answer for #3 Aug 26 13:22:22.700655: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:22:22.700672: | crypto helper 4 replies to request ID 5 Aug 26 13:22:22.700681: | calling continuation function 0x5607486cbb50 Aug 26 13:22:22.700689: | main_inR1_outI2_continue for #3: calculated ke+nonce, sending I2 Aug 26 13:22:22.700708: | **emit ISAKMP Message: Aug 26 13:22:22.700718: | initiator cookie: Aug 26 13:22:22.700725: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:22.700733: | responder cookie: Aug 26 13:22:22.700740: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.700749: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.700758: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:22.700767: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:22:22.700775: | flags: none (0x0) Aug 26 13:22:22.700783: | Message ID: 0 (0x0) Aug 26 13:22:22.700792: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:22:22.700803: | ***emit ISAKMP Key Exchange Payload: Aug 26 13:22:22.700811: | next payload type: ISAKMP_NEXT_NONCE (0xa) Aug 26 13:22:22.700821: | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE Aug 26 13:22:22.700831: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) Aug 26 13:22:22.700841: | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' Aug 26 13:22:22.700851: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload Aug 26 13:22:22.700860: | keyex value f6 ed 13 b7 88 f1 cb 9c 16 7a 32 0e 98 0d 69 a3 Aug 26 13:22:22.700868: | keyex value a5 f1 d9 43 e6 ee 1d 14 07 93 ca 9b 11 9a f5 a6 Aug 26 13:22:22.700875: | keyex value 44 58 fb c1 1a c3 10 cb 3b 59 b3 b5 55 f0 c3 7c Aug 26 13:22:22.700883: | keyex value 07 b8 d2 ea 37 64 15 5e a7 e5 03 62 f8 32 db 8a Aug 26 13:22:22.700890: | keyex value 68 ba a6 90 7b 1d a9 ea 83 6f c4 32 f5 b4 62 e9 Aug 26 13:22:22.700907: | keyex value ae 4b 5d d2 6c df 6b 15 d2 28 2e 7c 00 8e ea 03 Aug 26 13:22:22.700915: | keyex value 0e f5 35 38 b3 85 2a 0d 27 a3 49 c8 e6 bc 16 a0 Aug 26 13:22:22.700923: | keyex value 7b be 50 60 5d ec 59 24 1b 88 ec 35 83 1e 09 9e Aug 26 13:22:22.700930: | keyex value 7c e7 3d 01 49 fe 66 9d 6e 4d 8a 9a 35 d9 85 03 Aug 26 13:22:22.700938: | keyex value 11 b7 77 f9 0a e7 e0 70 f4 ad 73 c0 08 79 17 08 Aug 26 13:22:22.700945: | keyex value da f6 66 86 b8 56 f1 d5 f5 70 73 84 02 69 42 6c Aug 26 13:22:22.700953: | keyex value 33 5f 1d 9d a3 fd 07 bc 23 d6 69 7f b1 8a 55 96 Aug 26 13:22:22.700960: | keyex value 2b 04 f2 89 6d 0e f8 11 0c d7 d9 11 ae 5a f6 f7 Aug 26 13:22:22.700968: | keyex value aa 6a d2 8c 60 bf da df 48 78 82 37 b6 2f 81 1a Aug 26 13:22:22.700975: | keyex value 7f 3e 71 72 27 15 89 2f 2d d0 d3 df 74 72 ca 5a Aug 26 13:22:22.700983: | keyex value 4e c3 f0 ee 8a b1 6b d1 44 a2 ef 62 19 0d 27 2b Aug 26 13:22:22.700991: | emitting length of ISAKMP Key Exchange Payload: 260 Aug 26 13:22:22.701000: | ***emit ISAKMP Nonce Payload: Aug 26 13:22:22.701008: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.701018: | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) Aug 26 13:22:22.701027: | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' Aug 26 13:22:22.701036: | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload Aug 26 13:22:22.701044: | Ni 1d d3 76 aa bf ae c2 6f bc 45 7a 1b 20 93 cf 64 Aug 26 13:22:22.701052: | Ni 98 cd 98 97 6a d2 22 ac 12 eb 5b a0 84 3f b4 40 Aug 26 13:22:22.701060: | emitting length of ISAKMP Nonce Payload: 36 Aug 26 13:22:22.701067: | NAT-T checking st_nat_traversal Aug 26 13:22:22.701075: | NAT-T found (implies NAT_T_WITH_NATD) Aug 26 13:22:22.701082: | sending NAT-D payloads Aug 26 13:22:22.701120: | natd_hash: hasher=0x5607487a0ca0(32) Aug 26 13:22:22.701129: | natd_hash: icookie= fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:22.701137: | natd_hash: rcookie= 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.701145: | natd_hash: ip= c0 01 02 17 Aug 26 13:22:22.701152: | natd_hash: port=500 Aug 26 13:22:22.701160: | natd_hash: hash= 6a 19 76 cc 77 ae 36 9b 70 a3 ce 7d 57 83 5e 9a Aug 26 13:22:22.701168: | natd_hash: hash= 2b a7 1a a5 27 af ce 17 e2 db 77 dc 77 8b 16 ea Aug 26 13:22:22.701177: | ***emit ISAKMP NAT-D Payload: Aug 26 13:22:22.701185: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Aug 26 13:22:22.701194: | next payload chain: ignoring supplied 'ISAKMP NAT-D Payload'.'next payload type' value 20:ISAKMP_NEXT_NATD_RFC Aug 26 13:22:22.701204: | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) Aug 26 13:22:22.701213: | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' Aug 26 13:22:22.701221: | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload Aug 26 13:22:22.701229: | NAT-D 6a 19 76 cc 77 ae 36 9b 70 a3 ce 7d 57 83 5e 9a Aug 26 13:22:22.701237: | NAT-D 2b a7 1a a5 27 af ce 17 e2 db 77 dc 77 8b 16 ea Aug 26 13:22:22.701245: | emitting length of ISAKMP NAT-D Payload: 36 Aug 26 13:22:22.701272: | natd_hash: hasher=0x5607487a0ca0(32) Aug 26 13:22:22.701281: | natd_hash: icookie= fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:22.701306: | natd_hash: rcookie= 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.701333: | natd_hash: ip= c0 01 03 21 Aug 26 13:22:22.701346: | natd_hash: port=500 Aug 26 13:22:22.701360: | natd_hash: hash= ff 91 1c 01 2e 38 d4 a0 f1 0d 51 7e 8c ef 41 30 Aug 26 13:22:22.701371: | natd_hash: hash= fb 04 9d dd 76 4a 34 93 d7 e5 ca 3f 4c 88 d8 ac Aug 26 13:22:22.701379: | ***emit ISAKMP NAT-D Payload: Aug 26 13:22:22.701387: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.701397: | next payload chain: setting previous 'ISAKMP NAT-D Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) Aug 26 13:22:22.701412: | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' Aug 26 13:22:22.701422: | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload Aug 26 13:22:22.701430: | NAT-D ff 91 1c 01 2e 38 d4 a0 f1 0d 51 7e 8c ef 41 30 Aug 26 13:22:22.701437: | NAT-D fb 04 9d dd 76 4a 34 93 d7 e5 ca 3f 4c 88 d8 ac Aug 26 13:22:22.701445: | emitting length of ISAKMP NAT-D Payload: 36 Aug 26 13:22:22.701453: | no IKEv1 message padding required Aug 26 13:22:22.701460: | emitting length of ISAKMP Message: 396 Aug 26 13:22:22.701469: | State DB: re-hashing IKEv1 state #3 IKE SPIi and SPI[ir] Aug 26 13:22:22.701487: | complete v1 state transition with STF_OK Aug 26 13:22:22.701503: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:22:22.701512: | #3 is idle Aug 26 13:22:22.701520: | doing_xauth:no, t_xauth_client_done:no Aug 26 13:22:22.701527: | peer supports fragmentation Aug 26 13:22:22.701534: | peer supports DPD Aug 26 13:22:22.701543: | IKEv1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 Aug 26 13:22:22.701553: | parent state #3: MAIN_I1(half-open IKE SA) => MAIN_I2(open IKE SA) Aug 26 13:22:22.701561: | event_already_set, deleting event Aug 26 13:22:22.701569: | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:22:22.701580: | libevent_free: release ptr-libevent@0x560749ae29c8 Aug 26 13:22:22.701590: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x560749ac6aa8 Aug 26 13:22:22.701607: | sending reply packet to 192.1.2.23:500 (from 192.1.3.33:500) Aug 26 13:22:22.701632: | sending 396 bytes for STATE_MAIN_I1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3) Aug 26 13:22:22.701641: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.701648: | 04 10 02 00 00 00 00 00 00 00 01 8c 0a 00 01 04 Aug 26 13:22:22.701656: | f6 ed 13 b7 88 f1 cb 9c 16 7a 32 0e 98 0d 69 a3 Aug 26 13:22:22.701663: | a5 f1 d9 43 e6 ee 1d 14 07 93 ca 9b 11 9a f5 a6 Aug 26 13:22:22.701670: | 44 58 fb c1 1a c3 10 cb 3b 59 b3 b5 55 f0 c3 7c Aug 26 13:22:22.701677: | 07 b8 d2 ea 37 64 15 5e a7 e5 03 62 f8 32 db 8a Aug 26 13:22:22.701685: | 68 ba a6 90 7b 1d a9 ea 83 6f c4 32 f5 b4 62 e9 Aug 26 13:22:22.701692: | ae 4b 5d d2 6c df 6b 15 d2 28 2e 7c 00 8e ea 03 Aug 26 13:22:22.701699: | 0e f5 35 38 b3 85 2a 0d 27 a3 49 c8 e6 bc 16 a0 Aug 26 13:22:22.701706: | 7b be 50 60 5d ec 59 24 1b 88 ec 35 83 1e 09 9e Aug 26 13:22:22.701714: | 7c e7 3d 01 49 fe 66 9d 6e 4d 8a 9a 35 d9 85 03 Aug 26 13:22:22.701721: | 11 b7 77 f9 0a e7 e0 70 f4 ad 73 c0 08 79 17 08 Aug 26 13:22:22.701728: | da f6 66 86 b8 56 f1 d5 f5 70 73 84 02 69 42 6c Aug 26 13:22:22.701735: | 33 5f 1d 9d a3 fd 07 bc 23 d6 69 7f b1 8a 55 96 Aug 26 13:22:22.701742: | 2b 04 f2 89 6d 0e f8 11 0c d7 d9 11 ae 5a f6 f7 Aug 26 13:22:22.701750: | aa 6a d2 8c 60 bf da df 48 78 82 37 b6 2f 81 1a Aug 26 13:22:22.701757: | 7f 3e 71 72 27 15 89 2f 2d d0 d3 df 74 72 ca 5a Aug 26 13:22:22.701764: | 4e c3 f0 ee 8a b1 6b d1 44 a2 ef 62 19 0d 27 2b Aug 26 13:22:22.701771: | 14 00 00 24 1d d3 76 aa bf ae c2 6f bc 45 7a 1b Aug 26 13:22:22.701779: | 20 93 cf 64 98 cd 98 97 6a d2 22 ac 12 eb 5b a0 Aug 26 13:22:22.701786: | 84 3f b4 40 14 00 00 24 6a 19 76 cc 77 ae 36 9b Aug 26 13:22:22.701793: | 70 a3 ce 7d 57 83 5e 9a 2b a7 1a a5 27 af ce 17 Aug 26 13:22:22.701800: | e2 db 77 dc 77 8b 16 ea 00 00 00 24 ff 91 1c 01 Aug 26 13:22:22.701808: | 2e 38 d4 a0 f1 0d 51 7e 8c ef 41 30 fb 04 9d dd Aug 26 13:22:22.701815: | 76 4a 34 93 d7 e5 ca 3f 4c 88 d8 ac Aug 26 13:22:22.701901: | !event_already_set at reschedule Aug 26 13:22:22.701919: | event_schedule: new EVENT_RETRANSMIT-pe@0x560749ac6aa8 Aug 26 13:22:22.701933: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #3 Aug 26 13:22:22.701943: | libevent_malloc: new ptr-libevent@0x560749abc1f8 size 128 Aug 26 13:22:22.701965: | #3 STATE_MAIN_I2: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11028.444381 Aug 26 13:22:22.701976: "northnet-eastnet-b" #3: STATE_MAIN_I2: sent MI2, expecting MR2 Aug 26 13:22:22.701985: | modecfg pull: noquirk policy:push not-client Aug 26 13:22:22.701993: | phase 1 is done, looking for phase 2 to unpend Aug 26 13:22:22.702005: | resume sending helper answer for #3 suppresed complete_v1_state_transition() Aug 26 13:22:22.702023: | #3 spent 1.29 milliseconds in resume sending helper answer Aug 26 13:22:22.702039: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:22:22.702049: | libevent_free: release ptr-libevent@0x7f0f00002888 Aug 26 13:22:22.707991: | spent 0.0102 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:22:22.708065: | *received 576 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Aug 26 13:22:22.708078: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.708087: | 04 10 02 00 00 00 00 00 00 00 02 40 0a 00 01 04 Aug 26 13:22:22.708094: | 8b 5a e1 b1 96 4e 74 5d 29 29 08 10 bf d8 92 d6 Aug 26 13:22:22.708101: | c0 82 d5 11 c3 5f 95 bd 14 76 aa 4e 95 1f 2c 93 Aug 26 13:22:22.708109: | de bd 8a 93 2c cd f8 a3 db c7 84 a2 54 79 2b 01 Aug 26 13:22:22.708116: | c4 e6 35 8c 50 1d 28 b7 3f 00 24 ea 05 f0 37 29 Aug 26 13:22:22.708123: | d7 29 63 ed 20 37 06 ee 57 17 d7 6b 89 3a ac bc Aug 26 13:22:22.708131: | fe e6 f9 a7 f4 9c 90 70 c7 2e 3c e5 59 c7 e2 87 Aug 26 13:22:22.708138: | 45 1f 1e fc bf ed 49 ee 57 73 9c c0 53 36 b7 a3 Aug 26 13:22:22.708145: | e1 73 46 ac 9d 3f 20 7a c0 aa d4 de 37 c5 42 8b Aug 26 13:22:22.708153: | 30 cc 0a b6 47 58 5a a3 f4 14 56 65 51 8d f3 df Aug 26 13:22:22.708160: | ac d8 c9 7d 00 ea a7 38 8b 81 56 9d 2a 73 be 49 Aug 26 13:22:22.708167: | d7 7d ff d5 e7 8f 90 9c 7f 25 70 bc 04 10 32 b8 Aug 26 13:22:22.708174: | 4a 26 42 87 97 3e 99 99 7e 63 50 d0 4e 3a 81 d1 Aug 26 13:22:22.708182: | df a2 fe 9c 3f f2 00 cd fd 74 b4 4f c2 3a 38 d0 Aug 26 13:22:22.708189: | fc 08 0b 4f 4d 94 22 5e 89 00 36 75 c5 3e c4 d1 Aug 26 13:22:22.708196: | 88 0f 9d c7 a9 02 df 1a cb 2e 81 cf 1f 05 c1 39 Aug 26 13:22:22.708204: | 84 29 d3 6c 5e 23 8d 81 78 e0 6c 62 bb 40 93 6e Aug 26 13:22:22.708211: | 07 00 00 24 6b 74 70 18 d6 27 5b fe 05 ba 27 d5 Aug 26 13:22:22.708218: | 70 e7 74 41 d0 61 7b e9 b6 54 f8 ba ce 25 6f 96 Aug 26 13:22:22.708225: | 82 92 9b 01 14 00 00 b4 04 30 81 ac 31 0b 30 09 Aug 26 13:22:22.708233: | 06 03 55 04 06 13 02 43 41 31 10 30 0e 06 03 55 Aug 26 13:22:22.708240: | 04 08 0c 07 4f 6e 74 61 72 69 6f 31 10 30 0e 06 Aug 26 13:22:22.708247: | 03 55 04 07 0c 07 54 6f 72 6f 6e 74 6f 31 12 30 Aug 26 13:22:22.708254: | 10 06 03 55 04 0a 0c 09 4c 69 62 72 65 73 77 61 Aug 26 13:22:22.708262: | 6e 31 18 30 16 06 03 55 04 0b 0c 0f 54 65 73 74 Aug 26 13:22:22.708269: | 20 44 65 70 61 72 74 6d 65 6e 74 31 25 30 23 06 Aug 26 13:22:22.708276: | 03 55 04 03 0c 1c 4c 69 62 72 65 73 77 61 6e 20 Aug 26 13:22:22.708284: | 74 65 73 74 20 43 41 20 66 6f 72 20 6d 61 69 6e Aug 26 13:22:22.708308: | 63 61 31 24 30 22 06 09 2a 86 48 86 f7 0d 01 09 Aug 26 13:22:22.708320: | 01 16 15 74 65 73 74 69 6e 67 40 6c 69 62 72 65 Aug 26 13:22:22.708328: | 73 77 61 6e 2e 6f 72 67 14 00 00 24 ff 91 1c 01 Aug 26 13:22:22.708335: | 2e 38 d4 a0 f1 0d 51 7e 8c ef 41 30 fb 04 9d dd Aug 26 13:22:22.708342: | 76 4a 34 93 d7 e5 ca 3f 4c 88 d8 ac 00 00 00 24 Aug 26 13:22:22.708349: | 6a 19 76 cc 77 ae 36 9b 70 a3 ce 7d 57 83 5e 9a Aug 26 13:22:22.708357: | 2b a7 1a a5 27 af ce 17 e2 db 77 dc 77 8b 16 ea Aug 26 13:22:22.708371: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:22:22.708382: | **parse ISAKMP Message: Aug 26 13:22:22.708392: | initiator cookie: Aug 26 13:22:22.708408: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:22.708417: | responder cookie: Aug 26 13:22:22.708424: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.708433: | next payload type: ISAKMP_NEXT_KE (0x4) Aug 26 13:22:22.708441: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:22.708450: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:22:22.708458: | flags: none (0x0) Aug 26 13:22:22.708466: | Message ID: 0 (0x0) Aug 26 13:22:22.708474: | length: 576 (0x240) Aug 26 13:22:22.708483: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:22:22.708495: | State DB: found IKEv1 state #3 in MAIN_I2 (find_state_ikev1) Aug 26 13:22:22.708511: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) Aug 26 13:22:22.708520: | #3 is idle Aug 26 13:22:22.708527: | #3 idle Aug 26 13:22:22.708537: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410 opt: 0x102080 Aug 26 13:22:22.708546: | ***parse ISAKMP Key Exchange Payload: Aug 26 13:22:22.708555: | next payload type: ISAKMP_NEXT_NONCE (0xa) Aug 26 13:22:22.708563: | length: 260 (0x104) Aug 26 13:22:22.708572: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x102080 Aug 26 13:22:22.708580: | ***parse ISAKMP Nonce Payload: Aug 26 13:22:22.708587: | next payload type: ISAKMP_NEXT_CR (0x7) Aug 26 13:22:22.708595: | length: 36 (0x24) Aug 26 13:22:22.708604: | got payload 0x80 (ISAKMP_NEXT_CR) needed: 0x0 opt: 0x102080 Aug 26 13:22:22.708612: | ***parse ISAKMP Certificate RequestPayload: Aug 26 13:22:22.708620: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Aug 26 13:22:22.708628: | length: 180 (0xb4) Aug 26 13:22:22.708636: | cert type: CERT_X509_SIGNATURE (0x4) Aug 26 13:22:22.708645: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080 Aug 26 13:22:22.708652: | ***parse ISAKMP NAT-D Payload: Aug 26 13:22:22.708660: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) Aug 26 13:22:22.708668: | length: 36 (0x24) Aug 26 13:22:22.708676: | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080 Aug 26 13:22:22.708683: | ***parse ISAKMP NAT-D Payload: Aug 26 13:22:22.708691: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.708698: | length: 36 (0x24) Aug 26 13:22:22.708707: | message 'main_inR2_outI3' HASH payload not checked early Aug 26 13:22:22.708750: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK Aug 26 13:22:22.708772: | actually looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK Aug 26 13:22:22.708801: | line 0: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA Aug 26 13:22:22.708811: | line 1: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA Aug 26 13:22:22.708822: | concluding with best_match=000 best=(nil) (lineno=-1) Aug 26 13:22:22.708829: | no PreShared Key Found Aug 26 13:22:22.708843: | adding aggr outR1 DH work-order 6 for state #3 Aug 26 13:22:22.708852: | state #3 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:22:22.708861: | #3 STATE_MAIN_I2: retransmits: cleared Aug 26 13:22:22.708872: | libevent_free: release ptr-libevent@0x560749abc1f8 Aug 26 13:22:22.708882: | free_event_entry: release EVENT_RETRANSMIT-pe@0x560749ac6aa8 Aug 26 13:22:22.708892: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f0f00002b78 Aug 26 13:22:22.708905: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3 Aug 26 13:22:22.708920: | libevent_malloc: new ptr-libevent@0x7f0f00002888 size 128 Aug 26 13:22:22.708949: | complete v1 state transition with STF_SUSPEND Aug 26 13:22:22.708966: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) Aug 26 13:22:22.708974: | suspending state #3 and saving MD Aug 26 13:22:22.708982: | #3 is busy; has a suspended MD Aug 26 13:22:22.708998: | #3 spent 0.276 milliseconds in process_packet_tail() Aug 26 13:22:22.709009: | crypto helper 5 resuming Aug 26 13:22:22.709012: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:22:22.709113: | crypto helper 5 starting work-order 6 for state #3 Aug 26 13:22:22.709160: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 13:22:22.709174: | crypto helper 5 doing compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 6 Aug 26 13:22:22.709177: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:22:22.709219: | spent 1.08 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:22:22.712367: | crypto helper 5 finished compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 6 time elapsed 0.003192 seconds Aug 26 13:22:22.712411: | (#3) spent 3.19 milliseconds in crypto helper computing work-order 6: aggr outR1 DH (pcr) Aug 26 13:22:22.712422: | crypto helper 5 sending results from work-order 6 for state #3 to event queue Aug 26 13:22:22.712431: | scheduling resume sending helper answer for #3 Aug 26 13:22:22.712442: | libevent_malloc: new ptr-libevent@0x7f0ef4000f48 size 128 Aug 26 13:22:22.712466: | crypto helper 5 waiting (nothing to do) Aug 26 13:22:22.712550: | processing resume sending helper answer for #3 Aug 26 13:22:22.712594: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:22:22.712611: | crypto helper 5 replies to request ID 6 Aug 26 13:22:22.712620: | calling continuation function 0x5607486cbb50 Aug 26 13:22:22.712628: | main_inR2_outI3_cryptotail for #3: calculated DH, sending R1 Aug 26 13:22:22.712644: | **emit ISAKMP Message: Aug 26 13:22:22.712654: | initiator cookie: Aug 26 13:22:22.712662: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:22.712669: | responder cookie: Aug 26 13:22:22.712676: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.712685: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:22:22.712694: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:22.712703: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:22:22.712711: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:22:22.712719: | Message ID: 0 (0x0) Aug 26 13:22:22.712729: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:22:22.712738: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 5:ISAKMP_NEXT_ID Aug 26 13:22:22.712751: | CR 30 81 ac 31 0b 30 09 06 03 55 04 06 13 02 43 41 Aug 26 13:22:22.712759: | CR 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 Aug 26 13:22:22.712766: | CR 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 Aug 26 13:22:22.712774: | CR 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c Aug 26 13:22:22.712781: | CR 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 Aug 26 13:22:22.712788: | CR 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 Aug 26 13:22:22.712796: | CR 6e 74 31 25 30 23 06 03 55 04 03 0c 1c 4c 69 62 Aug 26 13:22:22.712803: | CR 72 65 73 77 61 6e 20 74 65 73 74 20 43 41 20 66 Aug 26 13:22:22.712811: | CR 6f 72 20 6d 61 69 6e 63 61 31 24 30 22 06 09 2a Aug 26 13:22:22.712818: | CR 86 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 6e Aug 26 13:22:22.712825: | CR 67 40 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 Aug 26 13:22:22.712850: | requested CA: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:22.712868: | thinking about whether to send my certificate: Aug 26 13:22:22.712877: | I have RSA key: OAKLEY_RSA_SIG cert.type: CERT_X509_SIGNATURE Aug 26 13:22:22.712886: | sendcert: CERT_ALWAYSSEND and I did get a certificate request Aug 26 13:22:22.712893: | so send cert. Aug 26 13:22:22.712904: | I am sending a certificate request Aug 26 13:22:22.712911: | I will NOT send an initial contact payload Aug 26 13:22:22.712920: | init checking NAT-T: enabled; RFC 3947 (NAT-Traversal) Aug 26 13:22:22.712956: | natd_hash: hasher=0x5607487a0ca0(32) Aug 26 13:22:22.712966: | natd_hash: icookie= fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:22.712974: | natd_hash: rcookie= 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.712981: | natd_hash: ip= c0 01 03 21 Aug 26 13:22:22.712989: | natd_hash: port=500 Aug 26 13:22:22.712997: | natd_hash: hash= ff 91 1c 01 2e 38 d4 a0 f1 0d 51 7e 8c ef 41 30 Aug 26 13:22:22.713005: | natd_hash: hash= fb 04 9d dd 76 4a 34 93 d7 e5 ca 3f 4c 88 d8 ac Aug 26 13:22:22.713023: | natd_hash: hasher=0x5607487a0ca0(32) Aug 26 13:22:22.713031: | natd_hash: icookie= fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:22.713039: | natd_hash: rcookie= 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.713046: | natd_hash: ip= c0 01 02 17 Aug 26 13:22:22.713053: | natd_hash: port=500 Aug 26 13:22:22.713061: | natd_hash: hash= 6a 19 76 cc 77 ae 36 9b 70 a3 ce 7d 57 83 5e 9a Aug 26 13:22:22.713068: | natd_hash: hash= 2b a7 1a a5 27 af ce 17 e2 db 77 dc 77 8b 16 ea Aug 26 13:22:22.713076: | expected NAT-D(me): ff 91 1c 01 2e 38 d4 a0 f1 0d 51 7e 8c ef 41 30 Aug 26 13:22:22.713084: | expected NAT-D(me): fb 04 9d dd 76 4a 34 93 d7 e5 ca 3f 4c 88 d8 ac Aug 26 13:22:22.713092: | expected NAT-D(him): Aug 26 13:22:22.713099: | 6a 19 76 cc 77 ae 36 9b 70 a3 ce 7d 57 83 5e 9a Aug 26 13:22:22.713107: | 2b a7 1a a5 27 af ce 17 e2 db 77 dc 77 8b 16 ea Aug 26 13:22:22.713115: | received NAT-D: ff 91 1c 01 2e 38 d4 a0 f1 0d 51 7e 8c ef 41 30 Aug 26 13:22:22.713122: | received NAT-D: fb 04 9d dd 76 4a 34 93 d7 e5 ca 3f 4c 88 d8 ac Aug 26 13:22:22.713131: | received NAT-D: 6a 19 76 cc 77 ae 36 9b 70 a3 ce 7d 57 83 5e 9a Aug 26 13:22:22.713138: | received NAT-D: 2b a7 1a a5 27 af ce 17 e2 db 77 dc 77 8b 16 ea Aug 26 13:22:22.713146: | NAT_TRAVERSAL encaps using auto-detect Aug 26 13:22:22.713154: | NAT_TRAVERSAL this end is NOT behind NAT Aug 26 13:22:22.713161: | NAT_TRAVERSAL that end is NOT behind NAT Aug 26 13:22:22.713172: | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 Aug 26 13:22:22.713181: | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected Aug 26 13:22:22.713188: | NAT_T_WITH_KA detected Aug 26 13:22:22.713198: | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds Aug 26 13:22:22.713210: | ***emit ISAKMP Identification Payload (IPsec DOI): Aug 26 13:22:22.713219: | next payload type: ISAKMP_NEXT_CERT (0x6) Aug 26 13:22:22.713227: | ID type: ID_DER_ASN1_DN (0x9) Aug 26 13:22:22.713235: | Protocol ID: 0 (0x0) Aug 26 13:22:22.713243: | port: 0 (0x0) Aug 26 13:22:22.713253: | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 6:ISAKMP_NEXT_CERT Aug 26 13:22:22.713263: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) Aug 26 13:22:22.713273: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' Aug 26 13:22:22.713284: | emitting 185 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:22:22.713330: | my identity 30 81 b6 31 0b 30 09 06 03 55 04 06 13 02 43 41 Aug 26 13:22:22.713339: | my identity 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 Aug 26 13:22:22.713347: | my identity 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 Aug 26 13:22:22.713354: | my identity 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c Aug 26 13:22:22.713367: | my identity 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 Aug 26 13:22:22.713375: | my identity 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 Aug 26 13:22:22.713383: | my identity 6e 74 31 24 30 22 06 03 55 04 03 0c 1b 6e 6f 72 Aug 26 13:22:22.713390: | my identity 74 68 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 Aug 26 13:22:22.713397: | my identity 73 77 61 6e 2e 6f 72 67 31 2f 30 2d 06 09 2a 86 Aug 26 13:22:22.713405: | my identity 48 86 f7 0d 01 09 01 16 20 75 73 65 72 2d 6e 6f Aug 26 13:22:22.713412: | my identity 72 74 68 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 Aug 26 13:22:22.713420: | my identity 65 73 77 61 6e 2e 6f 72 67 Aug 26 13:22:22.713428: | emitting length of ISAKMP Identification Payload (IPsec DOI): 193 Aug 26 13:22:22.713438: "northnet-eastnet-b" #3: I am sending my cert Aug 26 13:22:22.713448: | ***emit ISAKMP Certificate Payload: Aug 26 13:22:22.713457: | next payload type: ISAKMP_NEXT_CR (0x7) Aug 26 13:22:22.713465: | cert encoding: CERT_X509_SIGNATURE (0x4) Aug 26 13:22:22.713474: | next payload chain: ignoring supplied 'ISAKMP Certificate Payload'.'next payload type' value 7:ISAKMP_NEXT_CR Aug 26 13:22:22.713484: | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Certificate Payload (6:ISAKMP_NEXT_CERT) Aug 26 13:22:22.713493: | next payload chain: saving location 'ISAKMP Certificate Payload'.'next payload type' in 'reply packet' Aug 26 13:22:22.713503: | emitting 1227 raw bytes of CERT into ISAKMP Certificate Payload Aug 26 13:22:22.713511: | CERT 30 82 04 c7 30 82 04 30 a0 03 02 01 02 02 01 06 Aug 26 13:22:22.713518: | CERT 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 Aug 26 13:22:22.713526: | CERT 81 ac 31 0b 30 09 06 03 55 04 06 13 02 43 41 31 Aug 26 13:22:22.713533: | CERT 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 69 Aug 26 13:22:22.713540: | CERT 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 6f Aug 26 13:22:22.713548: | CERT 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c 69 Aug 26 13:22:22.713555: | CERT 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 0b Aug 26 13:22:22.713562: | CERT 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 6e Aug 26 13:22:22.713570: | CERT 74 31 25 30 23 06 03 55 04 03 0c 1c 4c 69 62 72 Aug 26 13:22:22.713577: | CERT 65 73 77 61 6e 20 74 65 73 74 20 43 41 20 66 6f Aug 26 13:22:22.713584: | CERT 72 20 6d 61 69 6e 63 61 31 24 30 22 06 09 2a 86 Aug 26 13:22:22.713591: | CERT 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 6e 67 Aug 26 13:22:22.713599: | CERT 40 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 30 22 Aug 26 13:22:22.713606: | CERT 18 0f 32 30 31 39 30 38 32 34 30 39 30 37 35 33 Aug 26 13:22:22.713613: | CERT 5a 18 0f 32 30 32 32 30 38 32 33 30 39 30 37 35 Aug 26 13:22:22.713621: | CERT 33 5a 30 81 b6 31 0b 30 09 06 03 55 04 06 13 02 Aug 26 13:22:22.713628: | CERT 43 41 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 Aug 26 13:22:22.713635: | CERT 61 72 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 Aug 26 13:22:22.713643: | CERT 6f 72 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c Aug 26 13:22:22.713650: | CERT 09 4c 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 Aug 26 13:22:22.713657: | CERT 55 04 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 Aug 26 13:22:22.713665: | CERT 6d 65 6e 74 31 24 30 22 06 03 55 04 03 0c 1b 6e Aug 26 13:22:22.713672: | CERT 6f 72 74 68 2e 74 65 73 74 69 6e 67 2e 6c 69 62 Aug 26 13:22:22.713679: | CERT 72 65 73 77 61 6e 2e 6f 72 67 31 2f 30 2d 06 09 Aug 26 13:22:22.713687: | CERT 2a 86 48 86 f7 0d 01 09 01 16 20 75 73 65 72 2d Aug 26 13:22:22.713694: | CERT 6e 6f 72 74 68 40 74 65 73 74 69 6e 67 2e 6c 69 Aug 26 13:22:22.713701: | CERT 62 72 65 73 77 61 6e 2e 6f 72 67 30 82 01 a2 30 Aug 26 13:22:22.713709: | CERT 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 Aug 26 13:22:22.713716: | CERT 01 8f 00 30 82 01 8a 02 82 01 81 00 c0 59 bd 4b Aug 26 13:22:22.713723: | CERT 40 fd f4 2c e7 cf 9e f3 29 e6 61 73 de ab 42 3d Aug 26 13:22:22.713730: | CERT cc 51 1a e8 79 d6 53 46 a1 fd 66 d1 9e ab b4 65 Aug 26 13:22:22.713742: | CERT 76 51 ad 3f 6f 8f ef d2 73 f9 fd 8f 44 b0 6c 36 Aug 26 13:22:22.713749: | CERT 4b 95 c3 b2 45 0f 31 0c e9 df 35 95 44 c0 19 53 Aug 26 13:22:22.713756: | CERT 8d df 6a 4b b2 af d6 d3 e8 dd f5 20 df 9c cd 8a Aug 26 13:22:22.713764: | CERT f7 6a 09 92 60 00 45 44 39 4c 17 6c 06 02 91 37 Aug 26 13:22:22.713771: | CERT 4b f5 6a c3 5e 21 c6 64 32 32 98 1d b7 99 1f 3c Aug 26 13:22:22.713778: | CERT 13 fe ec c7 a4 a5 3b 37 30 df e4 31 95 47 91 b1 Aug 26 13:22:22.713785: | CERT ca 96 66 b7 9e 49 65 a2 4c 79 54 17 ed 68 19 34 Aug 26 13:22:22.713793: | CERT 9d 7e 67 91 27 51 f0 ee cb b3 90 68 7c 1d fd 83 Aug 26 13:22:22.713800: | CERT 32 06 2e e6 6f d5 f0 62 00 4d ef 11 90 b6 ad 61 Aug 26 13:22:22.713807: | CERT 83 0b 21 94 18 d9 2b 88 09 0d 33 2e 3b 71 18 f4 Aug 26 13:22:22.713815: | CERT ce 4a 45 f3 37 f4 db c0 d6 ab c2 da da cd 6d e0 Aug 26 13:22:22.713822: | CERT a3 9d 21 53 19 34 b1 0c d9 63 7c 45 b7 26 a4 d9 Aug 26 13:22:22.713829: | CERT d6 93 25 1e 1f 74 3c 07 32 69 9b bc 0f db ba 3e Aug 26 13:22:22.713836: | CERT 30 85 a4 3d ec 5c 70 fe fe 7d 64 3c 2c 48 b3 8a Aug 26 13:22:22.713844: | CERT eb 26 bf 05 d4 33 1e c3 f7 1c 24 c9 99 e3 d1 99 Aug 26 13:22:22.713851: | CERT 91 df 32 10 d5 7c 31 7e 9e 6f 70 01 dc 0d d7 21 Aug 26 13:22:22.713859: | CERT 03 76 4d f5 b2 e3 87 30 94 8c b2 0a c0 b4 d9 0b Aug 26 13:22:22.713866: | CERT d4 d9 37 e0 7a 73 13 50 8d 6f 93 9a 7c 5a 1a b2 Aug 26 13:22:22.713873: | CERT 87 7e 0c 64 60 cb 4b 2c ef 22 75 b1 7c 60 3e e3 Aug 26 13:22:22.713880: | CERT e5 f1 94 38 51 8f 00 e8 35 7b b5 01 ed c1 c4 fd Aug 26 13:22:22.713888: | CERT a3 4b 56 42 d6 8b 64 38 74 95 c4 13 70 f0 f0 23 Aug 26 13:22:22.713895: | CERT 29 57 2b ef 74 97 97 76 8d 30 48 91 02 03 01 00 Aug 26 13:22:22.713902: | CERT 01 a3 81 e4 30 81 e1 30 09 06 03 55 1d 13 04 02 Aug 26 13:22:22.713910: | CERT 30 00 30 26 06 03 55 1d 11 04 1f 30 1d 82 1b 6e Aug 26 13:22:22.713917: | CERT 6f 72 74 68 2e 74 65 73 74 69 6e 67 2e 6c 69 62 Aug 26 13:22:22.713924: | CERT 72 65 73 77 61 6e 2e 6f 72 67 30 0b 06 03 55 1d Aug 26 13:22:22.713932: | CERT 0f 04 04 03 02 07 80 30 1d 06 03 55 1d 25 04 16 Aug 26 13:22:22.713939: | CERT 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 Aug 26 13:22:22.713946: | CERT 01 05 05 07 03 02 30 41 06 08 2b 06 01 05 05 07 Aug 26 13:22:22.713954: | CERT 01 01 04 35 30 33 30 31 06 08 2b 06 01 05 05 07 Aug 26 13:22:22.713961: | CERT 30 01 86 25 68 74 74 70 3a 2f 2f 6e 69 63 2e 74 Aug 26 13:22:22.713968: | CERT 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e Aug 26 13:22:22.713976: | CERT 2e 6f 72 67 3a 32 35 36 30 30 3d 06 03 55 1d 1f Aug 26 13:22:22.713983: | CERT 04 36 30 34 30 32 a0 30 a0 2e 86 2c 68 74 74 70 Aug 26 13:22:22.713990: | CERT 3a 2f 2f 6e 69 63 2e 74 65 73 74 69 6e 67 2e 6c Aug 26 13:22:22.713998: | CERT 69 62 72 65 73 77 61 6e 2e 6f 72 67 2f 72 65 76 Aug 26 13:22:22.714005: | CERT 6f 6b 65 64 2e 63 72 6c 30 0d 06 09 2a 86 48 86 Aug 26 13:22:22.714012: | CERT f7 0d 01 01 0b 05 00 03 81 81 00 9e e9 26 57 73 Aug 26 13:22:22.714019: | CERT c2 4c 64 c6 ab d6 d3 1a 13 4f 6b 48 e3 17 b2 3d Aug 26 13:22:22.714027: | CERT fb 30 93 2d 15 92 6e a3 60 29 10 1d 3e a7 93 48 Aug 26 13:22:22.714034: | CERT 3c 40 5b af 9e e5 93 b7 2f d5 4b 9f db bd ab 5d Aug 26 13:22:22.714041: | CERT 03 57 3a 1a f9 81 87 13 dd 32 e7 93 b5 9e 3b 40 Aug 26 13:22:22.714049: | CERT 3c c6 c9 d5 ce c6 c7 5d da 89 36 3d d0 36 82 fd Aug 26 13:22:22.714056: | CERT b2 ab 00 2a 7c 0e a7 ad 3e e2 b1 5a 0d 88 45 26 Aug 26 13:22:22.714063: | CERT 48 51 b3 c7 79 d7 04 e7 47 5f 28 f8 63 fb ae 58 Aug 26 13:22:22.714071: | CERT 52 8b ba 60 ce 19 ac fa 4e 65 7d Aug 26 13:22:22.714079: | emitting length of ISAKMP Certificate Payload: 1232 Aug 26 13:22:22.714088: "northnet-eastnet-b" #3: I am sending a certificate request Aug 26 13:22:22.714096: | ***emit ISAKMP Certificate RequestPayload: Aug 26 13:22:22.714107: | next payload type: ISAKMP_NEXT_SIG (0x9) Aug 26 13:22:22.714116: | cert type: CERT_X509_SIGNATURE (0x4) Aug 26 13:22:22.714125: | next payload chain: ignoring supplied 'ISAKMP Certificate RequestPayload'.'next payload type' value 9:ISAKMP_NEXT_SIG Aug 26 13:22:22.714135: | next payload chain: setting previous 'ISAKMP Certificate Payload'.'next payload type' to current ISAKMP Certificate RequestPayload (7:ISAKMP_NEXT_CR) Aug 26 13:22:22.714143: | next payload chain: saving location 'ISAKMP Certificate RequestPayload'.'next payload type' in 'reply packet' Aug 26 13:22:22.714153: | emitting 175 raw bytes of CA into ISAKMP Certificate RequestPayload Aug 26 13:22:22.714161: | CA 30 81 ac 31 0b 30 09 06 03 55 04 06 13 02 43 41 Aug 26 13:22:22.714168: | CA 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 Aug 26 13:22:22.714176: | CA 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 Aug 26 13:22:22.714183: | CA 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c Aug 26 13:22:22.714190: | CA 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 Aug 26 13:22:22.714197: | CA 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 Aug 26 13:22:22.714205: | CA 6e 74 31 25 30 23 06 03 55 04 03 0c 1c 4c 69 62 Aug 26 13:22:22.714212: | CA 72 65 73 77 61 6e 20 74 65 73 74 20 43 41 20 66 Aug 26 13:22:22.714219: | CA 6f 72 20 6d 61 69 6e 63 61 31 24 30 22 06 09 2a Aug 26 13:22:22.714227: | CA 86 48 86 f7 0d 01 09 01 16 15 74 65 73 74 69 6e Aug 26 13:22:22.714234: | CA 67 40 6c 69 62 72 65 73 77 61 6e 2e 6f 72 67 Aug 26 13:22:22.714242: | emitting length of ISAKMP Certificate RequestPayload: 180 Aug 26 13:22:22.714375: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_RSA Aug 26 13:22:22.714791: | searching for certificate PKK_RSA:AwEAAcBZv vs PKK_RSA:AwEAAcBZv Aug 26 13:22:22.739552: | ***emit ISAKMP Signature Payload: Aug 26 13:22:22.739593: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.739607: | next payload chain: setting previous 'ISAKMP Certificate RequestPayload'.'next payload type' to current ISAKMP Signature Payload (9:ISAKMP_NEXT_SIG) Aug 26 13:22:22.739617: | next payload chain: saving location 'ISAKMP Signature Payload'.'next payload type' in 'reply packet' Aug 26 13:22:22.739628: | emitting 384 raw bytes of SIG_I into ISAKMP Signature Payload Aug 26 13:22:22.739637: | SIG_I 19 f9 7e 0b 3d a2 58 98 be d8 95 5c b9 a9 6f 75 Aug 26 13:22:22.739645: | SIG_I f8 80 c6 c0 1d f1 a7 5f f8 75 ae 1a 3a 95 6d 5e Aug 26 13:22:22.739652: | SIG_I 40 88 28 fc 35 0d 34 16 df 5c 1d 6e a6 d1 d4 e1 Aug 26 13:22:22.739660: | SIG_I 3a e8 22 b4 c6 57 ae cf e3 3e cd 83 5a b2 69 c0 Aug 26 13:22:22.739667: | SIG_I 3c 61 67 3f a7 2c 80 17 4e fa 71 80 d7 3d a0 d2 Aug 26 13:22:22.739674: | SIG_I 8d de e0 7f fc 68 e9 bb 81 ca 8e f3 65 89 98 b4 Aug 26 13:22:22.739682: | SIG_I 91 57 91 07 7f e0 5d 81 e2 9d 02 92 bb 3d f4 96 Aug 26 13:22:22.739689: | SIG_I 8e a6 dc 01 06 30 e0 64 31 3d 3e c8 24 8c 42 a4 Aug 26 13:22:22.739696: | SIG_I b9 ba 01 f3 e9 a4 95 81 cd 60 a6 75 e5 ca ab 00 Aug 26 13:22:22.739704: | SIG_I 73 72 c8 c9 95 c3 80 c3 17 e8 df d7 97 65 ed fb Aug 26 13:22:22.739711: | SIG_I 72 67 50 31 60 59 f3 04 aa 10 0e 8d ef 15 ed 56 Aug 26 13:22:22.739718: | SIG_I f1 81 28 22 59 90 32 86 b1 58 bd 77 06 d7 67 47 Aug 26 13:22:22.739726: | SIG_I 38 84 66 f5 9f 77 9f 43 75 a6 32 53 82 92 aa 5f Aug 26 13:22:22.739733: | SIG_I 27 c9 3b 15 02 1f 14 54 4c 4d 80 62 42 67 54 66 Aug 26 13:22:22.739740: | SIG_I c2 44 f0 50 18 7b e4 3c 31 f1 86 8f 65 27 17 54 Aug 26 13:22:22.739748: | SIG_I 50 20 f5 66 6a 02 43 ef c5 32 f8 77 e1 5b ec a0 Aug 26 13:22:22.739755: | SIG_I 12 8d 40 87 cf 01 fa cd 64 1e a5 1f 53 d6 1e 08 Aug 26 13:22:22.739762: | SIG_I 1b 1d b5 ed 0a 74 73 aa 30 b2 5a f5 2e 5b 3d 34 Aug 26 13:22:22.739779: | SIG_I c0 4d 2a 2b ad b6 8c af b5 ba 13 08 3d 3f 74 95 Aug 26 13:22:22.739787: | SIG_I 4b 4d 27 8a 80 b1 68 17 ec b9 f6 fa 2f c7 64 58 Aug 26 13:22:22.739795: | SIG_I a3 84 ac ad bb 20 33 76 39 da 5e 02 da c9 0c 06 Aug 26 13:22:22.739802: | SIG_I 0f 33 cc be c9 41 31 ef 73 fa 24 7c 2c ee bd 77 Aug 26 13:22:22.739809: | SIG_I 24 8f 36 7e 23 a6 b9 32 0e 05 30 72 2e a8 d8 fd Aug 26 13:22:22.739817: | SIG_I b0 8b 9f 2d c4 aa bc cc 87 c9 15 19 7c fa 90 09 Aug 26 13:22:22.739825: | emitting length of ISAKMP Signature Payload: 388 Aug 26 13:22:22.739833: | Not sending INITIAL_CONTACT Aug 26 13:22:22.739843: | emitting 7 zero bytes of encryption padding into ISAKMP Message Aug 26 13:22:22.739851: | no IKEv1 message padding required Aug 26 13:22:22.739859: | emitting length of ISAKMP Message: 2028 Aug 26 13:22:22.739904: | complete v1 state transition with STF_OK Aug 26 13:22:22.739925: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:22:22.739933: | #3 is idle Aug 26 13:22:22.739942: | doing_xauth:no, t_xauth_client_done:no Aug 26 13:22:22.739950: | IKEv1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 Aug 26 13:22:22.739961: | parent state #3: MAIN_I2(open IKE SA) => MAIN_I3(open IKE SA) Aug 26 13:22:22.739969: | event_already_set, deleting event Aug 26 13:22:22.739978: | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:22:22.739991: | libevent_free: release ptr-libevent@0x7f0f00002888 Aug 26 13:22:22.740001: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f0f00002b78 Aug 26 13:22:22.740020: | sending reply packet to 192.1.2.23:500 (from 192.1.3.33:500) Aug 26 13:22:22.740042: | sending 2028 bytes for STATE_MAIN_I2 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3) Aug 26 13:22:22.740051: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.740059: | 05 10 02 01 00 00 00 00 00 00 07 ec 8c 8f 1e c0 Aug 26 13:22:22.740066: | e7 2b bb fd 60 e0 95 39 dd 96 97 12 c6 e7 33 ed Aug 26 13:22:22.740073: | 9c 1b f0 ec d4 d9 7a 31 1b 96 2c 7b 03 e8 97 11 Aug 26 13:22:22.740080: | c8 ea cf dd 25 16 d1 9d d7 2b e9 ff ca 5e 71 1e Aug 26 13:22:22.740088: | 4e 23 b5 f2 82 f0 dc b4 38 1a 5b 7d 47 aa e9 2b Aug 26 13:22:22.740095: | 8f c7 6d 1a c2 0c fb 76 d2 45 80 9b 98 d0 e5 d9 Aug 26 13:22:22.740102: | 17 f3 f0 ed ea 77 dc 0b bf b3 65 a1 e5 bb 23 66 Aug 26 13:22:22.740109: | 38 e3 85 18 16 f0 3a 5d a2 07 a7 86 9e 65 0c fb Aug 26 13:22:22.740117: | 17 7b cb b5 b2 da b5 83 fd 11 32 8e e6 f2 b4 4c Aug 26 13:22:22.740124: | 24 d7 f5 a9 b3 67 b8 2f 8b 7b 77 c7 b9 9c 67 e7 Aug 26 13:22:22.740131: | 65 42 ea 5e 8e 57 03 69 48 92 4d 7f 6c 4b e7 7a Aug 26 13:22:22.740139: | c4 e0 13 8f c4 d9 f0 44 8a c9 77 d8 a8 13 2e 49 Aug 26 13:22:22.740146: | 08 c1 48 ab 44 36 49 b4 fc 37 8b 23 70 6e a8 59 Aug 26 13:22:22.740153: | 31 b6 66 52 15 bb 8b 4e c9 e0 0e 5a d8 e1 67 49 Aug 26 13:22:22.740160: | 22 d0 2f 08 6d 5c 83 f2 71 d3 88 6f dd 98 a4 bb Aug 26 13:22:22.740183: | 57 06 16 1f 81 8f 9f a6 b9 b0 01 7a 7c 4d fe 9f Aug 26 13:22:22.740188: | d5 f5 d5 e0 df 42 7b a3 68 cb fb 25 f2 42 2f 03 Aug 26 13:22:22.740193: | a8 eb fa 8a 00 a3 98 e7 31 d9 63 a3 46 c1 6f e1 Aug 26 13:22:22.740198: | c8 eb 4c 61 4a 4a d6 1f 1d 73 82 09 70 34 ad 7d Aug 26 13:22:22.740203: | 56 13 73 65 82 a4 38 81 98 45 1d 1e ae 0f c4 4c Aug 26 13:22:22.740208: | 0e 3d dd b4 47 82 58 17 db 6f a1 f2 48 75 94 0b Aug 26 13:22:22.740213: | 0f da 1e a2 87 6b 7e f7 97 a2 95 ed 0c 61 5a 04 Aug 26 13:22:22.740217: | 23 9e 46 46 d2 b9 2a 4b 22 57 cc 36 b2 09 5c cc Aug 26 13:22:22.740222: | 29 d6 61 78 6e ee 00 9c 5c 6b 8c f6 8f 55 d2 64 Aug 26 13:22:22.740227: | 8e b0 e5 12 49 e1 b0 3d e1 14 85 a3 25 7f fb c4 Aug 26 13:22:22.740232: | ee 9d e3 3a 8d 9a ea 4d 8e 9f 89 1d 3b d8 b0 ed Aug 26 13:22:22.740237: | 30 e4 4b 21 62 4a 1d 8b c8 2b fa 54 1b 36 ce df Aug 26 13:22:22.740246: | df fd 56 6d 4f 50 56 7d c3 12 51 7c fe d0 d7 cf Aug 26 13:22:22.740251: | 48 98 79 26 8e af 96 4f f5 3d 5b 00 53 55 43 8d Aug 26 13:22:22.740256: | fb 27 85 74 a2 bb e2 ac 15 82 15 7d 1e b9 92 71 Aug 26 13:22:22.740261: | 78 0f 7e 4e 27 58 d8 4c 77 f8 1a 90 41 8e 45 1f Aug 26 13:22:22.740266: | 1c 98 d4 d7 4a d5 f3 42 3e 8e a4 9a 9c 87 94 f3 Aug 26 13:22:22.740271: | 91 7d c0 81 91 c7 1e cf b8 fa 60 88 6e f6 6b 57 Aug 26 13:22:22.740276: | d1 78 6e 8b 0b de d5 3d 01 5d 2c 65 d6 d6 be a8 Aug 26 13:22:22.740280: | 3b 52 da 32 d3 f9 fa 40 60 72 86 4a 06 42 24 78 Aug 26 13:22:22.740285: | 41 dc 98 33 2c 73 a6 53 20 9a bb 19 51 5d 7a 3e Aug 26 13:22:22.740306: | 9f 22 7f 83 b5 9b 17 33 f6 33 bd 33 f4 2b 3c bf Aug 26 13:22:22.740312: | f7 bf 32 d2 18 90 ce fd 37 ef f2 28 ef 31 d4 61 Aug 26 13:22:22.740317: | 2d 37 4b 68 f3 e9 13 f8 b7 8f 8d cc 7f a9 7f c0 Aug 26 13:22:22.740322: | 53 e7 14 72 67 e3 5a e5 a3 99 6a a3 09 67 01 f4 Aug 26 13:22:22.740326: | a0 88 46 3d bf 37 c8 03 8e 05 7a 57 69 e0 51 df Aug 26 13:22:22.740331: | 37 cc ec b7 04 38 71 b4 69 b5 9d 41 89 e7 8a 60 Aug 26 13:22:22.740336: | 75 fb 84 5b 51 0e e2 24 d4 4a ac 1d 80 92 9a f0 Aug 26 13:22:22.740341: | 09 a3 f8 fe a6 33 71 02 c2 8b e9 5b e8 3c c7 9c Aug 26 13:22:22.740346: | 07 71 14 08 5a 6a 01 a1 8d 48 b3 9c 4d 98 01 3b Aug 26 13:22:22.740351: | 9c e4 91 2f 49 d1 b9 43 06 b0 91 4a de 04 61 e1 Aug 26 13:22:22.740356: | 03 03 7d 45 c0 14 6d e1 af 04 8c ea 2f c5 8e d3 Aug 26 13:22:22.740361: | 51 89 86 cd 83 96 33 0e 0c 7b df bc d9 af f2 9b Aug 26 13:22:22.740365: | 96 f3 df 92 e4 46 9f 50 fe 43 fb f3 ad 5f 88 6d Aug 26 13:22:22.740370: | 06 b7 10 fb 34 2c e5 7a 33 99 57 53 ba 22 03 76 Aug 26 13:22:22.740375: | 57 2c cc df 57 ce fc 38 8a 44 3b 21 fa 30 fb 8f Aug 26 13:22:22.740380: | 62 0c 73 b4 ad af 98 ec 6a b8 c1 97 c2 c0 19 03 Aug 26 13:22:22.740385: | ae 2f e6 4c 18 25 ed 0a c9 2e ce 46 25 82 b1 8d Aug 26 13:22:22.740390: | dd 90 04 8e 9e 35 ce 67 4d 92 f4 f3 dd e3 9c 70 Aug 26 13:22:22.740395: | 12 e2 5d b3 bc 76 9e f6 10 7e e7 f0 22 10 a8 28 Aug 26 13:22:22.740400: | b6 b0 20 5a 09 58 6a b6 16 7c 07 f8 9d 85 7d 11 Aug 26 13:22:22.740404: | fd 2e b3 6c b0 f3 e6 16 ab 27 fd 33 b8 cb 97 12 Aug 26 13:22:22.740409: | 6d 35 86 ba fa b2 1f 86 cb a4 57 29 d2 3a 64 b0 Aug 26 13:22:22.740414: | 2c d7 75 ba f6 38 3e a3 14 6c 8d 95 1d 87 89 6f Aug 26 13:22:22.740419: | 3d d4 48 44 b9 91 7b 4c 3d 66 51 6b 4a 53 fd 4a Aug 26 13:22:22.740424: | ae 43 a2 d6 42 bf 6c a7 a3 c1 6c e1 5b 90 12 58 Aug 26 13:22:22.740429: | 6d fa e2 3f d3 e6 9c 2d 15 a9 c8 d3 2e 10 84 ff Aug 26 13:22:22.740434: | 28 f2 f5 8f a1 88 2b 0f d6 4f ff cc 6f ae c5 7b Aug 26 13:22:22.740439: | 15 d2 81 b3 c5 d2 a4 a6 1f 74 7c e2 0b 8a 3a 5d Aug 26 13:22:22.740444: | 9c b5 3e 9c 26 f2 b0 f8 6e 92 92 5e 08 db 87 86 Aug 26 13:22:22.740448: | d6 f7 65 32 a4 53 9b 7f e8 d2 c8 33 cf 09 61 13 Aug 26 13:22:22.740453: | 4e 41 d9 76 8d 2a df 1b 98 a7 29 54 0d 84 10 14 Aug 26 13:22:22.740458: | 42 d6 04 5b 9e 98 6b ee 65 14 da 14 ca 1e 7d ce Aug 26 13:22:22.740463: | c8 e8 19 4c c8 b7 30 76 79 d3 ad 57 b6 93 ed 74 Aug 26 13:22:22.740468: | 1d da 4b 18 1e 97 7c 5b 32 30 75 8b 47 00 0f 5b Aug 26 13:22:22.740473: | 99 61 c2 15 b7 a6 ea 36 31 fb 13 4a 86 33 53 2a Aug 26 13:22:22.740478: | 29 68 da ca 89 e5 9c 61 d8 03 e8 a3 f6 d3 f1 40 Aug 26 13:22:22.740483: | a4 82 52 49 89 07 14 ff c9 8d c9 1e 51 d8 14 a2 Aug 26 13:22:22.740488: | ab 16 99 59 30 cd 59 21 f0 62 e9 3c 81 5c b7 db Aug 26 13:22:22.740492: | f2 a1 d0 67 ca 7f 5a 42 14 85 d1 cd bf 5b ea 04 Aug 26 13:22:22.740497: | de 9b 2c c5 50 62 e4 c7 fc 11 e7 3d 71 17 c9 15 Aug 26 13:22:22.740502: | 6c 26 8a c4 6b b0 76 33 e0 2c f9 65 7f 51 2f 24 Aug 26 13:22:22.740507: | ba 45 38 27 b5 13 4b 00 91 37 7c 15 0a 43 b1 45 Aug 26 13:22:22.740512: | fe 5e 9c 52 8e 09 85 d9 cb c3 4b 29 c1 00 67 75 Aug 26 13:22:22.740520: | 77 0a 95 9d 4e 9c bc ff 2f a3 e4 b1 1a e0 13 e8 Aug 26 13:22:22.740525: | 2c b5 62 64 e7 8e 07 2e 89 de 72 72 99 0a 01 5c Aug 26 13:22:22.740530: | 5c d2 65 87 e0 f2 de 6f e8 7d 47 31 41 e8 92 13 Aug 26 13:22:22.740535: | 5a 72 e4 12 22 33 a1 bd 3e 59 45 26 1d fa 69 6b Aug 26 13:22:22.740540: | 1d cf 26 c4 f6 15 86 9c 12 70 d8 ca 93 6f 2e c9 Aug 26 13:22:22.740544: | 3f ff c5 50 8f 06 50 f5 c3 be b1 6b c7 d9 99 86 Aug 26 13:22:22.740549: | 04 c5 34 2a fb b3 42 93 fa 3b e1 96 2c b1 f0 0d Aug 26 13:22:22.740554: | e6 9c e0 ff 71 5f 81 cb f4 07 ec c4 59 35 ff 3d Aug 26 13:22:22.740559: | f9 31 79 a7 d9 20 73 30 81 b3 b6 dc e3 f0 02 f0 Aug 26 13:22:22.740564: | f9 9d d6 18 e2 0d 77 af dc 7a 93 1d c9 06 6d fa Aug 26 13:22:22.740569: | 85 0a ea 43 f5 36 c7 cd 98 95 9a 92 20 8f d3 db Aug 26 13:22:22.740574: | 4e 6a a6 f0 e9 dc 9d 81 d2 4c 5a 14 87 d8 8c ab Aug 26 13:22:22.740579: | e0 54 1a 04 a4 be 1e 8c a4 26 96 e5 37 bb 47 75 Aug 26 13:22:22.740584: | fa e9 3b 39 42 8b 12 fb 86 01 32 10 98 6b 47 72 Aug 26 13:22:22.740588: | fd fa 06 68 f9 0e 18 6b 61 19 e6 25 c9 5e fc 8a Aug 26 13:22:22.740593: | 15 52 56 b2 b5 b3 6d fc b8 10 a8 e3 96 66 95 c3 Aug 26 13:22:22.740598: | 4f b7 8b 6b bb fd 3e ee ff fd 23 88 e4 f8 ba 0b Aug 26 13:22:22.740603: | f1 4c 26 67 d0 67 05 f7 54 3f 08 75 1f 14 1d d6 Aug 26 13:22:22.740608: | e2 1f 23 f5 90 40 8a 49 cd da bc 84 b7 cd da a2 Aug 26 13:22:22.740613: | 2a 8b cf e2 7f 0f 78 21 99 31 4e 78 03 b7 18 99 Aug 26 13:22:22.740618: | d4 d0 eb 59 9a 3c ab 6b 39 c9 52 79 c8 46 06 46 Aug 26 13:22:22.740623: | 00 12 e1 38 f5 0c b4 46 37 d5 51 fd f2 53 a5 8c Aug 26 13:22:22.740627: | 20 4b 4c 5d aa 71 12 50 08 da bd 97 d4 56 4d a7 Aug 26 13:22:22.740632: | fc 74 cb 62 c0 d6 99 0b 01 82 eb a2 57 ad 17 6c Aug 26 13:22:22.740637: | f5 79 5d 0a 1c 8a f1 b1 ac 0d f9 fa e2 37 34 41 Aug 26 13:22:22.740642: | 61 2f ec db 3a d9 e0 81 70 d7 aa c1 dd 25 ec 81 Aug 26 13:22:22.740647: | be 76 64 c2 e4 0d 10 08 35 d7 d0 aa 91 11 e1 ac Aug 26 13:22:22.740652: | 5c a1 91 ab c3 73 96 57 44 46 b2 65 93 7d 5a 58 Aug 26 13:22:22.740657: | 36 bc e7 7e 8f 49 d7 0f df 7e 99 16 80 99 b9 0c Aug 26 13:22:22.740662: | ad 12 01 04 16 ad 1a 23 14 28 c0 0b a4 2a a3 eb Aug 26 13:22:22.740666: | 3a 19 9f 9e 48 28 70 c5 b3 20 49 79 ea 4b 37 2b Aug 26 13:22:22.740671: | 8a d7 a1 14 19 36 6d 63 b8 89 3f 1c 14 26 4e 69 Aug 26 13:22:22.740676: | 36 f6 fe 39 9d cd de 26 c8 bc f2 c1 5b 85 70 6d Aug 26 13:22:22.740681: | e0 90 2a 42 e8 5c f7 83 c0 93 b9 ee 76 3c 80 fa Aug 26 13:22:22.740686: | 30 38 2b f6 15 b1 97 62 93 96 c3 18 b7 7a 79 0f Aug 26 13:22:22.740691: | 11 75 38 91 4f 1a 3e 19 d0 49 a3 4c bf f8 d9 e9 Aug 26 13:22:22.740696: | 0e 7d bd 66 15 b2 ea ae 5c 05 d0 d7 83 f5 0b 88 Aug 26 13:22:22.740700: | 2b ac 54 26 84 08 32 f2 58 03 63 b0 5f 81 08 73 Aug 26 13:22:22.740705: | 61 ef 19 2b ad 93 78 3e f9 36 a5 5f f3 79 df 52 Aug 26 13:22:22.740710: | f0 01 85 ad 85 50 0f 72 6c 7b dc 67 d8 33 dd 03 Aug 26 13:22:22.740715: | f4 69 92 36 bf b2 39 de c7 fb 65 3a b8 ac fb df Aug 26 13:22:22.740720: | 66 57 1c 67 e2 f0 e3 24 a9 b2 e3 c3 63 87 1f 27 Aug 26 13:22:22.740725: | ae 9b 30 dd bc d0 a3 ad cc 6f f5 c2 e0 dd bd 24 Aug 26 13:22:22.740730: | a5 e0 91 8c ee 62 a4 14 8d f3 20 ee 89 54 84 2d Aug 26 13:22:22.740735: | 1a 55 f3 2b 85 f2 f4 4f fc c0 11 99 13 27 8a af Aug 26 13:22:22.740739: | ec fe 02 73 79 cd db bf 45 ec f8 75 e3 03 e6 f8 Aug 26 13:22:22.740744: | 57 39 fd 04 08 89 f1 9d 63 c1 a5 ad Aug 26 13:22:22.740834: | !event_already_set at reschedule Aug 26 13:22:22.740850: | event_schedule: new EVENT_RETRANSMIT-pe@0x7f0f00002b78 Aug 26 13:22:22.740860: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #3 Aug 26 13:22:22.740867: | libevent_malloc: new ptr-libevent@0x560749ada478 size 128 Aug 26 13:22:22.740879: | #3 STATE_MAIN_I3: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11028.483313 Aug 26 13:22:22.740891: "northnet-eastnet-b" #3: STATE_MAIN_I3: sent MI3, expecting MR3 Aug 26 13:22:22.740898: | modecfg pull: noquirk policy:push not-client Aug 26 13:22:22.740903: | phase 1 is done, looking for phase 2 to unpend Aug 26 13:22:22.740912: | resume sending helper answer for #3 suppresed complete_v1_state_transition() Aug 26 13:22:22.740927: | #3 spent 28 milliseconds in resume sending helper answer Aug 26 13:22:22.740938: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:22:22.740945: | libevent_free: release ptr-libevent@0x7f0ef4000f48 Aug 26 13:22:22.762238: | spent 0.00758 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:22:22.762310: | *received 1884 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Aug 26 13:22:22.762323: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.762329: | 05 10 02 01 00 00 00 00 00 00 07 5c f6 15 79 4c Aug 26 13:22:22.762334: | 10 95 c1 42 bd 7b 85 62 02 2c f6 b2 76 b6 ff f3 Aug 26 13:22:22.762339: | 46 35 f0 44 58 c3 0b f8 d0 e4 be 98 ab 01 8e e8 Aug 26 13:22:22.762344: | 60 43 88 3c 5a 2a 46 0d 31 5a 30 48 f6 06 62 d1 Aug 26 13:22:22.762349: | 38 a5 a3 e6 82 42 5c c0 33 2d 95 00 ef 05 47 19 Aug 26 13:22:22.762354: | 8d b3 e4 83 62 3f c0 8b b8 81 e1 51 cc 51 df 12 Aug 26 13:22:22.762359: | 4c 3e 21 f8 09 09 d2 b7 b5 9d 14 48 07 20 5d cf Aug 26 13:22:22.762364: | 2e e8 aa d6 14 f8 92 b8 3e 81 12 57 c0 33 3e d4 Aug 26 13:22:22.762369: | 87 17 8a e9 db d9 8a e5 10 e0 f6 75 c3 a0 87 eb Aug 26 13:22:22.762374: | 35 82 d0 d2 aa 82 d2 c8 81 9d 28 7d 98 b6 0c 5b Aug 26 13:22:22.762379: | b3 40 df 56 fc 41 28 5a c4 cf 98 34 22 7b 2e 3a Aug 26 13:22:22.762383: | 8e 15 18 dc 7b e4 48 fa 9c ed 9b 0e 64 e2 b8 42 Aug 26 13:22:22.762388: | b3 bb e3 10 e1 8e 93 a6 0e 6a f6 13 4d 13 4a d1 Aug 26 13:22:22.762393: | 4a a2 7e 28 61 ee 53 21 59 30 02 7f c5 f7 01 bc Aug 26 13:22:22.762398: | 53 bd a0 d8 73 61 72 aa b8 76 b9 f6 08 bf 0c 07 Aug 26 13:22:22.762403: | 0d e6 e5 3b c6 09 02 92 00 99 bc 73 7f 99 02 f1 Aug 26 13:22:22.762408: | 2a c0 3d 44 18 16 4d e0 c1 c4 33 d0 85 84 5c e3 Aug 26 13:22:22.762413: | 60 52 b5 ee 98 58 e6 7f 4b 3c 08 43 c4 b6 70 9c Aug 26 13:22:22.762417: | e7 ec 85 25 3d e3 16 a1 09 60 82 75 40 75 66 8b Aug 26 13:22:22.762422: | 85 34 ad 2f 39 d2 51 99 28 e4 93 5a 0b 46 0d a8 Aug 26 13:22:22.762427: | 68 7b 80 ee 5f 94 20 06 a9 b4 d8 59 5d 75 1b 0c Aug 26 13:22:22.762432: | 2e b9 e3 6a 21 13 f6 f5 fa 77 b9 bb 20 41 db 19 Aug 26 13:22:22.762437: | 10 ae 36 d1 b5 e4 6a b8 a2 1f 44 3b 28 bb 7a 83 Aug 26 13:22:22.762442: | e3 6c 07 25 27 6d 87 21 00 be 19 ca 3f d3 5a a7 Aug 26 13:22:22.762447: | 70 e2 0c ec ab 9e 74 c0 cf 8d 00 ef bf 6a a0 b9 Aug 26 13:22:22.762452: | 4c 7e 8a 9f ba ac 21 77 90 53 fe fa f6 9d 36 4f Aug 26 13:22:22.762456: | ee f3 9a 2e 9c 3f 11 f9 b4 ae 7d d4 72 18 24 e4 Aug 26 13:22:22.762461: | 79 ac b1 9d f0 8e bc 23 58 ff bb a3 09 0c b1 59 Aug 26 13:22:22.762466: | 8e 6e c4 30 c7 79 03 03 76 68 67 2c a7 35 a2 59 Aug 26 13:22:22.762471: | 34 52 f7 63 30 51 93 bb a0 e0 03 b2 a0 83 86 28 Aug 26 13:22:22.762476: | 56 e6 a0 2b 2d 29 b9 69 63 3f 65 ac 93 b9 e8 f4 Aug 26 13:22:22.762481: | 56 9a 50 df 20 0b a9 c9 64 ee d1 d6 50 6b 34 1c Aug 26 13:22:22.762486: | 6e 0a 5e de a4 c7 6c ed 73 1c de 0a e8 94 89 f8 Aug 26 13:22:22.762491: | e7 b9 4e a0 20 a0 e5 25 ac 7a ef 00 2a df c4 aa Aug 26 13:22:22.762495: | b0 ba 8b f1 00 69 cb 5a bd 7a 1f ed fc 4b bb bb Aug 26 13:22:22.762500: | 0d 18 d4 ac 6a 5a 9c 91 dd d3 c2 93 e8 07 66 3b Aug 26 13:22:22.762505: | 54 75 84 63 7d 78 02 f1 78 0f 98 75 d2 ba ef ef Aug 26 13:22:22.762510: | f5 ad f3 2a 97 08 88 f7 37 87 a7 43 e7 d1 60 a4 Aug 26 13:22:22.762515: | 54 b1 81 66 47 27 2e 54 d1 82 45 2b 08 97 0c 4e Aug 26 13:22:22.762527: | 53 6d 2d 65 82 c3 9d a0 8a 6b 4d 3f 2b 41 d1 d2 Aug 26 13:22:22.762532: | 7d f0 76 34 eb cb 12 cc d6 08 a3 60 09 e3 14 60 Aug 26 13:22:22.762537: | 1d a9 e2 58 1a e4 71 93 cf 0d bc 6d 4c 32 82 7e Aug 26 13:22:22.762542: | 16 2a 7d 54 24 8e 3b 65 6c b3 44 1c c6 89 f4 69 Aug 26 13:22:22.762547: | ce b0 70 a8 cd 90 d8 f4 40 bf 1e 55 b5 10 58 71 Aug 26 13:22:22.762552: | 2d 3f d7 0a 38 1f 10 e2 01 a6 a8 f4 a8 d1 cc 4b Aug 26 13:22:22.762557: | 47 18 eb 0e 4e 99 86 54 d2 21 71 47 83 55 1a c3 Aug 26 13:22:22.762561: | 78 62 84 b1 6c ec 89 33 d7 b1 3d 3f d9 e6 35 78 Aug 26 13:22:22.762566: | 25 c6 50 18 4d 5e e4 3c 05 9f 0b 51 f9 e0 d8 52 Aug 26 13:22:22.762571: | 7f f5 bb 5e bf 66 7d 42 cb f5 77 f0 b9 c7 4b 31 Aug 26 13:22:22.762576: | d4 1b 74 de 2c 04 85 14 58 57 bb 84 6e 6a 51 7a Aug 26 13:22:22.762581: | c4 61 ef f6 54 08 df 24 a6 68 d1 c5 6a d2 0f 0a Aug 26 13:22:22.762586: | d7 c0 b6 d8 2e 0c 46 65 e6 f8 6c 17 d1 20 6d 2f Aug 26 13:22:22.762591: | 41 dd 6e 7d ca 6c 61 fe c5 77 de 4a 04 c0 60 9b Aug 26 13:22:22.762595: | e0 9a 95 0d a2 c1 90 74 df 40 cd b0 f7 95 a7 4d Aug 26 13:22:22.762600: | 6e 86 58 98 a8 ca 5c 23 59 82 59 26 3f ac 63 ae Aug 26 13:22:22.762605: | 2b e0 7c ac 55 43 3e 44 1c c2 bc 9b f2 e0 02 bf Aug 26 13:22:22.762610: | fe 54 55 15 6f a3 6b 34 8f ae 03 6f aa d5 bb d0 Aug 26 13:22:22.762615: | cc ba 56 fa 9e 85 4b 3c 5d 3a 09 b9 88 01 46 19 Aug 26 13:22:22.762620: | 27 ca 10 62 bd 68 1a 55 b0 83 3b ce bf 37 c0 7a Aug 26 13:22:22.762625: | a6 ff 13 07 12 1b c2 5a a9 84 69 1c 8d 36 44 33 Aug 26 13:22:22.762630: | ea 02 ec 89 4f 97 50 19 6a e1 a0 a6 cb 2c 11 f5 Aug 26 13:22:22.762634: | d3 30 3b d3 6b 6e 4f cc 06 21 5d e9 91 a4 9b 23 Aug 26 13:22:22.762639: | 4f a1 40 70 c6 22 46 ce 41 ba d3 66 62 4e 91 80 Aug 26 13:22:22.762644: | ff 2e 68 8d 1e e3 84 a3 23 51 2a d5 d9 64 ec eb Aug 26 13:22:22.762649: | 83 8a d7 d6 5f 9e ba 3b c6 de 65 04 95 39 18 a4 Aug 26 13:22:22.762654: | da e4 0c 3b c4 97 fc 46 68 62 65 7c 19 ad e6 d0 Aug 26 13:22:22.762659: | a4 b8 01 22 8b e3 2a c2 89 71 32 7a aa f5 80 3b Aug 26 13:22:22.762664: | a6 9a ce a9 8d 0d 29 78 95 1d 26 cd 38 d7 62 4a Aug 26 13:22:22.762669: | ed 90 27 ba 0c 14 21 e7 5d 38 19 a4 fa 84 e6 3f Aug 26 13:22:22.762673: | 0c 66 02 2e cf 35 dd fa 41 d6 ba 88 8e 1c 85 eb Aug 26 13:22:22.762678: | 32 8b 3f a8 ca d3 1b d4 02 11 b8 db 4c a2 fa eb Aug 26 13:22:22.762683: | ea 2e 47 49 01 48 a7 28 71 23 5b 0b db 25 d6 67 Aug 26 13:22:22.762688: | bc 25 fc 2f d2 5c 57 c1 4c 8e 54 76 ab 6f ab 82 Aug 26 13:22:22.762693: | de 1c 29 f6 d4 f5 af f8 1b 13 6f f3 7e 0c 86 1f Aug 26 13:22:22.762698: | 1c 85 4d b2 ba be 09 6e aa fd d0 3c ca fa 5e 57 Aug 26 13:22:22.762703: | da 4f 66 8e ca 82 a1 e8 35 a2 ba 9d cc da ff bd Aug 26 13:22:22.762708: | 83 d2 a1 91 fa e4 31 07 a9 83 98 e3 9e d9 59 4e Aug 26 13:22:22.762712: | d8 06 73 01 13 ed 8f 57 72 72 3c f3 04 fe 4e 47 Aug 26 13:22:22.762717: | 18 21 fc 4d fe 87 f2 0f 66 56 c2 5a 09 5b ef c8 Aug 26 13:22:22.762722: | 22 15 5b 5c 37 ed 99 2e 0b 09 36 e7 76 ad 08 4e Aug 26 13:22:22.762727: | ab da 4a 5d c3 26 10 a1 cc 00 a5 4d da 34 9f f5 Aug 26 13:22:22.762732: | 7e 60 f0 71 e5 0d a5 21 0f bb ab 75 94 88 d2 c5 Aug 26 13:22:22.762737: | c8 b8 11 19 b2 c4 7d 54 c0 85 90 eb 9e 9e 95 8c Aug 26 13:22:22.762742: | a9 03 a7 f9 66 71 3f 98 20 6f 10 7a 3a 5f 72 55 Aug 26 13:22:22.762746: | 8e 97 cc ee 32 51 a1 b2 f4 81 6f a6 70 f9 53 33 Aug 26 13:22:22.762751: | 73 c5 34 79 e1 c5 dd cb ac 6f 10 24 33 d2 40 c8 Aug 26 13:22:22.762756: | cd 80 6f f7 21 f7 bb 17 93 2f 15 b0 c4 13 69 07 Aug 26 13:22:22.762761: | b3 16 05 94 e8 0d 4f 10 2c 0e c6 29 32 8a 52 18 Aug 26 13:22:22.762766: | d9 d0 8f f0 7d 5b 3c 37 e9 5f 39 e4 65 af da 24 Aug 26 13:22:22.762771: | 50 89 bf 13 32 a6 01 a2 fc 49 ef 15 0f d6 35 2e Aug 26 13:22:22.762776: | d1 79 b1 20 7e 0f f6 2b 54 73 b5 18 76 71 89 b9 Aug 26 13:22:22.762783: | c5 65 f4 9e 61 c2 03 9e 2e a6 ba 5a 11 14 1d f5 Aug 26 13:22:22.762788: | f6 41 79 91 b2 3d cc a2 b3 e5 89 71 ee f1 20 02 Aug 26 13:22:22.762793: | 29 d6 75 9f 44 00 16 d4 00 98 2d f4 2a 3b 7c d7 Aug 26 13:22:22.762798: | 0b 8d 9e 58 47 1b 99 e6 16 54 3b f2 71 85 39 4b Aug 26 13:22:22.762803: | ff a4 bf 0d 02 51 6a 5a ba 1e 61 98 b2 d0 53 d7 Aug 26 13:22:22.762808: | 90 cf ce 0e d8 3d 4c 55 79 b0 5c 8b 33 2b 6f fb Aug 26 13:22:22.762813: | 6a 6c c7 db 08 9f 64 08 75 a5 be 63 55 e3 0c 08 Aug 26 13:22:22.762818: | 54 61 93 f4 d4 5c fc b5 3e ac 3a c4 c1 1e 23 10 Aug 26 13:22:22.762823: | b2 ce 1c b7 ff ea 02 bd 1c d0 9d 18 c7 41 8c 6a Aug 26 13:22:22.762827: | 19 d5 f2 be cf 8b 06 c1 f4 cc 71 95 4f 78 1e fe Aug 26 13:22:22.762832: | 90 aa 87 a7 20 33 8a bc 79 70 51 71 48 01 52 e2 Aug 26 13:22:22.762837: | 2c e0 e8 ee 50 c4 19 d3 31 05 53 6a 86 87 18 ef Aug 26 13:22:22.762842: | 44 78 3a 46 0b 85 26 e1 26 14 b1 26 72 5c 30 8e Aug 26 13:22:22.762847: | c9 3f f7 10 aa c6 d7 1d 3e 43 87 c6 84 17 b7 20 Aug 26 13:22:22.762852: | 60 c4 0b ef c4 45 94 c7 f3 00 ed f8 cb 7e 49 af Aug 26 13:22:22.762857: | 2a 83 dd 98 db 0e 91 4e 5b bc 3c 9b 99 60 9f 03 Aug 26 13:22:22.762862: | fd c8 7b 89 ef 1a 05 e6 21 99 fa cd e2 46 14 f4 Aug 26 13:22:22.762866: | 72 43 4f 84 6b 85 95 b2 59 84 cb 3b 83 c3 59 68 Aug 26 13:22:22.762871: | e2 f7 06 05 45 d0 e4 eb 40 57 59 87 cc 79 92 e5 Aug 26 13:22:22.762876: | c3 c5 d1 0f 95 e2 d8 36 75 53 63 a9 6b 92 90 33 Aug 26 13:22:22.762881: | df a2 28 c8 6e d7 7a a6 db cd c0 45 32 1d 62 06 Aug 26 13:22:22.762886: | 4d 78 ec 4a 3c b8 b9 64 2c 7e ef a7 2a 76 97 b2 Aug 26 13:22:22.762891: | 53 fe 05 8e c3 58 18 0f 45 58 4e 2f 4f ad 84 5b Aug 26 13:22:22.762896: | 90 ef af 47 cd 51 a5 54 60 e3 bd 54 6a 5a 53 f8 Aug 26 13:22:22.762901: | 27 25 25 9d 8d ba cb 5e 96 0c 5b c4 74 1f 34 a1 Aug 26 13:22:22.762906: | 30 3c dc 76 03 e8 65 3b 9f 91 cd 43 Aug 26 13:22:22.762915: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:22:22.762923: | **parse ISAKMP Message: Aug 26 13:22:22.762929: | initiator cookie: Aug 26 13:22:22.762934: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:22.762939: | responder cookie: Aug 26 13:22:22.762944: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.762950: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:22:22.762955: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:22.762961: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:22:22.762967: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:22:22.762972: | Message ID: 0 (0x0) Aug 26 13:22:22.762978: | length: 1884 (0x75c) Aug 26 13:22:22.762984: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:22:22.762992: | State DB: found IKEv1 state #3 in MAIN_I3 (find_state_ikev1) Aug 26 13:22:22.763003: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) Aug 26 13:22:22.763009: | #3 is idle Aug 26 13:22:22.763014: | #3 idle Aug 26 13:22:22.763022: | received encrypted packet from 192.1.2.23:500 Aug 26 13:22:22.763051: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x220 opt: 0x20c0 Aug 26 13:22:22.763059: | ***parse ISAKMP Identification Payload: Aug 26 13:22:22.763065: | next payload type: ISAKMP_NEXT_CERT (0x6) Aug 26 13:22:22.763071: | length: 191 (0xbf) Aug 26 13:22:22.763076: | ID type: ID_DER_ASN1_DN (0x9) Aug 26 13:22:22.763082: | DOI specific A: 0 (0x0) Aug 26 13:22:22.763087: | DOI specific B: 0 (0x0) Aug 26 13:22:22.763092: | obj: 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 Aug 26 13:22:22.763098: | obj: 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 Aug 26 13:22:22.763103: | obj: 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 Aug 26 13:22:22.763108: | obj: 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c Aug 26 13:22:22.763113: | obj: 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 Aug 26 13:22:22.763122: | obj: 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 Aug 26 13:22:22.763127: | obj: 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 65 61 73 Aug 26 13:22:22.763132: | obj: 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 Aug 26 13:22:22.763137: | obj: 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 Aug 26 13:22:22.763142: | obj: 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 65 61 73 Aug 26 13:22:22.763147: | obj: 74 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 Aug 26 13:22:22.763152: | obj: 77 61 6e 2e 6f 72 67 Aug 26 13:22:22.763158: | got payload 0x40 (ISAKMP_NEXT_CERT) needed: 0x200 opt: 0x20c0 Aug 26 13:22:22.763163: | ***parse ISAKMP Certificate Payload: Aug 26 13:22:22.763169: | next payload type: ISAKMP_NEXT_SIG (0x9) Aug 26 13:22:22.763174: | length: 1265 (0x4f1) Aug 26 13:22:22.763179: | cert encoding: CERT_X509_SIGNATURE (0x4) Aug 26 13:22:22.763185: | got payload 0x200 (ISAKMP_NEXT_SIG) needed: 0x200 opt: 0x20c0 Aug 26 13:22:22.763191: | ***parse ISAKMP Signature Payload: Aug 26 13:22:22.763196: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.763201: | length: 388 (0x184) Aug 26 13:22:22.763206: | removing 12 bytes of padding Aug 26 13:22:22.763212: | message 'main_inR3' HASH payload not checked early Aug 26 13:22:22.763221: | DER ASN1 DN: 30 81 b4 31 0b 30 09 06 03 55 04 06 13 02 43 41 Aug 26 13:22:22.763226: | DER ASN1 DN: 31 10 30 0e 06 03 55 04 08 0c 07 4f 6e 74 61 72 Aug 26 13:22:22.763232: | DER ASN1 DN: 69 6f 31 10 30 0e 06 03 55 04 07 0c 07 54 6f 72 Aug 26 13:22:22.763237: | DER ASN1 DN: 6f 6e 74 6f 31 12 30 10 06 03 55 04 0a 0c 09 4c Aug 26 13:22:22.763242: | DER ASN1 DN: 69 62 72 65 73 77 61 6e 31 18 30 16 06 03 55 04 Aug 26 13:22:22.763247: | DER ASN1 DN: 0b 0c 0f 54 65 73 74 20 44 65 70 61 72 74 6d 65 Aug 26 13:22:22.763252: | DER ASN1 DN: 6e 74 31 23 30 21 06 03 55 04 03 0c 1a 65 61 73 Aug 26 13:22:22.763257: | DER ASN1 DN: 74 2e 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 Aug 26 13:22:22.763261: | DER ASN1 DN: 77 61 6e 2e 6f 72 67 31 2e 30 2c 06 09 2a 86 48 Aug 26 13:22:22.763266: | DER ASN1 DN: 86 f7 0d 01 09 01 16 1f 75 73 65 72 2d 65 61 73 Aug 26 13:22:22.763271: | DER ASN1 DN: 74 40 74 65 73 74 69 6e 67 2e 6c 69 62 72 65 73 Aug 26 13:22:22.763276: | DER ASN1 DN: 77 61 6e 2e 6f 72 67 Aug 26 13:22:22.763302: "northnet-eastnet-b" #3: Peer ID is ID_DER_ASN1_DN: 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' Aug 26 13:22:22.763315: | global one-shot timer EVENT_FREE_ROOT_CERTS scheduled in 300 seconds Aug 26 13:22:22.763328: | #3 spent 0.0112 milliseconds in find_and_verify_certs() calling get_root_certs() Aug 26 13:22:22.763341: | checking for known CERT payloads Aug 26 13:22:22.763347: | saving certificate of type 'X509_SIGNATURE' Aug 26 13:22:22.763452: | decoded cert: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA Aug 26 13:22:22.763469: | #3 spent 0.125 milliseconds in find_and_verify_certs() calling decode_cert_payloads() Aug 26 13:22:22.763480: | cert_issuer_has_current_crl: looking for a CRL issued by E=testing@libreswan.org,CN=Libreswan test CA for mainca,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA Aug 26 13:22:22.763644: | #3 spent 0.158 milliseconds in find_and_verify_certs() calling crl_update_check() Aug 26 13:22:22.763658: | missing or expired CRL Aug 26 13:22:22.763666: | crl_strict: 0, ocsp: 0, ocsp_strict: 0, ocsp_post: 0 Aug 26 13:22:22.763672: | verify_end_cert trying profile IPsec Aug 26 13:22:22.763885: | certificate is valid (profile IPsec) Aug 26 13:22:22.763907: | #3 spent 0.238 milliseconds in find_and_verify_certs() calling verify_end_cert() Aug 26 13:22:22.763917: "northnet-eastnet-b" #3: certificate verified OK: E=user-east@testing.libreswan.org,CN=east.testing.libreswan.org,OU=Test Department,O=Libreswan,L=Toronto,ST=Ontario,C=CA Aug 26 13:22:22.764096: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749ac6aa8 Aug 26 13:22:22.764110: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749a972e8 Aug 26 13:22:22.764116: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749ae2738 Aug 26 13:22:22.764121: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749ae2588 Aug 26 13:22:22.764126: | get_pluto_gn_from_nss_cert: allocated pluto_gn 0x560749addc28 Aug 26 13:22:22.764650: | unreference key: 0x560749ae0988 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- Aug 26 13:22:22.764681: | #3 spent 0.737 milliseconds in decode_certs() calling add_pubkey_from_nss_cert() Aug 26 13:22:22.764691: | #3 spent 1.37 milliseconds in decode_certs() Aug 26 13:22:22.764715: | ID_DER_ASN1_DN 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' needs further ID comparison against 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' Aug 26 13:22:22.764722: | ID_DER_ASN1_DN 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' matched our ID Aug 26 13:22:22.764728: | SAN ID matched, updating that.cert Aug 26 13:22:22.764734: | X509: CERT and ID matches current connection Aug 26 13:22:22.764807: | required RSA CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:22.764829: | checking RSA keyid 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' for match with 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' Aug 26 13:22:22.764842: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:22.764853: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:22.764865: | key issuer CA is 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:22.765171: | an RSA Sig check passed with *AwEAAbEef [remote certificates] Aug 26 13:22:22.765185: | #3 spent 0.31 milliseconds in try_all_RSA_keys() trying a pubkey Aug 26 13:22:22.765193: "northnet-eastnet-b" #3: Authenticated using RSA Aug 26 13:22:22.765199: | FOR_EACH_CONNECTION_... in ISAKMP_SA_established Aug 26 13:22:22.765317: | complete v1 state transition with STF_OK Aug 26 13:22:22.765342: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:22:22.765348: | #3 is idle Aug 26 13:22:22.765354: | doing_xauth:no, t_xauth_client_done:no Aug 26 13:22:22.765360: | IKEv1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 Aug 26 13:22:22.765370: | parent state #3: MAIN_I3(open IKE SA) => MAIN_I4(established IKE SA) Aug 26 13:22:22.765382: | event_already_set, deleting event Aug 26 13:22:22.765394: | state #3 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:22:22.765405: | #3 STATE_MAIN_I4: retransmits: cleared Aug 26 13:22:22.765419: | libevent_free: release ptr-libevent@0x560749ada478 Aug 26 13:22:22.765432: | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f0f00002b78 Aug 26 13:22:22.765444: | !event_already_set at reschedule Aug 26 13:22:22.765458: | event_schedule: new EVENT_SA_REPLACE-pe@0x7f0f00002b78 Aug 26 13:22:22.765473: | inserting event EVENT_SA_REPLACE, timeout in 2638 seconds for #3 Aug 26 13:22:22.765487: | libevent_malloc: new ptr-libevent@0x7f0ef4000f48 size 128 Aug 26 13:22:22.765500: | pstats #3 ikev1.isakmp established Aug 26 13:22:22.765529: "northnet-eastnet-b" #3: STATE_MAIN_I4: ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} Aug 26 13:22:22.765537: | DPD: dpd_init() called on ISAKMP SA Aug 26 13:22:22.765542: | DPD: Peer supports Dead Peer Detection Aug 26 13:22:22.765547: | DPD: not initializing DPD because DPD is disabled locally Aug 26 13:22:22.765552: | modecfg pull: noquirk policy:push not-client Aug 26 13:22:22.765557: | phase 1 is done, looking for phase 2 to unpend Aug 26 13:22:22.765562: | unpending state #3 Aug 26 13:22:22.765575: | creating state object #4 at 0x560749ad68f8 Aug 26 13:22:22.765581: | State DB: adding IKEv1 state #4 in UNDEFINED Aug 26 13:22:22.765588: | pstats #4 ikev1.ipsec started Aug 26 13:22:22.765595: | duplicating state object #3 "northnet-eastnet-b" as #4 for IPSEC SA Aug 26 13:22:22.765606: | #4 setting local endpoint to 192.1.3.33:500 from #3.st_localport (in duplicate_state() at state.c:1484) Aug 26 13:22:22.765614: | in connection_discard for connection northnet-eastnet-b Aug 26 13:22:22.765625: | suspend processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) Aug 26 13:22:22.765634: | start processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) Aug 26 13:22:22.765646: | child state #4: UNDEFINED(ignore) => QUICK_I1(established CHILD SA) Aug 26 13:22:22.765659: "north-a-dpd" #4: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#3 msgid:73f1449a proposal=defaults pfsgroup=MODP2048} Aug 26 13:22:22.765667: | adding quick_outI1 KE work-order 7 for state #4 Aug 26 13:22:22.765673: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x560749ac9ca8 Aug 26 13:22:22.765681: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #4 Aug 26 13:22:22.765688: | libevent_malloc: new ptr-libevent@0x560749ae6a48 size 128 Aug 26 13:22:22.765710: | stop processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) Aug 26 13:22:22.765719: | resume processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) Aug 26 13:22:22.765727: | unqueuing pending Quick Mode with 192.1.2.23 "north-a-dpd" Aug 26 13:22:22.765733: | removing pending policy for no connection {0x560749ae1308} Aug 26 13:22:22.765743: | creating state object #5 at 0x560749adef88 Aug 26 13:22:22.765749: | State DB: adding IKEv1 state #5 in UNDEFINED Aug 26 13:22:22.765755: | pstats #5 ikev1.ipsec started Aug 26 13:22:22.765761: | duplicating state object #3 "northnet-eastnet-b" as #5 for IPSEC SA Aug 26 13:22:22.765766: | crypto helper 6 resuming Aug 26 13:22:22.765812: | crypto helper 6 starting work-order 7 for state #4 Aug 26 13:22:22.765769: | #5 setting local endpoint to 192.1.3.33:500 from #3.st_localport (in duplicate_state() at state.c:1484) Aug 26 13:22:22.765824: | crypto helper 6 doing build KE and nonce (quick_outI1 KE); request ID 7 Aug 26 13:22:22.765847: | suspend processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) Aug 26 13:22:22.765860: | start processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) Aug 26 13:22:22.765874: | child state #5: UNDEFINED(ignore) => QUICK_I1(established CHILD SA) Aug 26 13:22:22.765885: "northnet-eastnet-b" #5: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#3 msgid:e7ce2857 proposal=defaults pfsgroup=MODP2048} Aug 26 13:22:22.765894: | adding quick_outI1 KE work-order 8 for state #5 Aug 26 13:22:22.765900: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x560749ad1fb8 Aug 26 13:22:22.765908: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #5 Aug 26 13:22:22.765914: | libevent_malloc: new ptr-libevent@0x560749ada0d8 size 128 Aug 26 13:22:22.765931: | stop processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) Aug 26 13:22:22.765946: | resume processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) Aug 26 13:22:22.765953: | unqueuing pending Quick Mode with 192.1.2.23 "northnet-eastnet-b" Aug 26 13:22:22.765959: | removing pending policy for no connection {0x560749ae59d8} Aug 26 13:22:22.765972: | #3 spent 2.71 milliseconds in process_packet_tail() Aug 26 13:22:22.765981: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:22:22.765982: | crypto helper 1 resuming Aug 26 13:22:22.766020: | crypto helper 1 starting work-order 8 for state #5 Aug 26 13:22:22.766033: | crypto helper 1 doing build KE and nonce (quick_outI1 KE); request ID 8 Aug 26 13:22:22.765991: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 13:22:22.766055: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:22:22.766068: | spent 3.73 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:22:22.767601: | crypto helper 6 finished build KE and nonce (quick_outI1 KE); request ID 7 time elapsed 0.001777 seconds Aug 26 13:22:22.767633: | (#4) spent 1.78 milliseconds in crypto helper computing work-order 7: quick_outI1 KE (pcr) Aug 26 13:22:22.767641: | crypto helper 6 sending results from work-order 7 for state #4 to event queue Aug 26 13:22:22.767648: | scheduling resume sending helper answer for #4 Aug 26 13:22:22.767655: | libevent_malloc: new ptr-libevent@0x7f0ef8002888 size 128 Aug 26 13:22:22.767671: | crypto helper 6 waiting (nothing to do) Aug 26 13:22:22.767728: | processing resume sending helper answer for #4 Aug 26 13:22:22.767759: | start processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:22:22.767771: | crypto helper 6 replies to request ID 7 Aug 26 13:22:22.767777: | calling continuation function 0x5607486cbb50 Aug 26 13:22:22.767783: | quick_outI1_continue for #4: calculated ke+nonce, sending I1 Aug 26 13:22:22.767796: | **emit ISAKMP Message: Aug 26 13:22:22.767803: | initiator cookie: Aug 26 13:22:22.767808: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:22.767813: | responder cookie: Aug 26 13:22:22.767818: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.767824: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.767830: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:22.767836: | exchange type: ISAKMP_XCHG_QUICK (0x20) Aug 26 13:22:22.767842: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:22:22.767848: | Message ID: 1945191578 (0x73f1449a) Aug 26 13:22:22.767854: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:22:22.767861: | ***emit ISAKMP Hash Payload: Aug 26 13:22:22.767866: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.767873: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:22:22.767879: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' Aug 26 13:22:22.767887: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:22:22.767892: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:22:22.767898: | emitting quick defaults using policy none Aug 26 13:22:22.767904: | empty esp_info, returning defaults for ENCRYPT Aug 26 13:22:22.767913: | ***emit ISAKMP Security Association Payload: Aug 26 13:22:22.767919: | next payload type: ISAKMP_NEXT_NONCE (0xa) Aug 26 13:22:22.767925: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:22:22.767931: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE Aug 26 13:22:22.767938: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:22:22.767944: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:22:22.767957: | ****emit IPsec DOI SIT: Aug 26 13:22:22.767963: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:22:22.767969: | ikev1_out_sa pcn: 0 has 1 valid proposals Aug 26 13:22:22.767976: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2 Aug 26 13:22:22.767981: | ****emit ISAKMP Proposal Payload: Aug 26 13:22:22.767986: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.767992: | proposal number: 0 (0x0) Aug 26 13:22:22.767997: | protocol ID: PROTO_IPSEC_ESP (0x3) Aug 26 13:22:22.768002: | SPI size: 4 (0x4) Aug 26 13:22:22.768008: | number of transforms: 2 (0x2) Aug 26 13:22:22.768014: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' Aug 26 13:22:22.768051: | netlink_get_spi: allocated 0x8b2e7633 for esp.0@192.1.3.33 Aug 26 13:22:22.768060: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload Aug 26 13:22:22.768065: | SPI 8b 2e 76 33 Aug 26 13:22:22.768071: | *****emit ISAKMP Transform Payload (ESP): Aug 26 13:22:22.768077: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:22.768082: | ESP transform number: 0 (0x0) Aug 26 13:22:22.768087: | ESP transform ID: ESP_AES (0xc) Aug 26 13:22:22.768094: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' Aug 26 13:22:22.768100: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.768106: | af+type: AF+GROUP_DESCRIPTION (0x8003) Aug 26 13:22:22.768111: | length/value: 14 (0xe) Aug 26 13:22:22.768118: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:22.768123: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.768129: | af+type: AF+ENCAPSULATION_MODE (0x8004) Aug 26 13:22:22.768134: | length/value: 1 (0x1) Aug 26 13:22:22.768139: | [1 is ENCAPSULATION_MODE_TUNNEL] Aug 26 13:22:22.768145: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.768150: | af+type: AF+SA_LIFE_TYPE (0x8001) Aug 26 13:22:22.768155: | length/value: 1 (0x1) Aug 26 13:22:22.768160: | [1 is SA_LIFE_TYPE_SECONDS] Aug 26 13:22:22.768165: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.768171: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) Aug 26 13:22:22.768176: | length/value: 28800 (0x7080) Aug 26 13:22:22.768181: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.768186: | af+type: AF+AUTH_ALGORITHM (0x8005) Aug 26 13:22:22.768191: | length/value: 2 (0x2) Aug 26 13:22:22.768197: | [2 is AUTH_ALGORITHM_HMAC_SHA1] Aug 26 13:22:22.768202: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.768207: | af+type: AF+KEY_LENGTH (0x8006) Aug 26 13:22:22.768212: | length/value: 128 (0x80) Aug 26 13:22:22.768218: | emitting length of ISAKMP Transform Payload (ESP): 32 Aug 26 13:22:22.768223: | *****emit ISAKMP Transform Payload (ESP): Aug 26 13:22:22.768228: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.768234: | ESP transform number: 1 (0x1) Aug 26 13:22:22.768239: | ESP transform ID: ESP_3DES (0x3) Aug 26 13:22:22.768246: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:22.768252: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' Aug 26 13:22:22.768257: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.768263: | af+type: AF+GROUP_DESCRIPTION (0x8003) Aug 26 13:22:22.768268: | length/value: 14 (0xe) Aug 26 13:22:22.768273: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:22.768278: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.768284: | af+type: AF+ENCAPSULATION_MODE (0x8004) Aug 26 13:22:22.768301: | length/value: 1 (0x1) Aug 26 13:22:22.768315: | [1 is ENCAPSULATION_MODE_TUNNEL] Aug 26 13:22:22.768321: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.768326: | af+type: AF+SA_LIFE_TYPE (0x8001) Aug 26 13:22:22.768331: | length/value: 1 (0x1) Aug 26 13:22:22.768340: | [1 is SA_LIFE_TYPE_SECONDS] Aug 26 13:22:22.768345: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.768351: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) Aug 26 13:22:22.768356: | length/value: 28800 (0x7080) Aug 26 13:22:22.768361: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.768367: | af+type: AF+AUTH_ALGORITHM (0x8005) Aug 26 13:22:22.768371: | length/value: 2 (0x2) Aug 26 13:22:22.768376: | [2 is AUTH_ALGORITHM_HMAC_SHA1] Aug 26 13:22:22.768382: | emitting length of ISAKMP Transform Payload (ESP): 28 Aug 26 13:22:22.768387: | emitting length of ISAKMP Proposal Payload: 72 Aug 26 13:22:22.768393: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0 Aug 26 13:22:22.768399: | emitting length of ISAKMP Security Association Payload: 84 Aug 26 13:22:22.768404: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 Aug 26 13:22:22.768412: | ***emit ISAKMP Nonce Payload: Aug 26 13:22:22.768418: | next payload type: ISAKMP_NEXT_KE (0x4) Aug 26 13:22:22.768424: | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE Aug 26 13:22:22.768431: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) Aug 26 13:22:22.768437: | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' Aug 26 13:22:22.768444: | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload Aug 26 13:22:22.768449: | Ni c3 f1 3f 14 d3 44 7a 19 92 2a 5c 1a 86 97 2d e3 Aug 26 13:22:22.768455: | Ni a3 a6 c9 7b 87 d3 ce 1c af db 29 f6 c6 b7 a4 01 Aug 26 13:22:22.768460: | emitting length of ISAKMP Nonce Payload: 36 Aug 26 13:22:22.768466: | ***emit ISAKMP Key Exchange Payload: Aug 26 13:22:22.768471: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:22:22.768477: | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID Aug 26 13:22:22.768484: | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) Aug 26 13:22:22.768490: | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' Aug 26 13:22:22.768496: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload Aug 26 13:22:22.768501: | keyex value 31 72 0f 10 50 99 32 22 02 ec 6f 7c 40 d8 58 fe Aug 26 13:22:22.768506: | keyex value 75 33 89 d8 6b 6c 11 24 9f 06 99 c8 d0 7d 7c f0 Aug 26 13:22:22.768511: | keyex value 23 82 8e bd c7 25 31 f0 23 d9 09 e6 cd c5 2b f4 Aug 26 13:22:22.768516: | keyex value d1 de d0 32 ac eb d7 25 12 8f 1a b3 7e d8 cc 9e Aug 26 13:22:22.768521: | keyex value a3 5b e2 fd 4f af ad 15 1d 07 6b 62 9d 41 b1 95 Aug 26 13:22:22.768526: | keyex value 81 d0 7f 45 46 74 0c d2 1b 86 1c 6c 5a 45 43 38 Aug 26 13:22:22.768532: | keyex value ab 19 cc 78 80 2e 09 a4 1b 10 b2 3c 94 7d 4b 9b Aug 26 13:22:22.768537: | keyex value 82 56 bb 5c 3e fb 0a c0 cc cb b6 9e 65 f4 b7 07 Aug 26 13:22:22.768542: | keyex value 9d 30 dd 08 30 f9 bd 2a 05 05 70 6e 29 73 aa 0e Aug 26 13:22:22.768547: | keyex value 8c 07 7b 69 b6 bc 0f dc 8b 9c a5 eb 17 9d 4d 71 Aug 26 13:22:22.768552: | keyex value 34 60 60 b9 1c 86 6d 72 39 ad 4e 07 c1 3a 22 08 Aug 26 13:22:22.768557: | keyex value 64 af 27 47 c8 28 af e9 ec 87 dc 2b d6 46 e7 25 Aug 26 13:22:22.768562: | keyex value b1 53 13 7a de 93 88 1a 6f 1d 19 dc 7a 15 43 45 Aug 26 13:22:22.768567: | keyex value 22 4a 58 78 3b 75 0a 47 10 65 95 16 0a 22 a7 ce Aug 26 13:22:22.768572: | keyex value b8 4a ca 44 d3 cc 3c 67 94 ee 61 a4 4d 85 e9 d4 Aug 26 13:22:22.768577: | keyex value 72 77 a1 78 35 2b 47 19 06 cf 42 4f c1 e7 97 1d Aug 26 13:22:22.768582: | emitting length of ISAKMP Key Exchange Payload: 260 Aug 26 13:22:22.768588: | ***emit ISAKMP Identification Payload (IPsec DOI): Aug 26 13:22:22.768596: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:22:22.768602: | ID type: ID_IPV4_ADDR_SUBNET (0x4) Aug 26 13:22:22.768607: | Protocol ID: 0 (0x0) Aug 26 13:22:22.768612: | port: 0 (0x0) Aug 26 13:22:22.768618: | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID Aug 26 13:22:22.768625: | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) Aug 26 13:22:22.768631: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' Aug 26 13:22:22.768638: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:22:22.768643: | client network c0 00 03 00 Aug 26 13:22:22.768650: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:22:22.768655: | client mask ff ff ff 00 Aug 26 13:22:22.768660: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 Aug 26 13:22:22.768665: | ***emit ISAKMP Identification Payload (IPsec DOI): Aug 26 13:22:22.768671: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.768676: | ID type: ID_IPV4_ADDR_SUBNET (0x4) Aug 26 13:22:22.768681: | Protocol ID: 0 (0x0) Aug 26 13:22:22.768686: | port: 0 (0x0) Aug 26 13:22:22.768692: | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) Aug 26 13:22:22.768698: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' Aug 26 13:22:22.768704: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:22:22.768709: | client network c0 00 16 00 Aug 26 13:22:22.768715: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:22:22.768720: | client mask ff ff ff 00 Aug 26 13:22:22.768725: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 Aug 26 13:22:22.768788: | outI1 HASH(1): Aug 26 13:22:22.768796: | 2c db 09 45 7b 50 48 b9 79 18 5c bf 2e 4f b8 48 Aug 26 13:22:22.768801: | 6b b7 41 8c 59 51 c2 ed e0 d6 f3 f4 09 58 c1 f0 Aug 26 13:22:22.768818: | no IKEv1 message padding required Aug 26 13:22:22.768824: | emitting length of ISAKMP Message: 476 Aug 26 13:22:22.768852: | sending 476 bytes for reply packet from quick_outI1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #4) Aug 26 13:22:22.768860: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.768865: | 08 10 20 01 73 f1 44 9a 00 00 01 dc 59 4a 28 22 Aug 26 13:22:22.768870: | ec e9 3c 35 94 97 78 7b ad 48 6f 2d 3f b0 27 1f Aug 26 13:22:22.768875: | 8b a2 ce 4b 6f c1 a6 7b cb 6d 9a ca 1e 9d 98 dc Aug 26 13:22:22.768880: | 71 6c 70 dc a4 cd b7 b6 da 37 b9 d5 03 47 fa a2 Aug 26 13:22:22.768884: | b3 b3 39 a1 86 ab 83 7a 9e 0f 8f cf fc 70 fb 68 Aug 26 13:22:22.768889: | 3a 3f d1 8c 49 b0 f9 02 c0 5f c4 df 38 54 09 c0 Aug 26 13:22:22.768894: | 1f ee 7c 94 36 cb c7 77 5d f4 3d 9b da c6 0d f1 Aug 26 13:22:22.768899: | ec 7b 3e 70 05 2f 20 08 a7 d8 70 7d 73 52 9f ae Aug 26 13:22:22.768904: | 43 5a 80 89 c2 a7 09 c2 38 76 8f 16 06 94 ff 1f Aug 26 13:22:22.768909: | a3 76 b6 d5 94 0c 3d 54 37 2b 1f ea 5f 0a b9 8d Aug 26 13:22:22.768914: | e9 cb dc e8 43 3b 38 da ee f7 f1 23 5e 10 6c 10 Aug 26 13:22:22.768919: | 55 ba 2f 60 0f b3 2c c3 f7 ed bc 17 a6 45 46 97 Aug 26 13:22:22.768924: | 36 9d 17 cd 6c cf 14 40 71 bf 54 18 d6 ac 88 5e Aug 26 13:22:22.768928: | 85 ae b8 91 fb 2d 58 21 f5 4a c1 06 ad 74 5b 81 Aug 26 13:22:22.768933: | 3e d5 4c 7d e5 d0 95 a5 a5 f2 f8 eb 0e 12 1b 50 Aug 26 13:22:22.768938: | cf 93 05 27 04 3f c2 32 82 cd 33 fd cc 5d ce f7 Aug 26 13:22:22.768943: | 09 48 00 d1 40 51 a7 af 46 c8 9d 93 93 95 14 3c Aug 26 13:22:22.768957: | 0a 93 e5 42 79 e5 ab 4c 9f d8 ad a8 65 fb f0 de Aug 26 13:22:22.768962: | 7a 71 f7 06 93 a9 1c 24 12 81 fe d1 ce 5f a5 20 Aug 26 13:22:22.768967: | f9 e9 af 1e 6f bc 6d 04 be 3c 3e 26 4d d9 92 15 Aug 26 13:22:22.768972: | 84 cd 9e 08 6f 22 42 72 cc f8 98 10 93 f8 27 d1 Aug 26 13:22:22.768976: | 7c d7 b5 a6 90 b2 7f 57 2d c3 d9 34 32 08 c9 de Aug 26 13:22:22.768981: | 21 62 3a e9 dd f6 ef 1e 83 18 f2 28 a0 8d 57 2d Aug 26 13:22:22.768986: | 58 1b d1 09 26 ed 10 0d d5 0c c9 fe 74 44 10 60 Aug 26 13:22:22.768991: | 0b b6 89 c5 3d 7c c6 b1 a7 6b 5f 11 1b 2c 6a 53 Aug 26 13:22:22.768996: | 0a 25 b2 12 79 41 d8 0d 97 a0 35 2f 08 09 e0 00 Aug 26 13:22:22.769001: | cb 11 6f 80 73 d4 5f 4f 76 f7 91 22 53 ca 48 73 Aug 26 13:22:22.769006: | 5e 35 77 64 d3 fc 13 ec 8b f4 32 51 e3 71 83 cd Aug 26 13:22:22.769011: | b8 ec 50 b6 3b 22 45 80 8c 0b e8 e1 Aug 26 13:22:22.769083: | state #4 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:22:22.769096: | libevent_free: release ptr-libevent@0x560749ae6a48 Aug 26 13:22:22.769103: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x560749ac9ca8 Aug 26 13:22:22.769112: | event_schedule: new EVENT_RETRANSMIT-pe@0x560749ac9ca8 Aug 26 13:22:22.769121: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #4 Aug 26 13:22:22.769128: | libevent_malloc: new ptr-libevent@0x560749ad07b8 size 128 Aug 26 13:22:22.769139: | #4 STATE_QUICK_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11028.511576 Aug 26 13:22:22.769147: | resume sending helper answer for #4 suppresed complete_v1_state_transition() Aug 26 13:22:22.769160: | #4 spent 1.34 milliseconds in resume sending helper answer Aug 26 13:22:22.769171: | stop processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:22:22.769178: | libevent_free: release ptr-libevent@0x7f0ef8002888 Aug 26 13:22:22.769303: | crypto helper 1 finished build KE and nonce (quick_outI1 KE); request ID 8 time elapsed 0.003255 seconds Aug 26 13:22:22.769342: | (#5) spent 1.79 milliseconds in crypto helper computing work-order 8: quick_outI1 KE (pcr) Aug 26 13:22:22.769352: | crypto helper 1 sending results from work-order 8 for state #5 to event queue Aug 26 13:22:22.769359: | scheduling resume sending helper answer for #5 Aug 26 13:22:22.769367: | libevent_malloc: new ptr-libevent@0x7f0f0c006328 size 128 Aug 26 13:22:22.769385: | crypto helper 1 waiting (nothing to do) Aug 26 13:22:22.769446: | processing resume sending helper answer for #5 Aug 26 13:22:22.769477: | start processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:22:22.769489: | crypto helper 1 replies to request ID 8 Aug 26 13:22:22.769495: | calling continuation function 0x5607486cbb50 Aug 26 13:22:22.769501: | quick_outI1_continue for #5: calculated ke+nonce, sending I1 Aug 26 13:22:22.769513: | **emit ISAKMP Message: Aug 26 13:22:22.769519: | initiator cookie: Aug 26 13:22:22.769524: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:22.769530: | responder cookie: Aug 26 13:22:22.769535: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.769541: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.769547: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:22.769552: | exchange type: ISAKMP_XCHG_QUICK (0x20) Aug 26 13:22:22.769558: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:22:22.769564: | Message ID: 3889047639 (0xe7ce2857) Aug 26 13:22:22.769570: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:22:22.769577: | ***emit ISAKMP Hash Payload: Aug 26 13:22:22.769583: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.769589: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:22:22.769596: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' Aug 26 13:22:22.769610: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:22:22.769616: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:22:22.769622: | emitting quick defaults using policy none Aug 26 13:22:22.769627: | empty esp_info, returning defaults for ENCRYPT Aug 26 13:22:22.769637: | ***emit ISAKMP Security Association Payload: Aug 26 13:22:22.769642: | next payload type: ISAKMP_NEXT_NONCE (0xa) Aug 26 13:22:22.769648: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:22:22.769654: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE Aug 26 13:22:22.769661: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:22:22.769667: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:22:22.769673: | ****emit IPsec DOI SIT: Aug 26 13:22:22.769679: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:22:22.769685: | ikev1_out_sa pcn: 0 has 1 valid proposals Aug 26 13:22:22.769691: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2 Aug 26 13:22:22.769697: | ****emit ISAKMP Proposal Payload: Aug 26 13:22:22.769702: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.769708: | proposal number: 0 (0x0) Aug 26 13:22:22.769713: | protocol ID: PROTO_IPSEC_ESP (0x3) Aug 26 13:22:22.769718: | SPI size: 4 (0x4) Aug 26 13:22:22.769723: | number of transforms: 2 (0x2) Aug 26 13:22:22.769730: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' Aug 26 13:22:22.769763: | netlink_get_spi: allocated 0x9bdaa38d for esp.0@192.1.3.33 Aug 26 13:22:22.769771: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload Aug 26 13:22:22.769776: | SPI 9b da a3 8d Aug 26 13:22:22.769782: | *****emit ISAKMP Transform Payload (ESP): Aug 26 13:22:22.769788: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:22.769793: | ESP transform number: 0 (0x0) Aug 26 13:22:22.769798: | ESP transform ID: ESP_AES (0xc) Aug 26 13:22:22.769805: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' Aug 26 13:22:22.769811: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.769817: | af+type: AF+GROUP_DESCRIPTION (0x8003) Aug 26 13:22:22.769822: | length/value: 14 (0xe) Aug 26 13:22:22.769828: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:22.769834: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.769839: | af+type: AF+ENCAPSULATION_MODE (0x8004) Aug 26 13:22:22.769844: | length/value: 1 (0x1) Aug 26 13:22:22.769849: | [1 is ENCAPSULATION_MODE_TUNNEL] Aug 26 13:22:22.769855: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.769860: | af+type: AF+SA_LIFE_TYPE (0x8001) Aug 26 13:22:22.769865: | length/value: 1 (0x1) Aug 26 13:22:22.769870: | [1 is SA_LIFE_TYPE_SECONDS] Aug 26 13:22:22.769875: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.769881: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) Aug 26 13:22:22.769886: | length/value: 28800 (0x7080) Aug 26 13:22:22.769891: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.769897: | af+type: AF+AUTH_ALGORITHM (0x8005) Aug 26 13:22:22.769902: | length/value: 2 (0x2) Aug 26 13:22:22.769907: | [2 is AUTH_ALGORITHM_HMAC_SHA1] Aug 26 13:22:22.769912: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.769917: | af+type: AF+KEY_LENGTH (0x8006) Aug 26 13:22:22.769923: | length/value: 128 (0x80) Aug 26 13:22:22.769929: | emitting length of ISAKMP Transform Payload (ESP): 32 Aug 26 13:22:22.769934: | *****emit ISAKMP Transform Payload (ESP): Aug 26 13:22:22.769939: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.769944: | ESP transform number: 1 (0x1) Aug 26 13:22:22.769950: | ESP transform ID: ESP_3DES (0x3) Aug 26 13:22:22.769960: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:22.769967: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' Aug 26 13:22:22.769972: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.769978: | af+type: AF+GROUP_DESCRIPTION (0x8003) Aug 26 13:22:22.769983: | length/value: 14 (0xe) Aug 26 13:22:22.769988: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:22.769993: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.769998: | af+type: AF+ENCAPSULATION_MODE (0x8004) Aug 26 13:22:22.770003: | length/value: 1 (0x1) Aug 26 13:22:22.770009: | [1 is ENCAPSULATION_MODE_TUNNEL] Aug 26 13:22:22.770014: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.770019: | af+type: AF+SA_LIFE_TYPE (0x8001) Aug 26 13:22:22.770024: | length/value: 1 (0x1) Aug 26 13:22:22.770029: | [1 is SA_LIFE_TYPE_SECONDS] Aug 26 13:22:22.770034: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.770040: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) Aug 26 13:22:22.770045: | length/value: 28800 (0x7080) Aug 26 13:22:22.770050: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:22.770055: | af+type: AF+AUTH_ALGORITHM (0x8005) Aug 26 13:22:22.770060: | length/value: 2 (0x2) Aug 26 13:22:22.770065: | [2 is AUTH_ALGORITHM_HMAC_SHA1] Aug 26 13:22:22.770071: | emitting length of ISAKMP Transform Payload (ESP): 28 Aug 26 13:22:22.770076: | emitting length of ISAKMP Proposal Payload: 72 Aug 26 13:22:22.770082: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0 Aug 26 13:22:22.770088: | emitting length of ISAKMP Security Association Payload: 84 Aug 26 13:22:22.770093: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 Aug 26 13:22:22.770101: | ***emit ISAKMP Nonce Payload: Aug 26 13:22:22.770106: | next payload type: ISAKMP_NEXT_KE (0x4) Aug 26 13:22:22.770113: | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE Aug 26 13:22:22.770120: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) Aug 26 13:22:22.770126: | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' Aug 26 13:22:22.770132: | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload Aug 26 13:22:22.770138: | Ni b2 5e 4c 3c 47 32 57 ec 0a 6a ce 4c 23 7d 09 b4 Aug 26 13:22:22.770143: | Ni 0e 9a 5f b8 7f 5b 07 5b 46 f4 99 ee 02 bd f5 04 Aug 26 13:22:22.770149: | emitting length of ISAKMP Nonce Payload: 36 Aug 26 13:22:22.770154: | ***emit ISAKMP Key Exchange Payload: Aug 26 13:22:22.770160: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:22:22.770166: | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID Aug 26 13:22:22.770172: | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) Aug 26 13:22:22.770178: | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' Aug 26 13:22:22.770185: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload Aug 26 13:22:22.770190: | keyex value 36 df 1e 78 0f f3 4e fe f2 bd 2d a1 5c 69 21 9a Aug 26 13:22:22.770195: | keyex value 17 ec 1e c4 da 00 97 6d 17 8d 8d d2 f0 1b ae 29 Aug 26 13:22:22.770200: | keyex value c7 0e 40 f2 76 aa 08 9f 72 f2 6b 6d 55 f2 8d 44 Aug 26 13:22:22.770205: | keyex value c9 8c 37 ea 24 01 60 1a 34 81 b8 22 c9 96 71 4f Aug 26 13:22:22.770210: | keyex value da 60 01 9e 30 b5 dd 8d 3f 99 4c fe d8 bc 1b 06 Aug 26 13:22:22.770215: | keyex value 07 6f ac 88 bb 92 15 0a 71 a9 10 ee 77 23 d6 ef Aug 26 13:22:22.770220: | keyex value 9f 32 40 cb ef 00 20 7f 6e 8f 42 21 27 92 52 a8 Aug 26 13:22:22.770230: | keyex value fc 24 75 c7 a1 3b 3b 58 c3 56 7b c4 ba 83 e1 b4 Aug 26 13:22:22.770235: | keyex value ed 4e 79 8d 75 aa 2b 5f be 84 42 b7 e4 82 ad 3f Aug 26 13:22:22.770240: | keyex value a6 f9 e9 db 52 81 d3 bd 18 9e 4c 94 73 a1 98 cc Aug 26 13:22:22.770245: | keyex value 9b c8 ec 90 37 98 df fb 88 5d a8 72 5d 5c fc c6 Aug 26 13:22:22.770250: | keyex value 70 64 22 ae 19 83 16 fa 93 39 7b 41 d7 c4 46 1e Aug 26 13:22:22.770256: | keyex value ac 08 cb 16 bd 58 d1 56 5a 41 4f 01 f4 b3 b6 7a Aug 26 13:22:22.770261: | keyex value 69 14 27 7e 50 84 18 89 88 4d 40 a8 ed 65 2b 79 Aug 26 13:22:22.770266: | keyex value 5a 72 b1 d3 2e 19 2f 81 b8 69 3d 87 40 da f5 26 Aug 26 13:22:22.770271: | keyex value c5 8a 75 c5 e3 3c 04 6f a1 87 8c 18 cf 20 ff fb Aug 26 13:22:22.770276: | emitting length of ISAKMP Key Exchange Payload: 260 Aug 26 13:22:22.770282: | ***emit ISAKMP Identification Payload (IPsec DOI): Aug 26 13:22:22.770287: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:22:22.770305: | ID type: ID_IPV4_ADDR_SUBNET (0x4) Aug 26 13:22:22.770310: | Protocol ID: 0 (0x0) Aug 26 13:22:22.770315: | port: 0 (0x0) Aug 26 13:22:22.770321: | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID Aug 26 13:22:22.770328: | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) Aug 26 13:22:22.770342: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' Aug 26 13:22:22.770350: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:22:22.770355: | client network c0 00 03 00 Aug 26 13:22:22.770362: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:22:22.770367: | client mask ff ff ff 00 Aug 26 13:22:22.770372: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 Aug 26 13:22:22.770378: | ***emit ISAKMP Identification Payload (IPsec DOI): Aug 26 13:22:22.770383: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.770388: | ID type: ID_IPV4_ADDR_SUBNET (0x4) Aug 26 13:22:22.770393: | Protocol ID: 0 (0x0) Aug 26 13:22:22.770398: | port: 0 (0x0) Aug 26 13:22:22.770405: | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) Aug 26 13:22:22.770411: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' Aug 26 13:22:22.770417: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:22:22.770422: | client network c0 00 02 00 Aug 26 13:22:22.770428: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:22:22.770433: | client mask ff ff ff 00 Aug 26 13:22:22.770438: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 Aug 26 13:22:22.770490: | outI1 HASH(1): Aug 26 13:22:22.770498: | dc 5a 22 b5 4a 91 89 b5 c9 95 0d 73 49 fb 57 88 Aug 26 13:22:22.770503: | aa 31 04 13 af 2d dd 2b a8 88 70 8e 07 9c 82 83 Aug 26 13:22:22.770519: | no IKEv1 message padding required Aug 26 13:22:22.770525: | emitting length of ISAKMP Message: 476 Aug 26 13:22:22.770552: | sending 476 bytes for reply packet from quick_outI1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #5) Aug 26 13:22:22.770559: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.770565: | 08 10 20 01 e7 ce 28 57 00 00 01 dc 6f 32 2e 09 Aug 26 13:22:22.770569: | 4b 73 1d fb db f8 1e 02 b0 13 63 2e bd 91 f2 a0 Aug 26 13:22:22.770574: | e2 0f 49 d2 85 99 51 f9 a7 68 9a 18 af fc 70 ae Aug 26 13:22:22.770579: | de e2 cb e9 36 a3 e3 04 03 32 23 ae f7 b9 9d 30 Aug 26 13:22:22.770584: | 0a f7 07 83 b1 03 ee ee 35 e6 9d 65 76 15 e6 52 Aug 26 13:22:22.770594: | 34 b1 cd 23 a1 74 f3 bc b1 49 c3 af e0 37 d0 54 Aug 26 13:22:22.770599: | f4 74 1f f8 df 88 fd 15 57 76 75 40 28 02 a0 5c Aug 26 13:22:22.770604: | f2 1f 5c 1d ae 89 a6 8f 90 84 45 c8 67 1c 45 2d Aug 26 13:22:22.770609: | 62 9d c5 77 d0 fd e5 cd 26 29 b7 a3 b8 e2 b9 03 Aug 26 13:22:22.770613: | ad 63 df a9 6e 1a 5b 11 b2 68 8c d0 0f 32 b1 26 Aug 26 13:22:22.770618: | 09 63 2e 64 83 67 ff 12 35 42 7a 84 07 9e bf 7f Aug 26 13:22:22.770623: | c5 d5 db 10 10 64 96 8a 12 8a 59 74 80 99 e0 d6 Aug 26 13:22:22.770628: | 49 2a 59 ab 8b 85 3d ea bc ae 5b 9e c3 08 f6 59 Aug 26 13:22:22.770633: | cf de b6 32 92 49 d5 06 74 ca 79 cf a7 92 1b 69 Aug 26 13:22:22.770638: | e9 9c 22 35 ec ed bb b7 35 06 29 62 ea 32 97 e1 Aug 26 13:22:22.770643: | 9c 18 4f f5 a6 7e 1c 8d 60 65 b3 14 5a 83 91 21 Aug 26 13:22:22.770648: | 8a f2 83 fd 0f 0d 46 62 59 ed b6 50 ed 4a d0 46 Aug 26 13:22:22.770653: | f9 96 4e cd da 2a 60 b8 91 22 8b 18 a3 e8 51 de Aug 26 13:22:22.770658: | 7d a5 59 14 2a dd b4 36 28 d3 84 00 3d 64 60 0e Aug 26 13:22:22.770662: | ea d4 78 75 38 41 64 cb ba 9c ab 65 87 4d 22 10 Aug 26 13:22:22.770667: | 72 27 4d 8d 56 ee b7 6f 3f 09 da 2c 4b 0c dc 82 Aug 26 13:22:22.770672: | 52 ad fd d8 fd 9b 05 c4 9e ef 26 38 8d ed 24 7b Aug 26 13:22:22.770677: | 65 50 9d bb ba 6e c1 8b 34 3e b0 02 a1 a8 dd cd Aug 26 13:22:22.770682: | 9c ae c7 8f 4a 08 05 7f b4 e2 83 29 54 ec 21 86 Aug 26 13:22:22.770687: | e2 c3 0c 36 28 33 22 c7 31 65 5c 00 4b 6b 84 c0 Aug 26 13:22:22.770692: | 9e 68 6d b4 2f fe e2 c6 b4 36 0b 48 26 90 53 0f Aug 26 13:22:22.770697: | 87 b7 1d 3c c3 6f bd 89 93 db d4 c4 23 3d 3c fc Aug 26 13:22:22.770702: | c8 55 e5 bb 60 58 67 3e 92 42 0c e7 33 49 c9 3c Aug 26 13:22:22.770706: | 3d aa e9 8d cb 04 5d dd dc 3e 62 93 Aug 26 13:22:22.770769: | state #5 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:22:22.770782: | libevent_free: release ptr-libevent@0x560749ada0d8 Aug 26 13:22:22.770789: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x560749ad1fb8 Aug 26 13:22:22.770797: | event_schedule: new EVENT_RETRANSMIT-pe@0x560749ad1fb8 Aug 26 13:22:22.770806: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #5 Aug 26 13:22:22.770813: | libevent_malloc: new ptr-libevent@0x7f0ef8002888 size 128 Aug 26 13:22:22.770823: | #5 STATE_QUICK_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11028.513262 Aug 26 13:22:22.770832: | resume sending helper answer for #5 suppresed complete_v1_state_transition() Aug 26 13:22:22.770845: | #5 spent 1.31 milliseconds in resume sending helper answer Aug 26 13:22:22.770856: | stop processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:22:22.770862: | libevent_free: release ptr-libevent@0x7f0f0c006328 Aug 26 13:22:22.778192: | spent 0.00738 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:22:22.778246: | *received 460 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Aug 26 13:22:22.778255: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.778261: | 08 10 20 01 73 f1 44 9a 00 00 01 cc 84 a6 72 cc Aug 26 13:22:22.778266: | 37 c1 c9 31 c2 62 de 86 68 26 b4 81 f7 21 a9 47 Aug 26 13:22:22.778271: | f5 bd 30 90 94 8b d5 4d 4b 54 5f 48 e1 fc 17 3a Aug 26 13:22:22.778276: | d6 c7 a7 f6 32 5f 99 51 3b a2 a2 21 05 8f ed 46 Aug 26 13:22:22.778281: | 70 94 e8 f9 4f d1 bf 29 b3 b8 bb b7 31 47 3b 60 Aug 26 13:22:22.778286: | 4f 71 73 13 5d 4d 4d 4f 65 1c 16 94 db ce d6 2b Aug 26 13:22:22.778306: | f9 26 b7 83 b6 1d 7c 31 54 71 6c 98 0b 5e e7 d3 Aug 26 13:22:22.778312: | 61 50 c6 16 0a 23 c8 06 89 5b b5 85 16 d4 fc 39 Aug 26 13:22:22.778316: | 24 38 98 59 8f 77 d1 77 42 19 26 6b 0e 84 2b f1 Aug 26 13:22:22.778321: | 44 27 63 08 da b8 c7 69 ce f2 0b f8 2f b3 a1 f1 Aug 26 13:22:22.778326: | e4 ea b5 42 08 9d 42 89 ab 65 50 6a 1f c9 a9 72 Aug 26 13:22:22.778338: | 13 fa 8f 74 97 c8 f5 fa 1f dc 93 3e 86 61 63 fa Aug 26 13:22:22.778344: | 4e 87 08 73 9d ad 1c b9 c5 23 1f bd c4 f6 b6 2a Aug 26 13:22:22.778349: | c9 66 2a ec be d3 76 16 30 e6 2d 66 51 3e fe c0 Aug 26 13:22:22.778354: | 6b 3f 9a d0 d4 86 2c f7 ef 3f 90 87 e6 a3 14 8d Aug 26 13:22:22.778358: | 50 93 f8 f4 c7 24 c2 21 f5 44 34 e3 2b 84 5d 00 Aug 26 13:22:22.778363: | 37 54 2f 84 91 22 83 07 d7 4a 6a 2c ee 54 c6 21 Aug 26 13:22:22.778368: | 65 19 cc fe 01 4c b2 fe 89 71 37 83 f0 c5 27 62 Aug 26 13:22:22.778373: | 3f e3 2b ff b3 c2 62 4f 88 3f 35 5d d5 0f c3 eb Aug 26 13:22:22.778378: | b7 8f 39 a2 cc 17 bc 7c 8d 30 93 f4 57 2f fc d0 Aug 26 13:22:22.778383: | b8 c3 b4 eb 73 3e 91 cb f5 89 55 86 7a 79 b0 e7 Aug 26 13:22:22.778388: | 7a 24 c9 0f 96 bd 79 b6 d0 95 73 47 bd 48 3d 53 Aug 26 13:22:22.778393: | 00 07 c2 63 48 3d b6 9e c0 12 75 a6 c9 53 30 c7 Aug 26 13:22:22.778398: | c1 0f bb aa 38 c5 72 70 a4 f5 80 f4 6a a6 3f 39 Aug 26 13:22:22.778403: | e3 fd c5 87 41 a7 97 bd 0f ef 4a 5a b9 88 13 e1 Aug 26 13:22:22.778407: | ba 40 06 41 50 da 0c 93 f3 a2 26 04 ea ec 73 78 Aug 26 13:22:22.778412: | ed 9c f3 00 64 4d 47 62 46 aa c4 74 ec 50 b8 f3 Aug 26 13:22:22.778417: | 3a 11 a1 33 04 09 0d e6 f9 ab 63 b4 Aug 26 13:22:22.778428: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:22:22.778435: | **parse ISAKMP Message: Aug 26 13:22:22.778441: | initiator cookie: Aug 26 13:22:22.778446: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:22.778452: | responder cookie: Aug 26 13:22:22.778456: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.778462: | next payload type: ISAKMP_NEXT_HASH (0x8) Aug 26 13:22:22.778468: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:22.778474: | exchange type: ISAKMP_XCHG_QUICK (0x20) Aug 26 13:22:22.778480: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:22:22.778485: | Message ID: 1945191578 (0x73f1449a) Aug 26 13:22:22.778491: | length: 460 (0x1cc) Aug 26 13:22:22.778498: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32) Aug 26 13:22:22.778506: | State DB: found IKEv1 state #4 in QUICK_I1 (find_state_ikev1) Aug 26 13:22:22.778517: | start processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1633) Aug 26 13:22:22.778523: | #4 is idle Aug 26 13:22:22.778528: | #4 idle Aug 26 13:22:22.778535: | received encrypted packet from 192.1.2.23:500 Aug 26 13:22:22.778563: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030 Aug 26 13:22:22.778570: | ***parse ISAKMP Hash Payload: Aug 26 13:22:22.778576: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:22:22.778582: | length: 36 (0x24) Aug 26 13:22:22.778588: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030 Aug 26 13:22:22.778594: | ***parse ISAKMP Security Association Payload: Aug 26 13:22:22.778599: | next payload type: ISAKMP_NEXT_NONCE (0xa) Aug 26 13:22:22.778605: | length: 56 (0x38) Aug 26 13:22:22.778610: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:22:22.778616: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030 Aug 26 13:22:22.778621: | ***parse ISAKMP Nonce Payload: Aug 26 13:22:22.778626: | next payload type: ISAKMP_NEXT_KE (0x4) Aug 26 13:22:22.778631: | length: 36 (0x24) Aug 26 13:22:22.778637: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030 Aug 26 13:22:22.778642: | ***parse ISAKMP Key Exchange Payload: Aug 26 13:22:22.778647: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:22:22.778652: | length: 260 (0x104) Aug 26 13:22:22.778658: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 Aug 26 13:22:22.778664: | ***parse ISAKMP Identification Payload (IPsec DOI): Aug 26 13:22:22.778669: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:22:22.778674: | length: 16 (0x10) Aug 26 13:22:22.778679: | ID type: ID_IPV4_ADDR_SUBNET (0x4) Aug 26 13:22:22.778684: | Protocol ID: 0 (0x0) Aug 26 13:22:22.778694: | port: 0 (0x0) Aug 26 13:22:22.778699: | obj: c0 00 03 00 ff ff ff 00 Aug 26 13:22:22.778705: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 Aug 26 13:22:22.778711: | ***parse ISAKMP Identification Payload (IPsec DOI): Aug 26 13:22:22.778716: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.778721: | length: 16 (0x10) Aug 26 13:22:22.778726: | ID type: ID_IPV4_ADDR_SUBNET (0x4) Aug 26 13:22:22.778731: | Protocol ID: 0 (0x0) Aug 26 13:22:22.778736: | port: 0 (0x0) Aug 26 13:22:22.778741: | obj: c0 00 16 00 ff ff ff 00 Aug 26 13:22:22.778746: | removing 12 bytes of padding Aug 26 13:22:22.778797: | quick_inR1_outI2 HASH(2): Aug 26 13:22:22.778805: | 37 aa 11 1d 8a ee 69 91 67 a4 79 51 6c 13 5e 0e Aug 26 13:22:22.778810: | 72 c6 58 a0 18 bc fa d2 1d 7f c0 00 45 8a 2c f9 Aug 26 13:22:22.778816: | received 'quick_inR1_outI2' message HASH(2) data ok Aug 26 13:22:22.778826: | ****parse IPsec DOI SIT: Aug 26 13:22:22.778832: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:22:22.778838: | ****parse ISAKMP Proposal Payload: Aug 26 13:22:22.778843: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.778848: | length: 44 (0x2c) Aug 26 13:22:22.778854: | proposal number: 0 (0x0) Aug 26 13:22:22.778859: | protocol ID: PROTO_IPSEC_ESP (0x3) Aug 26 13:22:22.778864: | SPI size: 4 (0x4) Aug 26 13:22:22.778869: | number of transforms: 1 (0x1) Aug 26 13:22:22.778875: | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI Aug 26 13:22:22.778880: | SPI 29 fe 72 30 Aug 26 13:22:22.778887: | *****parse ISAKMP Transform Payload (ESP): Aug 26 13:22:22.778892: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.778897: | length: 32 (0x20) Aug 26 13:22:22.778902: | ESP transform number: 0 (0x0) Aug 26 13:22:22.778907: | ESP transform ID: ESP_AES (0xc) Aug 26 13:22:22.778914: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:22:22.778920: | af+type: AF+GROUP_DESCRIPTION (0x8003) Aug 26 13:22:22.778925: | length/value: 14 (0xe) Aug 26 13:22:22.778931: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:22.778937: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:22:22.778942: | af+type: AF+ENCAPSULATION_MODE (0x8004) Aug 26 13:22:22.778947: | length/value: 1 (0x1) Aug 26 13:22:22.778953: | [1 is ENCAPSULATION_MODE_TUNNEL] Aug 26 13:22:22.778959: | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none Aug 26 13:22:22.778964: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:22:22.778970: | af+type: AF+SA_LIFE_TYPE (0x8001) Aug 26 13:22:22.778974: | length/value: 1 (0x1) Aug 26 13:22:22.778980: | [1 is SA_LIFE_TYPE_SECONDS] Aug 26 13:22:22.778985: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:22:22.778990: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) Aug 26 13:22:22.778996: | length/value: 28800 (0x7080) Aug 26 13:22:22.779001: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:22:22.779007: | af+type: AF+AUTH_ALGORITHM (0x8005) Aug 26 13:22:22.779011: | length/value: 2 (0x2) Aug 26 13:22:22.779017: | [2 is AUTH_ALGORITHM_HMAC_SHA1] Aug 26 13:22:22.779022: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:22:22.779027: | af+type: AF+KEY_LENGTH (0x8006) Aug 26 13:22:22.779032: | length/value: 128 (0x80) Aug 26 13:22:22.779039: | ESP IPsec Transform verified unconditionally; no alg_info to check against Aug 26 13:22:22.779070: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK Aug 26 13:22:22.779085: | actually looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK Aug 26 13:22:22.779108: | line 0: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA Aug 26 13:22:22.779116: | line 1: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA Aug 26 13:22:22.779123: | concluding with best_match=000 best=(nil) (lineno=-1) Aug 26 13:22:22.779128: | no PreShared Key Found Aug 26 13:22:22.779138: | adding quick outI2 DH work-order 9 for state #4 Aug 26 13:22:22.779144: | state #4 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:22:22.779150: | #4 STATE_QUICK_I1: retransmits: cleared Aug 26 13:22:22.779158: | libevent_free: release ptr-libevent@0x560749ad07b8 Aug 26 13:22:22.779164: | free_event_entry: release EVENT_RETRANSMIT-pe@0x560749ac9ca8 Aug 26 13:22:22.779171: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x560749ac9ca8 Aug 26 13:22:22.779179: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #4 Aug 26 13:22:22.779186: | libevent_malloc: new ptr-libevent@0x7f0f0c006328 size 128 Aug 26 13:22:22.779204: | complete v1 state transition with STF_SUSPEND Aug 26 13:22:22.779216: | [RE]START processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) Aug 26 13:22:22.779222: | suspending state #4 and saving MD Aug 26 13:22:22.779228: | #4 is busy; has a suspended MD Aug 26 13:22:22.779232: | crypto helper 0 resuming Aug 26 13:22:22.779239: | #4 spent 0.411 milliseconds in process_packet_tail() Aug 26 13:22:22.779281: | crypto helper 0 starting work-order 9 for state #4 Aug 26 13:22:22.779305: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:22:22.779324: | crypto helper 0 doing compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 9 Aug 26 13:22:22.779331: | stop processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 13:22:22.779342: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:22:22.779352: | spent 1.09 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:22:22.781343: | spent 0.00704 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:22:22.781399: | *received 460 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Aug 26 13:22:22.781408: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.781414: | 08 10 20 01 e7 ce 28 57 00 00 01 cc bb e6 4a 90 Aug 26 13:22:22.781419: | 70 e9 29 2c 09 78 54 4a a1 26 c1 c6 b7 dc 92 9b Aug 26 13:22:22.781424: | cd 28 da ef 45 72 6e 63 17 62 82 03 c3 44 26 28 Aug 26 13:22:22.781429: | 1e fc f3 a4 bc 26 ac bc 90 ee b8 91 52 32 8c b8 Aug 26 13:22:22.781434: | 41 c5 36 b2 39 40 06 6e 32 78 f7 1e 34 ad e4 0a Aug 26 13:22:22.781439: | 1f d8 bb 5d 11 69 96 ac 8a 67 e6 3d 04 67 db e8 Aug 26 13:22:22.781444: | e0 c8 35 3d 40 3b a1 45 f4 e2 0a 18 09 a5 fa cd Aug 26 13:22:22.781449: | 38 19 f2 e9 bc e1 b9 b7 87 4d d2 36 47 a1 3c c6 Aug 26 13:22:22.781454: | 1d 04 15 90 28 fc 9c 8b 32 46 0d df 1e 4d 96 47 Aug 26 13:22:22.781459: | c7 6f 80 90 f2 8d dc d6 d6 74 73 33 63 a8 a1 e4 Aug 26 13:22:22.781464: | 24 80 3c 20 71 36 8e 27 17 4b e4 a4 bb f0 2d 3c Aug 26 13:22:22.781468: | 50 d7 11 20 cb 27 13 f9 0f a6 fa b8 2c 1e 31 ad Aug 26 13:22:22.781473: | ea 36 0e b0 05 f8 66 7e bb f0 4b f4 ca a6 a4 c5 Aug 26 13:22:22.781478: | a2 59 82 a4 df 14 be 89 de fe 19 4a aa ff 1c 41 Aug 26 13:22:22.781483: | 30 5b 5e 88 37 c3 13 e9 c8 ca 86 e0 bd 78 fb 68 Aug 26 13:22:22.781488: | 0a 9b d5 36 9a fd 78 a9 29 3b c2 85 14 30 6c 0d Aug 26 13:22:22.781493: | c3 d7 51 33 a9 11 9e 21 70 38 ad 7a bf e7 9f f1 Aug 26 13:22:22.781498: | 66 1e da bf 21 47 81 f8 80 0b 06 89 40 a4 12 bd Aug 26 13:22:22.781503: | 36 53 d5 4d a0 b7 97 43 6d a2 f7 89 11 25 36 3e Aug 26 13:22:22.781515: | d7 4d ea 57 39 b4 31 27 f0 72 dd b2 91 9e 74 f6 Aug 26 13:22:22.781521: | 36 d2 2d 50 cd 46 25 00 12 d7 f9 b2 bd 68 67 ac Aug 26 13:22:22.781525: | ee 85 f7 ec 16 14 df 65 9e c2 4c 11 95 85 97 a6 Aug 26 13:22:22.781530: | f7 f0 d1 02 65 79 08 3b 8f 14 08 ff 7a 94 5d a9 Aug 26 13:22:22.781535: | 89 d8 32 fa 58 30 1e 7b 13 c3 9a eb 1f ff ef f2 Aug 26 13:22:22.781540: | 4f c1 76 69 3b 06 80 49 73 69 b7 62 5e fa 82 11 Aug 26 13:22:22.781545: | 98 33 d8 80 2e 8d 06 23 8f b7 4c 6f 23 f5 1b b0 Aug 26 13:22:22.781550: | 42 77 eb 35 09 80 2a c1 b3 af 20 cc 96 fb fd dd Aug 26 13:22:22.781555: | cb 7b 7a ca da 4c da 25 6a 0c e4 ab Aug 26 13:22:22.781565: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:22:22.781573: | **parse ISAKMP Message: Aug 26 13:22:22.781578: | initiator cookie: Aug 26 13:22:22.781584: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:22.781589: | responder cookie: Aug 26 13:22:22.781594: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.781600: | next payload type: ISAKMP_NEXT_HASH (0x8) Aug 26 13:22:22.781606: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:22.781611: | exchange type: ISAKMP_XCHG_QUICK (0x20) Aug 26 13:22:22.781617: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:22:22.781623: | Message ID: 3889047639 (0xe7ce2857) Aug 26 13:22:22.781628: | length: 460 (0x1cc) Aug 26 13:22:22.781635: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32) Aug 26 13:22:22.781642: | State DB: found IKEv1 state #5 in QUICK_I1 (find_state_ikev1) Aug 26 13:22:22.781653: | start processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1633) Aug 26 13:22:22.781659: | #5 is idle Aug 26 13:22:22.781664: | #5 idle Aug 26 13:22:22.781672: | received encrypted packet from 192.1.2.23:500 Aug 26 13:22:22.781700: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030 Aug 26 13:22:22.781708: | ***parse ISAKMP Hash Payload: Aug 26 13:22:22.781713: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:22:22.781719: | length: 36 (0x24) Aug 26 13:22:22.781725: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030 Aug 26 13:22:22.781731: | ***parse ISAKMP Security Association Payload: Aug 26 13:22:22.781736: | next payload type: ISAKMP_NEXT_NONCE (0xa) Aug 26 13:22:22.781741: | length: 56 (0x38) Aug 26 13:22:22.781747: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:22:22.781752: | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030 Aug 26 13:22:22.781758: | ***parse ISAKMP Nonce Payload: Aug 26 13:22:22.781763: | next payload type: ISAKMP_NEXT_KE (0x4) Aug 26 13:22:22.781768: | length: 36 (0x24) Aug 26 13:22:22.781774: | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030 Aug 26 13:22:22.781779: | ***parse ISAKMP Key Exchange Payload: Aug 26 13:22:22.781784: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:22:22.781789: | length: 260 (0x104) Aug 26 13:22:22.781795: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 Aug 26 13:22:22.781800: | ***parse ISAKMP Identification Payload (IPsec DOI): Aug 26 13:22:22.781806: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:22:22.781811: | length: 16 (0x10) Aug 26 13:22:22.781816: | ID type: ID_IPV4_ADDR_SUBNET (0x4) Aug 26 13:22:22.781821: | Protocol ID: 0 (0x0) Aug 26 13:22:22.781826: | port: 0 (0x0) Aug 26 13:22:22.781832: | obj: c0 00 03 00 ff ff ff 00 Aug 26 13:22:22.781838: | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 Aug 26 13:22:22.781843: | ***parse ISAKMP Identification Payload (IPsec DOI): Aug 26 13:22:22.781848: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.781853: | length: 16 (0x10) Aug 26 13:22:22.781859: | ID type: ID_IPV4_ADDR_SUBNET (0x4) Aug 26 13:22:22.781864: | Protocol ID: 0 (0x0) Aug 26 13:22:22.781869: | port: 0 (0x0) Aug 26 13:22:22.781874: | obj: c0 00 02 00 ff ff ff 00 Aug 26 13:22:22.781879: | removing 12 bytes of padding Aug 26 13:22:22.781935: | quick_inR1_outI2 HASH(2): Aug 26 13:22:22.781944: | ce ef e1 0c 88 87 01 92 ec 7b 84 83 3d 31 3a 61 Aug 26 13:22:22.781949: | 15 58 00 5d 23 d1 89 50 6f 21 d1 11 5a 5b 85 f5 Aug 26 13:22:22.781955: | received 'quick_inR1_outI2' message HASH(2) data ok Aug 26 13:22:22.781965: | ****parse IPsec DOI SIT: Aug 26 13:22:22.781987: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:22:22.781963: | crypto helper 0 finished compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 9 time elapsed 0.002639 seconds Aug 26 13:22:22.781994: | ****parse ISAKMP Proposal Payload: Aug 26 13:22:22.782018: | (#4) spent 2.67 milliseconds in crypto helper computing work-order 9: quick outI2 DH (pcr) Aug 26 13:22:22.782036: | crypto helper 0 sending results from work-order 9 for state #4 to event queue Aug 26 13:22:22.782025: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.782060: | length: 44 (0x2c) Aug 26 13:22:22.782071: | proposal number: 0 (0x0) Aug 26 13:22:22.782081: | protocol ID: PROTO_IPSEC_ESP (0x3) Aug 26 13:22:22.782090: | SPI size: 4 (0x4) Aug 26 13:22:22.782100: | number of transforms: 1 (0x1) Aug 26 13:22:22.782048: | scheduling resume sending helper answer for #4 Aug 26 13:22:22.782124: | libevent_malloc: new ptr-libevent@0x7f0f04000e98 size 128 Aug 26 13:22:22.782110: | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI Aug 26 13:22:22.782142: | crypto helper 0 waiting (nothing to do) Aug 26 13:22:22.782152: | SPI b8 78 31 0e Aug 26 13:22:22.782175: | *****parse ISAKMP Transform Payload (ESP): Aug 26 13:22:22.782182: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.782187: | length: 32 (0x20) Aug 26 13:22:22.782192: | ESP transform number: 0 (0x0) Aug 26 13:22:22.782198: | ESP transform ID: ESP_AES (0xc) Aug 26 13:22:22.782204: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:22:22.782210: | af+type: AF+GROUP_DESCRIPTION (0x8003) Aug 26 13:22:22.782215: | length/value: 14 (0xe) Aug 26 13:22:22.782221: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:22.782227: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:22:22.782232: | af+type: AF+ENCAPSULATION_MODE (0x8004) Aug 26 13:22:22.782237: | length/value: 1 (0x1) Aug 26 13:22:22.782243: | [1 is ENCAPSULATION_MODE_TUNNEL] Aug 26 13:22:22.782249: | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none Aug 26 13:22:22.782254: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:22:22.782259: | af+type: AF+SA_LIFE_TYPE (0x8001) Aug 26 13:22:22.782264: | length/value: 1 (0x1) Aug 26 13:22:22.782269: | [1 is SA_LIFE_TYPE_SECONDS] Aug 26 13:22:22.782275: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:22:22.782280: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) Aug 26 13:22:22.782285: | length/value: 28800 (0x7080) Aug 26 13:22:22.782315: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:22:22.782322: | af+type: AF+AUTH_ALGORITHM (0x8005) Aug 26 13:22:22.782327: | length/value: 2 (0x2) Aug 26 13:22:22.782332: | [2 is AUTH_ALGORITHM_HMAC_SHA1] Aug 26 13:22:22.782337: | ******parse ISAKMP IPsec DOI attribute: Aug 26 13:22:22.782343: | af+type: AF+KEY_LENGTH (0x8006) Aug 26 13:22:22.782348: | length/value: 128 (0x80) Aug 26 13:22:22.782354: | ESP IPsec Transform verified unconditionally; no alg_info to check against Aug 26 13:22:22.782386: | started looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK Aug 26 13:22:22.782401: | actually looking for secret for C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org->C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org of kind PKK_PSK Aug 26 13:22:22.782426: | line 0: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA Aug 26 13:22:22.782433: | line 1: key type PKK_PSK(C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org) to type PKK_RSA Aug 26 13:22:22.782440: | concluding with best_match=000 best=(nil) (lineno=-1) Aug 26 13:22:22.782445: | no PreShared Key Found Aug 26 13:22:22.782454: | adding quick outI2 DH work-order 10 for state #5 Aug 26 13:22:22.782461: | state #5 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:22:22.782467: | #5 STATE_QUICK_I1: retransmits: cleared Aug 26 13:22:22.782474: | libevent_free: release ptr-libevent@0x7f0ef8002888 Aug 26 13:22:22.782481: | free_event_entry: release EVENT_RETRANSMIT-pe@0x560749ad1fb8 Aug 26 13:22:22.782488: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x560749ad1fb8 Aug 26 13:22:22.782496: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #5 Aug 26 13:22:22.782503: | libevent_malloc: new ptr-libevent@0x560749ada0d8 size 128 Aug 26 13:22:22.782517: | complete v1 state transition with STF_SUSPEND Aug 26 13:22:22.782529: | [RE]START processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) Aug 26 13:22:22.782534: | crypto helper 2 resuming Aug 26 13:22:22.782535: | suspending state #5 and saving MD Aug 26 13:22:22.782557: | crypto helper 2 starting work-order 10 for state #5 Aug 26 13:22:22.782560: | #5 is busy; has a suspended MD Aug 26 13:22:22.782573: | crypto helper 2 doing compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 10 Aug 26 13:22:22.782588: | #5 spent 0.57 milliseconds in process_packet_tail() Aug 26 13:22:22.782600: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:22:22.782609: | stop processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 13:22:22.782615: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:22:22.782624: | spent 1.2 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:22:22.782642: | processing resume sending helper answer for #4 Aug 26 13:22:22.782652: | start processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:22:22.782660: | crypto helper 0 replies to request ID 9 Aug 26 13:22:22.782665: | calling continuation function 0x5607486cbb50 Aug 26 13:22:22.782671: | quick_inR1_outI2_continue for #4: calculated ke+nonce, calculating DH Aug 26 13:22:22.782682: | **emit ISAKMP Message: Aug 26 13:22:22.782689: | initiator cookie: Aug 26 13:22:22.782694: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:22.782699: | responder cookie: Aug 26 13:22:22.782704: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.782709: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.782715: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:22.782720: | exchange type: ISAKMP_XCHG_QUICK (0x20) Aug 26 13:22:22.782726: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:22:22.782731: | Message ID: 1945191578 (0x73f1449a) Aug 26 13:22:22.782738: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:22:22.782745: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address Aug 26 13:22:22.782751: | ID address c0 00 03 00 Aug 26 13:22:22.782756: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask Aug 26 13:22:22.782761: | ID mask ff ff ff 00 Aug 26 13:22:22.782770: | our client is subnet 192.0.3.0/24 Aug 26 13:22:22.782776: | our client protocol/port is 0/0 Aug 26 13:22:22.782782: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address Aug 26 13:22:22.782787: | ID address c0 00 16 00 Aug 26 13:22:22.782792: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask Aug 26 13:22:22.782804: | ID mask ff ff ff 00 Aug 26 13:22:22.782812: | peer client is subnet 192.0.22.0/24 Aug 26 13:22:22.782817: | peer client protocol/port is 0/0 Aug 26 13:22:22.782823: | ***emit ISAKMP Hash Payload: Aug 26 13:22:22.782828: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.782835: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:22:22.782841: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' Aug 26 13:22:22.782848: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:22:22.782854: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:22:22.782900: | quick_inR1_outI2 HASH(3): Aug 26 13:22:22.782907: | b5 35 52 0e a7 28 93 7c 77 0e ae 21 d6 89 bb 6b Aug 26 13:22:22.782913: | 9a 49 7b f3 75 2d 40 94 ff 54 94 23 e9 a3 8e b5 Aug 26 13:22:22.782918: | compute_proto_keymat: needed_len (after ESP enc)=16 Aug 26 13:22:22.782923: | compute_proto_keymat: needed_len (after ESP auth)=36 Aug 26 13:22:22.783124: | install_ipsec_sa() for #4: inbound and outbound Aug 26 13:22:22.783134: | could_route called for north-a-dpd (kind=CK_PERMANENT) Aug 26 13:22:22.783141: | FOR_EACH_CONNECTION_... in route_owner Aug 26 13:22:22.783147: | conn north-a-dpd mark 0/00000000, 0/00000000 vs Aug 26 13:22:22.783153: | conn north-a-dpd mark 0/00000000, 0/00000000 Aug 26 13:22:22.783159: | conn north-a-dpd mark 0/00000000, 0/00000000 vs Aug 26 13:22:22.783165: | conn northnet-eastnet-b mark 0/00000000, 0/00000000 Aug 26 13:22:22.783173: | route owner of "north-a-dpd" prospective erouted: self; eroute owner: self Aug 26 13:22:22.783181: | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 Aug 26 13:22:22.783188: | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 Aug 26 13:22:22.783194: | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 Aug 26 13:22:22.783202: | setting IPsec SA replay-window to 32 Aug 26 13:22:22.783208: | NIC esp-hw-offload not for connection 'north-a-dpd' not available on interface eth1 Aug 26 13:22:22.783215: | netlink: enabling tunnel mode Aug 26 13:22:22.783221: | netlink: setting IPsec SA replay-window to 32 using old-style req Aug 26 13:22:22.783227: | netlink: esp-hw-offload not set for IPsec SA Aug 26 13:22:22.783374: | netlink response for Add SA esp.29fe7230@192.1.2.23 included non-error error Aug 26 13:22:22.783399: | set up outgoing SA, ref=0/0 Aug 26 13:22:22.783407: | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 Aug 26 13:22:22.783413: | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 Aug 26 13:22:22.783419: | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 Aug 26 13:22:22.783426: | setting IPsec SA replay-window to 32 Aug 26 13:22:22.783432: | NIC esp-hw-offload not for connection 'north-a-dpd' not available on interface eth1 Aug 26 13:22:22.783438: | netlink: enabling tunnel mode Aug 26 13:22:22.783443: | netlink: setting IPsec SA replay-window to 32 using old-style req Aug 26 13:22:22.783449: | netlink: esp-hw-offload not set for IPsec SA Aug 26 13:22:22.783531: | netlink response for Add SA esp.8b2e7633@192.1.3.33 included non-error error Aug 26 13:22:22.783548: | priority calculation of connection "north-a-dpd" is 0xfe7e7 Aug 26 13:22:22.783564: | add inbound eroute 192.0.22.0/24:0 --0-> 192.0.3.0/24:0 => tun.10000@192.1.3.33 (raw_eroute) Aug 26 13:22:22.783570: | IPsec Sa SPD priority set to 1042407 Aug 26 13:22:22.783632: | raw_eroute result=success Aug 26 13:22:22.783644: | set up incoming SA, ref=0/0 Aug 26 13:22:22.783650: | sr for #4: prospective erouted Aug 26 13:22:22.783657: | route_and_eroute() for proto 0, and source port 0 dest port 0 Aug 26 13:22:22.783662: | FOR_EACH_CONNECTION_... in route_owner Aug 26 13:22:22.783668: | conn north-a-dpd mark 0/00000000, 0/00000000 vs Aug 26 13:22:22.783674: | conn north-a-dpd mark 0/00000000, 0/00000000 Aug 26 13:22:22.783680: | conn north-a-dpd mark 0/00000000, 0/00000000 vs Aug 26 13:22:22.783691: | conn northnet-eastnet-b mark 0/00000000, 0/00000000 Aug 26 13:22:22.783699: | route owner of "north-a-dpd" prospective erouted: self; eroute owner: self Aug 26 13:22:22.783707: | route_and_eroute with c: north-a-dpd (next: none) ero:north-a-dpd esr:{(nil)} ro:north-a-dpd rosr:{(nil)} and state: #4 Aug 26 13:22:22.783714: | priority calculation of connection "north-a-dpd" is 0xfe7e7 Aug 26 13:22:22.783729: | eroute_connection replace eroute 192.0.3.0/24:0 --0-> 192.0.22.0/24:0 => tun.0@192.1.2.23>tun.0@192.1.2.23 (raw_eroute) Aug 26 13:22:22.783735: | IPsec Sa SPD priority set to 1042407 Aug 26 13:22:22.783769: | raw_eroute result=success Aug 26 13:22:22.783782: | running updown command "ipsec _updown" for verb up Aug 26 13:22:22.783790: | command executing up-client Aug 26 13:22:22.783844: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:22.783856: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:22.783894: | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENC Aug 26 13:22:22.783901: | popen cmd is 1398 chars long Aug 26 13:22:22.783907: | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_: Aug 26 13:22:22.783913: | cmd( 80):INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID=: Aug 26 13:22:22.783919: | cmd( 160):'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.: Aug 26 13:22:22.783925: | cmd( 240):libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24: Aug 26 13:22:22.783930: | cmd( 320):' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_: Aug 26 13:22:22.783935: | cmd( 400):PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_: Aug 26 13:22:22.783941: | cmd( 480):PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Te: Aug 26 13:22:22.783946: | cmd( 560):st Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org': Aug 26 13:22:22.783952: | cmd( 640): PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER: Aug 26 13:22:22.783958: | cmd( 720):_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_P: Aug 26 13:22:22.783966: | cmd( 800):EER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libresw: Aug 26 13:22:22.783986: | cmd( 880):an test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTI: Aug 26 13:22:22.784000: | cmd( 960):ME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+I: Aug 26 13:22:22.784009: | cmd(1040):KE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4: Aug 26 13:22:22.784017: | cmd(1120):' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAI: Aug 26 13:22:22.784032: | cmd(1200):N_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_N: Aug 26 13:22:22.784042: | cmd(1280):M_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x29fe7230: Aug 26 13:22:22.784050: | cmd(1360): SPI_OUT=0x8b2e7633 ipsec _updown 2>&1: Aug 26 13:22:22.785130: | crypto helper 2 finished compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 10 time elapsed 0.002554 seconds Aug 26 13:22:22.785180: | (#5) spent 1.91 milliseconds in crypto helper computing work-order 10: quick outI2 DH (pcr) Aug 26 13:22:22.785196: | crypto helper 2 sending results from work-order 10 for state #5 to event queue Aug 26 13:22:22.785218: | scheduling resume sending helper answer for #5 Aug 26 13:22:22.785229: | libevent_malloc: new ptr-libevent@0x7f0f08003e78 size 128 Aug 26 13:22:22.785271: | crypto helper 2 waiting (nothing to do) Aug 26 13:22:22.805445: | route_and_eroute: firewall_notified: true Aug 26 13:22:22.805466: | route_and_eroute: instance "north-a-dpd", setting eroute_owner {spd=0x560749abaf38,sr=0x560749abaf38} to #4 (was #0) (newest_ipsec_sa=#0) Aug 26 13:22:22.805566: | #3 spent 2.08 milliseconds in install_ipsec_sa() Aug 26 13:22:22.805578: | emitting 12 zero bytes of encryption padding into ISAKMP Message Aug 26 13:22:22.805588: | no IKEv1 message padding required Aug 26 13:22:22.805592: | emitting length of ISAKMP Message: 76 Aug 26 13:22:22.805628: | inR1_outI2: instance north-a-dpd[0], setting IKEv1 newest_ipsec_sa to #4 (was #0) (spd.eroute=#4) cloned from #3 Aug 26 13:22:22.805633: | DPD: dpd_init() called on IPsec SA Aug 26 13:22:22.805638: | State DB: found IKEv1 state #3 in MAIN_I4 (find_state_ikev1) Aug 26 13:22:22.805642: | event_schedule: new EVENT_DPD-pe@0x7f0ef8002b78 Aug 26 13:22:22.805649: | inserting event EVENT_DPD, timeout in 3 seconds for #4 Aug 26 13:22:22.805655: | libevent_malloc: new ptr-libevent@0x560749ad07b8 size 128 Aug 26 13:22:22.805662: | complete v1 state transition with STF_OK Aug 26 13:22:22.805671: | [RE]START processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:22:22.805674: | #4 is idle Aug 26 13:22:22.805678: | doing_xauth:no, t_xauth_client_done:no Aug 26 13:22:22.805682: | IKEv1: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 Aug 26 13:22:22.805686: | child state #4: QUICK_I1(established CHILD SA) => QUICK_I2(established CHILD SA) Aug 26 13:22:22.805690: | event_already_set, deleting event Aug 26 13:22:22.805693: | state #4 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:22:22.805698: | libevent_free: release ptr-libevent@0x7f0f0c006328 Aug 26 13:22:22.805703: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x560749ac9ca8 Aug 26 13:22:22.805719: | sending reply packet to 192.1.2.23:500 (from 192.1.3.33:500) Aug 26 13:22:22.805733: | sending 76 bytes for STATE_QUICK_I1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #4) Aug 26 13:22:22.805737: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.805740: | 08 10 20 01 73 f1 44 9a 00 00 00 4c 35 6d 61 9e Aug 26 13:22:22.805743: | 32 9a 5a 39 91 f3 b7 72 4a 11 e0 39 8e 27 d2 a1 Aug 26 13:22:22.805746: | 3e 3f 8e b9 cb c9 51 6a ec 34 42 47 e6 ef 57 f7 Aug 26 13:22:22.805749: | a5 ad cd a0 d9 48 a8 ef 45 cc c0 92 Aug 26 13:22:22.805811: | !event_already_set at reschedule Aug 26 13:22:22.805818: | event_schedule: new EVENT_SA_REPLACE-pe@0x560749ac9ca8 Aug 26 13:22:22.805823: | inserting event EVENT_SA_REPLACE, timeout in 27829 seconds for #4 Aug 26 13:22:22.805827: | libevent_malloc: new ptr-libevent@0x7f0f0c006328 size 128 Aug 26 13:22:22.805832: | pstats #4 ikev1.ipsec established Aug 26 13:22:22.805837: | NAT-T: encaps is 'auto' Aug 26 13:22:22.805844: "north-a-dpd" #4: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x29fe7230 <0x8b2e7633 xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=active} Aug 26 13:22:22.805851: | modecfg pull: noquirk policy:push not-client Aug 26 13:22:22.805855: | phase 1 is done, looking for phase 2 to unpend Aug 26 13:22:22.805874: | resume sending helper answer for #4 suppresed complete_v1_state_transition() Aug 26 13:22:22.805890: | #4 spent 2.83 milliseconds in resume sending helper answer Aug 26 13:22:22.805900: | stop processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:22:22.805910: | libevent_free: release ptr-libevent@0x7f0f04000e98 Aug 26 13:22:22.805934: | processing resume sending helper answer for #5 Aug 26 13:22:22.805941: | start processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:22:22.805947: | crypto helper 2 replies to request ID 10 Aug 26 13:22:22.805950: | calling continuation function 0x5607486cbb50 Aug 26 13:22:22.805954: | quick_inR1_outI2_continue for #5: calculated ke+nonce, calculating DH Aug 26 13:22:22.805989: | **emit ISAKMP Message: Aug 26 13:22:22.805993: | initiator cookie: Aug 26 13:22:22.805997: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:22.806000: | responder cookie: Aug 26 13:22:22.806003: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.806006: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.806010: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:22.806013: | exchange type: ISAKMP_XCHG_QUICK (0x20) Aug 26 13:22:22.806018: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:22:22.806022: | Message ID: 3889047639 (0xe7ce2857) Aug 26 13:22:22.806026: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:22:22.806031: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address Aug 26 13:22:22.806034: | ID address c0 00 03 00 Aug 26 13:22:22.806038: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask Aug 26 13:22:22.806041: | ID mask ff ff ff 00 Aug 26 13:22:22.806046: | our client is subnet 192.0.3.0/24 Aug 26 13:22:22.806050: | our client protocol/port is 0/0 Aug 26 13:22:22.806053: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address Aug 26 13:22:22.806056: | ID address c0 00 02 00 Aug 26 13:22:22.806060: | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask Aug 26 13:22:22.806063: | ID mask ff ff ff 00 Aug 26 13:22:22.806067: | peer client is subnet 192.0.2.0/24 Aug 26 13:22:22.806070: | peer client protocol/port is 0/0 Aug 26 13:22:22.806073: | ***emit ISAKMP Hash Payload: Aug 26 13:22:22.806077: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:22.806081: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:22:22.806085: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' Aug 26 13:22:22.806089: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:22:22.806092: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:22:22.806138: | quick_inR1_outI2 HASH(3): Aug 26 13:22:22.806143: | bb 27 58 11 e5 37 a6 92 d0 e4 6c 5e c0 80 2e 6a Aug 26 13:22:22.806146: | 11 e6 56 1b c4 1b a9 af ea 58 57 8b dd a3 d5 18 Aug 26 13:22:22.806150: | compute_proto_keymat: needed_len (after ESP enc)=16 Aug 26 13:22:22.806153: | compute_proto_keymat: needed_len (after ESP auth)=36 Aug 26 13:22:22.806330: | install_ipsec_sa() for #5: inbound and outbound Aug 26 13:22:22.806344: | could_route called for northnet-eastnet-b (kind=CK_PERMANENT) Aug 26 13:22:22.806348: | FOR_EACH_CONNECTION_... in route_owner Aug 26 13:22:22.806352: | conn northnet-eastnet-b mark 0/00000000, 0/00000000 vs Aug 26 13:22:22.806356: | conn north-a-dpd mark 0/00000000, 0/00000000 Aug 26 13:22:22.806360: | conn northnet-eastnet-b mark 0/00000000, 0/00000000 vs Aug 26 13:22:22.806363: | conn northnet-eastnet-b mark 0/00000000, 0/00000000 Aug 26 13:22:22.806368: | route owner of "northnet-eastnet-b" unrouted: NULL; eroute owner: NULL Aug 26 13:22:22.806373: | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 Aug 26 13:22:22.806381: | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 Aug 26 13:22:22.806385: | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 Aug 26 13:22:22.806390: | setting IPsec SA replay-window to 32 Aug 26 13:22:22.806394: | NIC esp-hw-offload not for connection 'northnet-eastnet-b' not available on interface eth1 Aug 26 13:22:22.806398: | netlink: enabling tunnel mode Aug 26 13:22:22.806402: | netlink: setting IPsec SA replay-window to 32 using old-style req Aug 26 13:22:22.806405: | netlink: esp-hw-offload not set for IPsec SA Aug 26 13:22:22.806497: | netlink response for Add SA esp.b878310e@192.1.2.23 included non-error error Aug 26 13:22:22.806506: | set up outgoing SA, ref=0/0 Aug 26 13:22:22.806512: | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 Aug 26 13:22:22.806518: | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 Aug 26 13:22:22.806524: | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 Aug 26 13:22:22.806531: | setting IPsec SA replay-window to 32 Aug 26 13:22:22.806537: | NIC esp-hw-offload not for connection 'northnet-eastnet-b' not available on interface eth1 Aug 26 13:22:22.806543: | netlink: enabling tunnel mode Aug 26 13:22:22.806548: | netlink: setting IPsec SA replay-window to 32 using old-style req Aug 26 13:22:22.806551: | netlink: esp-hw-offload not set for IPsec SA Aug 26 13:22:22.806613: | netlink response for Add SA esp.9bdaa38d@192.1.3.33 included non-error error Aug 26 13:22:22.806621: | priority calculation of connection "northnet-eastnet-b" is 0xfe7e7 Aug 26 13:22:22.806630: | add inbound eroute 192.0.2.0/24:0 --0-> 192.0.3.0/24:0 => tun.10000@192.1.3.33 (raw_eroute) Aug 26 13:22:22.806634: | IPsec Sa SPD priority set to 1042407 Aug 26 13:22:22.806670: | raw_eroute result=success Aug 26 13:22:22.806679: | set up incoming SA, ref=0/0 Aug 26 13:22:22.806682: | sr for #5: unrouted Aug 26 13:22:22.806686: | route_and_eroute() for proto 0, and source port 0 dest port 0 Aug 26 13:22:22.806689: | FOR_EACH_CONNECTION_... in route_owner Aug 26 13:22:22.806693: | conn northnet-eastnet-b mark 0/00000000, 0/00000000 vs Aug 26 13:22:22.806697: | conn north-a-dpd mark 0/00000000, 0/00000000 Aug 26 13:22:22.806701: | conn northnet-eastnet-b mark 0/00000000, 0/00000000 vs Aug 26 13:22:22.806704: | conn northnet-eastnet-b mark 0/00000000, 0/00000000 Aug 26 13:22:22.806709: | route owner of "northnet-eastnet-b" unrouted: NULL; eroute owner: NULL Aug 26 13:22:22.806713: | route_and_eroute with c: northnet-eastnet-b (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #5 Aug 26 13:22:22.806717: | priority calculation of connection "northnet-eastnet-b" is 0xfe7e7 Aug 26 13:22:22.806725: | eroute_connection add eroute 192.0.3.0/24:0 --0-> 192.0.2.0/24:0 => tun.0@192.1.2.23 (raw_eroute) Aug 26 13:22:22.806729: | IPsec Sa SPD priority set to 1042407 Aug 26 13:22:22.806748: | raw_eroute result=success Aug 26 13:22:22.806755: | running updown command "ipsec _updown" for verb up Aug 26 13:22:22.806759: | command executing up-client Aug 26 13:22:22.806794: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:22.806805: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:22.806834: | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASI Aug 26 13:22:22.806843: | popen cmd is 1403 chars long Aug 26 13:22:22.806847: | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-b': Aug 26 13:22:22.806851: | cmd( 80): PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO: Aug 26 13:22:22.806854: | cmd( 160):_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.t: Aug 26 13:22:22.806858: | cmd( 240):esting.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0: Aug 26 13:22:22.806861: | cmd( 320):.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PL: Aug 26 13:22:22.806864: | cmd( 400):UTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP': Aug 26 13:22:22.806867: | cmd( 480): PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan: Aug 26 13:22:22.806871: | cmd( 560):, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libresw: Aug 26 13:22:22.806874: | cmd( 640):an.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO: Aug 26 13:22:22.806877: | cmd( 720):_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PL: Aug 26 13:22:22.806880: | cmd( 800):UTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Li: Aug 26 13:22:22.806883: | cmd( 880):breswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_: Aug 26 13:22:22.806887: | cmd( 960):ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TR: Aug 26 13:22:22.806890: | cmd(1040):ACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY=: Aug 26 13:22:22.806893: | cmd(1120):'ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_: Aug 26 13:22:22.806897: | cmd(1200):DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PL: Aug 26 13:22:22.806900: | cmd(1280):UTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xb87: Aug 26 13:22:22.806903: | cmd(1360):8310e SPI_OUT=0x9bdaa38d ipsec _updown 2>&1: Aug 26 13:22:22.818980: | route_and_eroute: firewall_notified: true Aug 26 13:22:22.818996: | running updown command "ipsec _updown" for verb prepare Aug 26 13:22:22.819000: | command executing prepare-client Aug 26 13:22:22.819027: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:22.819033: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:22.819051: | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POL Aug 26 13:22:22.819058: | popen cmd is 1408 chars long Aug 26 13:22:22.819061: | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastn: Aug 26 13:22:22.819064: | cmd( 80):et-b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' : Aug 26 13:22:22.819066: | cmd( 160):PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=no: Aug 26 13:22:22.819068: | cmd( 240):rth.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT=': Aug 26 13:22:22.819071: | cmd( 320):192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.: Aug 26 13:22:22.819073: | cmd( 400):0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE=: Aug 26 13:22:22.819075: | cmd( 480):'ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libr: Aug 26 13:22:22.819078: | cmd( 560):eswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.li: Aug 26 13:22:22.819080: | cmd( 640):breswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' : Aug 26 13:22:22.819082: | cmd( 720):PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL=': Aug 26 13:22:22.819085: | cmd( 800):0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, : Aug 26 13:22:22.819087: | cmd( 880):CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' P: Aug 26 13:22:22.819089: | cmd( 960):LUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAR: Aug 26 13:22:22.819092: | cmd(1040):EF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFA: Aug 26 13:22:22.819094: | cmd(1120):MILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_: Aug 26 13:22:22.819096: | cmd(1200):PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT=': Aug 26 13:22:22.819099: | cmd(1280):0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=: Aug 26 13:22:22.819101: | cmd(1360):0xb878310e SPI_OUT=0x9bdaa38d ipsec _updown 2>&1: Aug 26 13:22:22.828376: | running updown command "ipsec _updown" for verb route Aug 26 13:22:22.828391: | command executing route-client Aug 26 13:22:22.828418: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:22.828423: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:22.828441: | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY= Aug 26 13:22:22.828445: | popen cmd is 1406 chars long Aug 26 13:22:22.828447: | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet: Aug 26 13:22:22.828450: | cmd( 80):-b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PL: Aug 26 13:22:22.828452: | cmd( 160):UTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=nort: Aug 26 13:22:22.828457: | cmd( 240):h.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='19: Aug 26 13:22:22.828460: | cmd( 320):2.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0': Aug 26 13:22:22.828462: | cmd( 400): PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='E: Aug 26 13:22:22.828465: | cmd( 480):SP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libres: Aug 26 13:22:22.828467: | cmd( 560):wan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libr: Aug 26 13:22:22.828469: | cmd( 640):eswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PL: Aug 26 13:22:22.828472: | cmd( 720):UTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0': Aug 26 13:22:22.828474: | cmd( 800): PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN: Aug 26 13:22:22.828476: | cmd( 880):=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLU: Aug 26 13:22:22.828479: | cmd( 960):TO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF: Aug 26 13:22:22.828481: | cmd(1040):_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMI: Aug 26 13:22:22.828483: | cmd(1120):LY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PE: Aug 26 13:22:22.828486: | cmd(1200):ER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0': Aug 26 13:22:22.828488: | cmd(1280): PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x: Aug 26 13:22:22.828490: | cmd(1360):b878310e SPI_OUT=0x9bdaa38d ipsec _updown 2>&1: Aug 26 13:22:22.840895: | route_and_eroute: instance "northnet-eastnet-b", setting eroute_owner {spd=0x560749ac6e58,sr=0x560749ac6e58} to #5 (was #0) (newest_ipsec_sa=#0) Aug 26 13:22:22.840983: | #3 spent 2.09 milliseconds in install_ipsec_sa() Aug 26 13:22:22.840991: | emitting 12 zero bytes of encryption padding into ISAKMP Message Aug 26 13:22:22.840999: | no IKEv1 message padding required Aug 26 13:22:22.841001: | emitting length of ISAKMP Message: 76 Aug 26 13:22:22.841037: | inR1_outI2: instance northnet-eastnet-b[0], setting IKEv1 newest_ipsec_sa to #5 (was #0) (spd.eroute=#5) cloned from #3 Aug 26 13:22:22.841041: | DPD: dpd_init() called on IPsec SA Aug 26 13:22:22.841043: | DPD: Peer does not support Dead Peer Detection Aug 26 13:22:22.841047: | complete v1 state transition with STF_OK Aug 26 13:22:22.841053: | [RE]START processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:22:22.841055: | #5 is idle Aug 26 13:22:22.841058: | doing_xauth:no, t_xauth_client_done:no Aug 26 13:22:22.841064: | IKEv1: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 Aug 26 13:22:22.841068: | child state #5: QUICK_I1(established CHILD SA) => QUICK_I2(established CHILD SA) Aug 26 13:22:22.841071: | event_already_set, deleting event Aug 26 13:22:22.841074: | state #5 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:22:22.841084: | libevent_free: release ptr-libevent@0x560749ada0d8 Aug 26 13:22:22.841090: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x560749ad1fb8 Aug 26 13:22:22.841099: | sending reply packet to 192.1.2.23:500 (from 192.1.3.33:500) Aug 26 13:22:22.841109: | sending 76 bytes for STATE_QUICK_I1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #5) Aug 26 13:22:22.841112: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:22.841114: | 08 10 20 01 e7 ce 28 57 00 00 00 4c c3 2f 44 91 Aug 26 13:22:22.841116: | 92 7b 26 df 3d 38 33 3d 01 28 1d 4b cd 53 b1 1c Aug 26 13:22:22.841118: | 3a de 24 c4 32 1c ab fa 2d dd e7 4f bc 95 45 90 Aug 26 13:22:22.841120: | 96 7d 1e c3 6f ca 4d ea 48 3f be 52 Aug 26 13:22:22.841169: | !event_already_set at reschedule Aug 26 13:22:22.841174: | event_schedule: new EVENT_SA_REPLACE-pe@0x560749ad1fb8 Aug 26 13:22:22.841181: | inserting event EVENT_SA_REPLACE, timeout in 27768 seconds for #5 Aug 26 13:22:22.841185: | libevent_malloc: new ptr-libevent@0x7f0f04000e98 size 128 Aug 26 13:22:22.841188: | pstats #5 ikev1.ipsec established Aug 26 13:22:22.841194: | NAT-T: encaps is 'auto' Aug 26 13:22:22.841198: "northnet-eastnet-b" #5: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0xb878310e <0x9bdaa38d xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=passive} Aug 26 13:22:22.841202: | modecfg pull: noquirk policy:push not-client Aug 26 13:22:22.841204: | phase 1 is done, looking for phase 2 to unpend Aug 26 13:22:22.841210: | resume sending helper answer for #5 suppresed complete_v1_state_transition() Aug 26 13:22:22.841216: | #5 spent 2.68 milliseconds in resume sending helper answer Aug 26 13:22:22.841222: | stop processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:22:22.841226: | libevent_free: release ptr-libevent@0x7f0f08003e78 Aug 26 13:22:22.841236: | processing signal PLUTO_SIGCHLD Aug 26 13:22:22.841241: | waitpid returned ECHILD (no child processes left) Aug 26 13:22:22.841245: | spent 0.00511 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 13:22:22.841254: | processing signal PLUTO_SIGCHLD Aug 26 13:22:22.841258: | waitpid returned ECHILD (no child processes left) Aug 26 13:22:22.841261: | spent 0.00347 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 13:22:22.841264: | processing signal PLUTO_SIGCHLD Aug 26 13:22:22.841267: | waitpid returned ECHILD (no child processes left) Aug 26 13:22:22.841270: | spent 0.00331 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 13:22:22.841272: | processing signal PLUTO_SIGCHLD Aug 26 13:22:22.841276: | waitpid returned ECHILD (no child processes left) Aug 26 13:22:22.841279: | spent 0.00329 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 13:22:25.787491: | timer_event_cb: processing event@0x7f0ef8002b78 Aug 26 13:22:25.787555: | handling event EVENT_DPD for child state #4 Aug 26 13:22:25.787579: | start processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:22:25.787612: | [RE]START processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in dpd_event() at ikev1_dpd.c:360) Aug 26 13:22:25.787621: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:22:25.787633: | DPD: no need to send or schedule DPD for replaced IPsec SA Aug 26 13:22:25.787645: | libevent_free: release ptr-libevent@0x560749ad07b8 Aug 26 13:22:25.787661: | free_event_entry: release EVENT_DPD-pe@0x7f0ef8002b78 Aug 26 13:22:25.787681: | #4 spent 0.196 milliseconds in timer_event_cb() EVENT_DPD Aug 26 13:22:25.787696: | stop processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:557) Aug 26 13:22:32.606755: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:22:32.606843: | FOR_EACH_STATE_... in show_traffic_status (sort_states) Aug 26 13:22:32.606874: | FOR_EACH_STATE_... in sort_states Aug 26 13:22:32.606910: | get_sa_info esp.8b2e7633@192.1.3.33 Aug 26 13:22:32.606985: | get_sa_info esp.29fe7230@192.1.2.23 Aug 26 13:22:32.607090: | get_sa_info esp.9bdaa38d@192.1.3.33 Aug 26 13:22:32.607139: | get_sa_info esp.b878310e@192.1.2.23 Aug 26 13:22:32.607235: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:22:32.607270: | spent 0.545 milliseconds in whack Aug 26 13:22:33.506964: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:22:33.507448: | FOR_EACH_CONNECTION_... in show_connections_status Aug 26 13:22:33.507458: | FOR_EACH_CONNECTION_... in show_connections_status Aug 26 13:22:33.507571: | FOR_EACH_STATE_... in show_states_status (sort_states) Aug 26 13:22:33.507574: | FOR_EACH_STATE_... in sort_states Aug 26 13:22:33.507581: | get_sa_info esp.8b2e7633@192.1.3.33 Aug 26 13:22:33.507596: | get_sa_info esp.29fe7230@192.1.2.23 Aug 26 13:22:33.507615: | get_sa_info esp.9bdaa38d@192.1.3.33 Aug 26 13:22:33.507621: | get_sa_info esp.b878310e@192.1.2.23 Aug 26 13:22:33.507637: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:22:33.507643: | spent 0.683 milliseconds in whack Aug 26 13:22:33.851074: | spent 0.00275 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:22:33.851100: | *received 92 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Aug 26 13:22:33.851104: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:33.851107: | 08 10 05 01 8b 17 74 0a 00 00 00 5c 6f 3b 18 0d Aug 26 13:22:33.851109: | 0f b9 e8 39 7b 21 1e 4a b2 00 9b fd 7c 7c 18 97 Aug 26 13:22:33.851112: | 3e 3b bd 17 91 e3 f0 82 c7 e8 9b 37 9f 08 8c 85 Aug 26 13:22:33.851114: | 8a f2 a4 ac 6a 6b 97 e5 bf 7a fe f0 13 7c a2 09 Aug 26 13:22:33.851116: | a3 9b 72 45 ed ef b8 35 71 b9 36 69 Aug 26 13:22:33.851121: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:22:33.851125: | **parse ISAKMP Message: Aug 26 13:22:33.851127: | initiator cookie: Aug 26 13:22:33.851130: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:33.851132: | responder cookie: Aug 26 13:22:33.851134: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:33.851137: | next payload type: ISAKMP_NEXT_HASH (0x8) Aug 26 13:22:33.851140: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:33.851142: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:22:33.851147: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:22:33.851150: | Message ID: 2333570058 (0x8b17740a) Aug 26 13:22:33.851152: | length: 92 (0x5c) Aug 26 13:22:33.851156: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) Aug 26 13:22:33.851175: | peer and cookies match on #5; msgid=00000000 st_msgid=e7ce2857 st_msgid_phase15=00000000 Aug 26 13:22:33.851178: | peer and cookies match on #4; msgid=00000000 st_msgid=73f1449a st_msgid_phase15=00000000 Aug 26 13:22:33.851181: | peer and cookies match on #3; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 Aug 26 13:22:33.851184: | p15 state object #3 found, in STATE_MAIN_I4 Aug 26 13:22:33.851187: | State DB: found IKEv1 state #3 in MAIN_I4 (find_v1_info_state) Aug 26 13:22:33.851192: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) Aug 26 13:22:33.851211: | #3 is idle Aug 26 13:22:33.851214: | #3 idle Aug 26 13:22:33.851218: | received encrypted packet from 192.1.2.23:500 Aug 26 13:22:33.851229: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 Aug 26 13:22:33.851232: | ***parse ISAKMP Hash Payload: Aug 26 13:22:33.851235: | next payload type: ISAKMP_NEXT_D (0xc) Aug 26 13:22:33.851238: | length: 36 (0x24) Aug 26 13:22:33.851240: | got payload 0x1000 (ISAKMP_NEXT_D) needed: 0x0 opt: 0x0 Aug 26 13:22:33.851243: | ***parse ISAKMP Delete Payload: Aug 26 13:22:33.851246: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.851248: | length: 16 (0x10) Aug 26 13:22:33.851251: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:22:33.851253: | protocol ID: 3 (0x3) Aug 26 13:22:33.851256: | SPI size: 4 (0x4) Aug 26 13:22:33.851258: | number of SPIs: 1 (0x1) Aug 26 13:22:33.851261: | removing 12 bytes of padding Aug 26 13:22:33.851292: | informational HASH(1): Aug 26 13:22:33.851298: | 63 db ff cf 45 b5 63 23 5d 3b d4 06 0f d6 76 ef Aug 26 13:22:33.851301: | 35 5f 62 dc f3 23 f5 00 1d cd f6 1c f0 c8 5d 7c Aug 26 13:22:33.851304: | received 'informational' message HASH(1) data ok Aug 26 13:22:33.851307: | parsing 4 raw bytes of ISAKMP Delete Payload into SPI Aug 26 13:22:33.851310: | SPI b8 78 31 0e Aug 26 13:22:33.851325: | FOR_EACH_STATE_... in find_phase2_state_to_delete Aug 26 13:22:33.851330: | start processing: connection "northnet-eastnet-b" (BACKGROUND) (in accept_delete() at ikev1_main.c:2515) Aug 26 13:22:33.851333: "northnet-eastnet-b" #3: received Delete SA payload: replace IPsec State #5 now Aug 26 13:22:33.851336: | state #5 requesting EVENT_SA_REPLACE to be deleted Aug 26 13:22:33.851342: | libevent_free: release ptr-libevent@0x7f0f04000e98 Aug 26 13:22:33.851348: | free_event_entry: release EVENT_SA_REPLACE-pe@0x560749ad1fb8 Aug 26 13:22:33.851351: | event_schedule: new EVENT_SA_REPLACE-pe@0x560749ad1fb8 Aug 26 13:22:33.851355: | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #5 Aug 26 13:22:33.851358: | libevent_malloc: new ptr-libevent@0x7f0f08003e78 size 128 Aug 26 13:22:33.851363: | stop processing: connection "northnet-eastnet-b" (BACKGROUND) (in accept_delete() at ikev1_main.c:2559) Aug 26 13:22:33.851365: | del: Aug 26 13:22:33.851369: | complete v1 state transition with STF_IGNORE Aug 26 13:22:33.851374: | #3 spent 0.00437 milliseconds in process_packet_tail() Aug 26 13:22:33.851379: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:22:33.851383: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 13:22:33.851386: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:22:33.851390: | spent 0.301 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:22:33.851397: | timer_event_cb: processing event@0x560749ad1fb8 Aug 26 13:22:33.851399: | handling event EVENT_SA_REPLACE for child state #5 Aug 26 13:22:33.851404: | start processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:22:33.851408: | picked newest_ipsec_sa #5 for #5 Aug 26 13:22:33.851410: | replacing stale IPsec SA Aug 26 13:22:33.851414: | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351) Aug 26 13:22:33.851417: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:22:33.851422: | creating state object #6 at 0x560749adfa78 Aug 26 13:22:33.851425: | State DB: adding IKEv1 state #6 in UNDEFINED Aug 26 13:22:33.851434: | pstats #6 ikev1.ipsec started Aug 26 13:22:33.851437: | duplicating state object #3 "northnet-eastnet-b" as #6 for IPSEC SA Aug 26 13:22:33.851442: | #6 setting local endpoint to 192.1.3.33:500 from #3.st_localport (in duplicate_state() at state.c:1484) Aug 26 13:22:33.851449: | suspend processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) Aug 26 13:22:33.851453: | start processing: state #6 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) Aug 26 13:22:33.851462: | child state #6: UNDEFINED(ignore) => QUICK_I1(established CHILD SA) Aug 26 13:22:33.851468: "northnet-eastnet-b" #6: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO to replace #5 {using isakmp#3 msgid:eda88a8d proposal=defaults pfsgroup=MODP2048} Aug 26 13:22:33.851472: | adding quick_outI1 KE work-order 11 for state #6 Aug 26 13:22:33.851475: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f0ef8002b78 Aug 26 13:22:33.851478: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #6 Aug 26 13:22:33.851481: | libevent_malloc: new ptr-libevent@0x560749ada478 size 128 Aug 26 13:22:33.851490: | stop processing: state #6 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) Aug 26 13:22:33.851494: | resume processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) Aug 26 13:22:33.851497: | event_schedule: new EVENT_SA_EXPIRE-pe@0x560749ac97d8 Aug 26 13:22:33.851501: | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #5 Aug 26 13:22:33.851503: | libevent_malloc: new ptr-libevent@0x560749abc1f8 size 128 Aug 26 13:22:33.851506: | libevent_free: release ptr-libevent@0x7f0f08003e78 Aug 26 13:22:33.851509: | free_event_entry: release EVENT_SA_REPLACE-pe@0x560749ad1fb8 Aug 26 13:22:33.851513: | #5 spent 0.116 milliseconds in timer_event_cb() EVENT_SA_REPLACE Aug 26 13:22:33.851517: | stop processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557) Aug 26 13:22:33.851522: | timer_event_cb: processing event@0x560749ac97d8 Aug 26 13:22:33.851526: | crypto helper 3 resuming Aug 26 13:22:33.851526: | handling event EVENT_SA_EXPIRE for child state #5 Aug 26 13:22:33.851540: | crypto helper 3 starting work-order 11 for state #6 Aug 26 13:22:33.851547: | start processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:22:33.851549: | crypto helper 3 doing build KE and nonce (quick_outI1 KE); request ID 11 Aug 26 13:22:33.851551: | picked newest_ipsec_sa #5 for #5 Aug 26 13:22:33.851553: | un-established partial CHILD SA timeout (SA expired) Aug 26 13:22:33.851556: | pstats #5 ikev1.ipsec re-failed exchange-timeout Aug 26 13:22:33.851559: | pstats #5 ikev1.ipsec deleted completed Aug 26 13:22:33.851563: | [RE]START processing: state #5 connection "northnet-eastnet-b" from 192.1.2.23 (in delete_state() at state.c:879) Aug 26 13:22:33.851566: "northnet-eastnet-b" #5: deleting state (STATE_QUICK_I2) aged 11.085s and sending notification Aug 26 13:22:33.851569: | child state #5: QUICK_I2(established CHILD SA) => delete Aug 26 13:22:33.851574: | get_sa_info esp.b878310e@192.1.2.23 Aug 26 13:22:33.851587: | get_sa_info esp.9bdaa38d@192.1.3.33 Aug 26 13:22:33.851594: "northnet-eastnet-b" #5: ESP traffic information: in=0B out=0B Aug 26 13:22:33.851597: | #5 send IKEv1 delete notification for STATE_QUICK_I2 Aug 26 13:22:33.851600: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:22:33.851605: | **emit ISAKMP Message: Aug 26 13:22:33.851607: | initiator cookie: Aug 26 13:22:33.851610: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:33.851612: | responder cookie: Aug 26 13:22:33.851615: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:33.851617: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.851620: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:33.851622: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:22:33.851625: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:22:33.851627: | Message ID: 496209397 (0x1d938df5) Aug 26 13:22:33.851630: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:22:33.851633: | ***emit ISAKMP Hash Payload: Aug 26 13:22:33.851636: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.851639: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:22:33.851642: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg' Aug 26 13:22:33.851645: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:22:33.851647: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:22:33.851650: | ***emit ISAKMP Delete Payload: Aug 26 13:22:33.851653: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.851655: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:22:33.851658: | protocol ID: 3 (0x3) Aug 26 13:22:33.851660: | SPI size: 4 (0x4) Aug 26 13:22:33.851662: | number of SPIs: 1 (0x1) Aug 26 13:22:33.851665: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D) Aug 26 13:22:33.851668: | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg' Aug 26 13:22:33.851671: | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload Aug 26 13:22:33.851674: | delete payload 9b da a3 8d Aug 26 13:22:33.851676: | emitting length of ISAKMP Delete Payload: 16 Aug 26 13:22:33.851694: | send delete HASH(1): Aug 26 13:22:33.851698: | e5 b2 3c c8 08 4b 2d 90 71 68 43 77 4e 5a ce 58 Aug 26 13:22:33.851700: | 2b 0c be 48 25 4f d6 8a 47 78 13 f1 31 96 e2 60 Aug 26 13:22:33.851708: | emitting 12 zero bytes of encryption padding into ISAKMP Message Aug 26 13:22:33.851711: | no IKEv1 message padding required Aug 26 13:22:33.851713: | emitting length of ISAKMP Message: 92 Aug 26 13:22:33.851725: | sending 92 bytes for delete notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3) Aug 26 13:22:33.851729: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:33.851733: | 08 10 05 01 1d 93 8d f5 00 00 00 5c 02 32 9f 4c Aug 26 13:22:33.851735: | aa 06 cc 7c 5c 39 29 62 4f 99 37 44 87 e5 fe b5 Aug 26 13:22:33.851738: | 78 07 36 14 6e e7 4c 26 44 47 98 62 bc 6d 57 94 Aug 26 13:22:33.851740: | d8 88 e7 16 4c 5b e1 5b b5 f8 67 e7 d8 95 d7 bd Aug 26 13:22:33.851742: | 03 89 b8 ec ce 9b 9d 80 26 1c 89 45 Aug 26 13:22:33.851828: | running updown command "ipsec _updown" for verb down Aug 26 13:22:33.851834: | command executing down-client Aug 26 13:22:33.851860: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:33.851866: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:33.851884: | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566825742' PLUTO_CONN_ Aug 26 13:22:33.851887: | popen cmd is 1414 chars long Aug 26 13:22:33.851890: | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-: Aug 26 13:22:33.851893: | cmd( 80):b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLU: Aug 26 13:22:33.851896: | cmd( 160):TO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north: Aug 26 13:22:33.851898: | cmd( 240):.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192: Aug 26 13:22:33.851901: | cmd( 320):.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' : Aug 26 13:22:33.851903: | cmd( 400):PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ES: Aug 26 13:22:33.851906: | cmd( 480):P' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libresw: Aug 26 13:22:33.851909: | cmd( 560):an, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libre: Aug 26 13:22:33.851912: | cmd( 640):swan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLU: Aug 26 13:22:33.851914: | cmd( 720):TO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' : Aug 26 13:22:33.851917: | cmd( 800):PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=: Aug 26 13:22:33.851919: | cmd( 880):Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUT: Aug 26 13:22:33.851922: | cmd( 960):O_ADDTIME='1566825742' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALL: Aug 26 13:22:33.851925: | cmd(1040):OW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_: Aug 26 13:22:33.851927: | cmd(1120):ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' : Aug 26 13:22:33.851930: | cmd(1200):PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CL: Aug 26 13:22:33.851933: | cmd(1280):IENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' S: Aug 26 13:22:33.851935: | cmd(1360):PI_IN=0xb878310e SPI_OUT=0x9bdaa38d ipsec _updown 2>&1: Aug 26 13:22:33.852481: | crypto helper 3 finished build KE and nonce (quick_outI1 KE); request ID 11 time elapsed 0.000932 seconds Aug 26 13:22:33.852493: | (#6) spent 0.696 milliseconds in crypto helper computing work-order 11: quick_outI1 KE (pcr) Aug 26 13:22:33.852496: | crypto helper 3 sending results from work-order 11 for state #6 to event queue Aug 26 13:22:33.852498: | scheduling resume sending helper answer for #6 Aug 26 13:22:33.852500: | libevent_malloc: new ptr-libevent@0x7f0efc005df8 size 128 Aug 26 13:22:33.852512: | crypto helper 3 waiting (nothing to do) Aug 26 13:22:33.860910: | shunt_eroute() called for connection 'northnet-eastnet-b' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0 Aug 26 13:22:33.860924: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 Aug 26 13:22:33.860929: | priority calculation of connection "northnet-eastnet-b" is 0xfe7e7 Aug 26 13:22:33.860934: | IPsec Sa SPD priority set to 1042407 Aug 26 13:22:33.860972: | delete esp.b878310e@192.1.2.23 Aug 26 13:22:33.860993: | netlink response for Del SA esp.b878310e@192.1.2.23 included non-error error Aug 26 13:22:33.860999: | priority calculation of connection "northnet-eastnet-b" is 0xfe7e7 Aug 26 13:22:33.861007: | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.3.0/24:0 => unk255.10000@192.1.3.33 (raw_eroute) Aug 26 13:22:33.861032: | raw_eroute result=success Aug 26 13:22:33.861038: | delete esp.9bdaa38d@192.1.3.33 Aug 26 13:22:33.861051: | netlink response for Del SA esp.9bdaa38d@192.1.3.33 included non-error error Aug 26 13:22:33.861066: | in connection_discard for connection northnet-eastnet-b Aug 26 13:22:33.861070: | State DB: deleting IKEv1 state #5 in QUICK_I2 Aug 26 13:22:33.861078: | child state #5: QUICK_I2(established CHILD SA) => UNDEFINED(ignore) Aug 26 13:22:33.861118: | stop processing: state #5 from 192.1.2.23 (in delete_state() at state.c:1143) Aug 26 13:22:33.861153: | libevent_free: release ptr-libevent@0x560749abc1f8 Aug 26 13:22:33.861159: | free_event_entry: release EVENT_SA_EXPIRE-pe@0x560749ac97d8 Aug 26 13:22:33.861163: | in statetime_stop() and could not find #5 Aug 26 13:22:33.861166: | processing: STOP state #0 (in timer_event_cb() at timer.c:557) Aug 26 13:22:33.861190: | spent 0.00307 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:22:33.861207: | *received 92 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Aug 26 13:22:33.861211: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:33.861214: | 08 10 05 01 f4 76 ea 06 00 00 00 5c 91 b9 f8 d5 Aug 26 13:22:33.861216: | 87 a9 f8 ee 21 18 dd ef 7d 5b 42 fc d4 2f 40 4e Aug 26 13:22:33.861219: | 3b 83 82 93 88 18 a0 aa cb ac 7f e5 dd dd a4 fa Aug 26 13:22:33.861221: | a3 c1 c7 02 3e 78 95 1d 12 f4 3a a5 6c 6d 96 da Aug 26 13:22:33.861224: | a7 d8 4a 5a 13 9f 3e c5 69 56 e7 06 Aug 26 13:22:33.861230: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:22:33.861234: | **parse ISAKMP Message: Aug 26 13:22:33.861237: | initiator cookie: Aug 26 13:22:33.861239: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:33.861242: | responder cookie: Aug 26 13:22:33.861245: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:33.861248: | next payload type: ISAKMP_NEXT_HASH (0x8) Aug 26 13:22:33.861251: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:33.861254: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:22:33.861259: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:22:33.861262: | Message ID: 4101433862 (0xf476ea06) Aug 26 13:22:33.861265: | length: 92 (0x5c) Aug 26 13:22:33.861269: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) Aug 26 13:22:33.861273: | peer and cookies match on #6; msgid=00000000 st_msgid=eda88a8d st_msgid_phase15=00000000 Aug 26 13:22:33.861277: | peer and cookies match on #4; msgid=00000000 st_msgid=73f1449a st_msgid_phase15=00000000 Aug 26 13:22:33.861280: | peer and cookies match on #3; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 Aug 26 13:22:33.861286: | p15 state object #3 found, in STATE_MAIN_I4 Aug 26 13:22:33.861300: | State DB: found IKEv1 state #3 in MAIN_I4 (find_v1_info_state) Aug 26 13:22:33.861306: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) Aug 26 13:22:33.861338: | #3 is idle Aug 26 13:22:33.861341: | #3 idle Aug 26 13:22:33.861345: | received encrypted packet from 192.1.2.23:500 Aug 26 13:22:33.861361: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 Aug 26 13:22:33.861365: | ***parse ISAKMP Hash Payload: Aug 26 13:22:33.861369: | next payload type: ISAKMP_NEXT_D (0xc) Aug 26 13:22:33.861371: | length: 36 (0x24) Aug 26 13:22:33.861374: | got payload 0x1000 (ISAKMP_NEXT_D) needed: 0x0 opt: 0x0 Aug 26 13:22:33.861377: | ***parse ISAKMP Delete Payload: Aug 26 13:22:33.861380: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.861383: | length: 16 (0x10) Aug 26 13:22:33.861386: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:22:33.861388: | protocol ID: 3 (0x3) Aug 26 13:22:33.861391: | SPI size: 4 (0x4) Aug 26 13:22:33.861393: | number of SPIs: 1 (0x1) Aug 26 13:22:33.861396: | removing 12 bytes of padding Aug 26 13:22:33.861419: | informational HASH(1): Aug 26 13:22:33.861423: | 9b 83 af 15 04 25 dd 87 07 6b ed cd 93 59 9e 36 Aug 26 13:22:33.861426: | 0d 6a 10 e3 fb c3 b6 fa e1 d3 06 84 88 6f 0e 15 Aug 26 13:22:33.861428: | received 'informational' message HASH(1) data ok Aug 26 13:22:33.861432: | parsing 4 raw bytes of ISAKMP Delete Payload into SPI Aug 26 13:22:33.861434: | SPI 29 fe 72 30 Aug 26 13:22:33.861438: | FOR_EACH_STATE_... in find_phase2_state_to_delete Aug 26 13:22:33.861443: | start processing: connection "north-a-dpd" (BACKGROUND) (in accept_delete() at ikev1_main.c:2515) Aug 26 13:22:33.861448: "northnet-eastnet-b" #3: received Delete SA payload: replace IPsec State #4 now Aug 26 13:22:33.861451: | state #4 requesting EVENT_SA_REPLACE to be deleted Aug 26 13:22:33.861455: | libevent_free: release ptr-libevent@0x7f0f0c006328 Aug 26 13:22:33.861458: | free_event_entry: release EVENT_SA_REPLACE-pe@0x560749ac9ca8 Aug 26 13:22:33.861463: | event_schedule: new EVENT_SA_REPLACE-pe@0x560749ac9ca8 Aug 26 13:22:33.861467: | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #4 Aug 26 13:22:33.861471: | libevent_malloc: new ptr-libevent@0x560749ac91b8 size 128 Aug 26 13:22:33.861476: | stop processing: connection "north-a-dpd" (BACKGROUND) (in accept_delete() at ikev1_main.c:2559) Aug 26 13:22:33.861479: | del: Aug 26 13:22:33.861485: | complete v1 state transition with STF_IGNORE Aug 26 13:22:33.861490: | #3 spent 0.00624 milliseconds in process_packet_tail() Aug 26 13:22:33.861496: | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:22:33.861501: | stop processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_md() at demux.c:382) Aug 26 13:22:33.861505: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:22:33.861510: | spent 0.308 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:22:33.861518: | processing resume sending helper answer for #6 Aug 26 13:22:33.861523: | start processing: state #6 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:22:33.861528: | crypto helper 3 replies to request ID 11 Aug 26 13:22:33.861531: | calling continuation function 0x5607486cbb50 Aug 26 13:22:33.861534: | quick_outI1_continue for #6: calculated ke+nonce, sending I1 Aug 26 13:22:33.861559: | **emit ISAKMP Message: Aug 26 13:22:33.861562: | initiator cookie: Aug 26 13:22:33.861565: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:33.861568: | responder cookie: Aug 26 13:22:33.861570: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:33.861573: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.861577: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:33.861580: | exchange type: ISAKMP_XCHG_QUICK (0x20) Aug 26 13:22:33.861585: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:22:33.861588: | Message ID: 3987245709 (0xeda88a8d) Aug 26 13:22:33.861591: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:22:33.861595: | ***emit ISAKMP Hash Payload: Aug 26 13:22:33.861598: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.861602: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:22:33.861605: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' Aug 26 13:22:33.861608: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:22:33.861611: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:22:33.861614: | emitting quick defaults using policy none Aug 26 13:22:33.861617: | empty esp_info, returning defaults for ENCRYPT Aug 26 13:22:33.861622: | ***emit ISAKMP Security Association Payload: Aug 26 13:22:33.861625: | next payload type: ISAKMP_NEXT_NONCE (0xa) Aug 26 13:22:33.861627: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:22:33.861631: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE Aug 26 13:22:33.861634: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:22:33.861637: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:22:33.861641: | ****emit IPsec DOI SIT: Aug 26 13:22:33.861644: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:22:33.861647: | ikev1_out_sa pcn: 0 has 1 valid proposals Aug 26 13:22:33.861650: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2 Aug 26 13:22:33.861653: | ****emit ISAKMP Proposal Payload: Aug 26 13:22:33.861656: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.861659: | proposal number: 0 (0x0) Aug 26 13:22:33.861662: | protocol ID: PROTO_IPSEC_ESP (0x3) Aug 26 13:22:33.861664: | SPI size: 4 (0x4) Aug 26 13:22:33.861667: | number of transforms: 2 (0x2) Aug 26 13:22:33.861670: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' Aug 26 13:22:33.861684: | netlink_get_spi: allocated 0xee9a97a5 for esp.0@192.1.3.33 Aug 26 13:22:33.861688: | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload Aug 26 13:22:33.861692: | SPI ee 9a 97 a5 Aug 26 13:22:33.861695: | *****emit ISAKMP Transform Payload (ESP): Aug 26 13:22:33.861698: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.861701: | ESP transform number: 0 (0x0) Aug 26 13:22:33.861703: | ESP transform ID: ESP_AES (0xc) Aug 26 13:22:33.861707: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' Aug 26 13:22:33.861710: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:33.861713: | af+type: AF+GROUP_DESCRIPTION (0x8003) Aug 26 13:22:33.861716: | length/value: 14 (0xe) Aug 26 13:22:33.861719: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:33.861721: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:33.861724: | af+type: AF+ENCAPSULATION_MODE (0x8004) Aug 26 13:22:33.861727: | length/value: 1 (0x1) Aug 26 13:22:33.861730: | [1 is ENCAPSULATION_MODE_TUNNEL] Aug 26 13:22:33.861733: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:33.861735: | af+type: AF+SA_LIFE_TYPE (0x8001) Aug 26 13:22:33.861738: | length/value: 1 (0x1) Aug 26 13:22:33.861741: | [1 is SA_LIFE_TYPE_SECONDS] Aug 26 13:22:33.861743: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:33.861746: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) Aug 26 13:22:33.861749: | length/value: 28800 (0x7080) Aug 26 13:22:33.861751: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:33.861754: | af+type: AF+AUTH_ALGORITHM (0x8005) Aug 26 13:22:33.861757: | length/value: 2 (0x2) Aug 26 13:22:33.861762: | [2 is AUTH_ALGORITHM_HMAC_SHA1] Aug 26 13:22:33.861765: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:33.861768: | af+type: AF+KEY_LENGTH (0x8006) Aug 26 13:22:33.861770: | length/value: 128 (0x80) Aug 26 13:22:33.861773: | emitting length of ISAKMP Transform Payload (ESP): 32 Aug 26 13:22:33.861776: | *****emit ISAKMP Transform Payload (ESP): Aug 26 13:22:33.861778: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.861781: | ESP transform number: 1 (0x1) Aug 26 13:22:33.861784: | ESP transform ID: ESP_3DES (0x3) Aug 26 13:22:33.861787: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.861790: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' Aug 26 13:22:33.861793: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:33.861796: | af+type: AF+GROUP_DESCRIPTION (0x8003) Aug 26 13:22:33.861798: | length/value: 14 (0xe) Aug 26 13:22:33.861801: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:33.861803: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:33.861806: | af+type: AF+ENCAPSULATION_MODE (0x8004) Aug 26 13:22:33.861808: | length/value: 1 (0x1) Aug 26 13:22:33.861811: | [1 is ENCAPSULATION_MODE_TUNNEL] Aug 26 13:22:33.861814: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:33.861816: | af+type: AF+SA_LIFE_TYPE (0x8001) Aug 26 13:22:33.861832: | length/value: 1 (0x1) Aug 26 13:22:33.861834: | [1 is SA_LIFE_TYPE_SECONDS] Aug 26 13:22:33.861837: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:33.861840: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) Aug 26 13:22:33.861843: | length/value: 28800 (0x7080) Aug 26 13:22:33.861846: | ******emit ISAKMP IPsec DOI attribute: Aug 26 13:22:33.861849: | af+type: AF+AUTH_ALGORITHM (0x8005) Aug 26 13:22:33.861852: | length/value: 2 (0x2) Aug 26 13:22:33.861854: | [2 is AUTH_ALGORITHM_HMAC_SHA1] Aug 26 13:22:33.861857: | emitting length of ISAKMP Transform Payload (ESP): 28 Aug 26 13:22:33.861860: | emitting length of ISAKMP Proposal Payload: 72 Aug 26 13:22:33.861863: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0 Aug 26 13:22:33.861866: | emitting length of ISAKMP Security Association Payload: 84 Aug 26 13:22:33.861869: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 Aug 26 13:22:33.861874: | ***emit ISAKMP Nonce Payload: Aug 26 13:22:33.861877: | next payload type: ISAKMP_NEXT_KE (0x4) Aug 26 13:22:33.861880: | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE Aug 26 13:22:33.861884: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) Aug 26 13:22:33.861887: | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' Aug 26 13:22:33.861890: | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload Aug 26 13:22:33.861893: | Ni c8 e2 95 00 c6 a1 92 0d f0 2c 60 a7 dd aa 08 b8 Aug 26 13:22:33.861896: | Ni 62 ac f6 82 94 d5 dc 97 64 d6 dd 63 d4 34 5f 37 Aug 26 13:22:33.861912: | emitting length of ISAKMP Nonce Payload: 36 Aug 26 13:22:33.861915: | ***emit ISAKMP Key Exchange Payload: Aug 26 13:22:33.861918: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:22:33.861921: | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID Aug 26 13:22:33.861924: | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) Aug 26 13:22:33.861927: | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' Aug 26 13:22:33.861930: | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload Aug 26 13:22:33.861935: | keyex value 2f 66 a4 d9 2c 34 29 6b dd 04 b8 cb 0c 06 92 88 Aug 26 13:22:33.861938: | keyex value 6d 65 10 44 5c f9 1b 66 4b 1f 48 20 a1 57 8e 8c Aug 26 13:22:33.861940: | keyex value 14 a7 a4 bf 9a f9 00 0c e1 db b2 c0 f1 af d3 1b Aug 26 13:22:33.861943: | keyex value b5 df 9b e6 5b 18 bd 8d 02 29 3d bd 20 74 65 1d Aug 26 13:22:33.861946: | keyex value 80 f0 0f 96 34 ef 14 da 81 89 22 90 5f 43 e4 77 Aug 26 13:22:33.861949: | keyex value b1 88 6a f6 ce 50 26 b0 67 aa 6c 0b b9 b0 46 de Aug 26 13:22:33.861952: | keyex value 75 bc f1 dd 15 b0 6a d3 a9 cc 6b 9a 66 eb 31 4b Aug 26 13:22:33.861954: | keyex value 22 95 42 9c 2b 8b 5f e5 15 97 32 fb 03 5b be 25 Aug 26 13:22:33.861957: | keyex value da 1b 77 c6 c1 2e fd 4d 05 f8 1e 16 c2 30 97 0e Aug 26 13:22:33.861960: | keyex value 46 18 b8 67 a7 c9 d7 b7 61 63 5b 5f c8 58 8d c8 Aug 26 13:22:33.861962: | keyex value 11 af 48 fb 32 1f 1a c1 ea 5e 3d ec 73 28 6e 23 Aug 26 13:22:33.861965: | keyex value dc 7c 12 52 5e c3 8f da a7 f7 ac 69 a1 70 39 99 Aug 26 13:22:33.861967: | keyex value d4 45 91 32 39 44 51 c4 a1 19 2f ad cf 40 db a8 Aug 26 13:22:33.861970: | keyex value 4a d4 98 1c c8 77 fb d4 a9 75 a0 78 ea 80 21 91 Aug 26 13:22:33.861972: | keyex value d7 31 a7 ad fe d6 8d ec 30 33 68 ed b8 12 3e ae Aug 26 13:22:33.861975: | keyex value 79 68 10 c3 4c 40 cd 0d 2a c1 c6 1b d9 63 90 5d Aug 26 13:22:33.861978: | emitting length of ISAKMP Key Exchange Payload: 260 Aug 26 13:22:33.861981: | ***emit ISAKMP Identification Payload (IPsec DOI): Aug 26 13:22:33.861984: | next payload type: ISAKMP_NEXT_ID (0x5) Aug 26 13:22:33.861987: | ID type: ID_IPV4_ADDR_SUBNET (0x4) Aug 26 13:22:33.861989: | Protocol ID: 0 (0x0) Aug 26 13:22:33.861992: | port: 0 (0x0) Aug 26 13:22:33.861995: | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID Aug 26 13:22:33.861998: | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) Aug 26 13:22:33.862001: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' Aug 26 13:22:33.862004: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:22:33.862007: | client network c0 00 03 00 Aug 26 13:22:33.862010: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:22:33.862012: | client mask ff ff ff 00 Aug 26 13:22:33.862015: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 Aug 26 13:22:33.862017: | ***emit ISAKMP Identification Payload (IPsec DOI): Aug 26 13:22:33.862020: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.862023: | ID type: ID_IPV4_ADDR_SUBNET (0x4) Aug 26 13:22:33.862025: | Protocol ID: 0 (0x0) Aug 26 13:22:33.862027: | port: 0 (0x0) Aug 26 13:22:33.862031: | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) Aug 26 13:22:33.862034: | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' Aug 26 13:22:33.862037: | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:22:33.862039: | client network c0 00 02 00 Aug 26 13:22:33.862042: | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) Aug 26 13:22:33.862044: | client mask ff ff ff 00 Aug 26 13:22:33.862047: | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 Aug 26 13:22:33.862068: | outI1 HASH(1): Aug 26 13:22:33.862072: | 0a 78 6b 38 a4 bb 92 fb 85 2f 43 91 ce 41 77 b9 Aug 26 13:22:33.862075: | 44 06 61 8f 62 89 fe 78 75 4d d5 1b cc 66 eb 38 Aug 26 13:22:33.862083: | no IKEv1 message padding required Aug 26 13:22:33.862086: | emitting length of ISAKMP Message: 476 Aug 26 13:22:33.862102: | sending 476 bytes for reply packet from quick_outI1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #6) Aug 26 13:22:33.862108: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:33.862111: | 08 10 20 01 ed a8 8a 8d 00 00 01 dc 0c 39 34 be Aug 26 13:22:33.862113: | 12 a0 2b 80 62 4c 1c ec 59 92 33 21 62 29 22 43 Aug 26 13:22:33.862116: | 78 23 6a 7f a9 17 3a 23 b0 15 4d ed 08 b2 2a 38 Aug 26 13:22:33.862118: | 9a 3e 0a 49 da d0 5a 43 53 67 87 30 78 94 af 2c Aug 26 13:22:33.862121: | 7c 8d 0e 5e 26 df 20 7e cb dc 9b a6 9b fa 3b 96 Aug 26 13:22:33.862123: | 2e 69 d7 2e 8f ab 68 eb c5 c7 6f 32 a5 c4 42 e0 Aug 26 13:22:33.862126: | 31 52 8f 52 05 8d 42 8d 59 b7 03 07 93 80 b2 ee Aug 26 13:22:33.862128: | f6 ef f9 a8 f7 c6 e5 a9 4e 58 e9 3f e2 06 9f 6b Aug 26 13:22:33.862131: | a9 3c 42 c3 6d 50 1c 34 4e ef 16 f9 8c bf 1b 56 Aug 26 13:22:33.862134: | 2a 50 c9 e6 df 3a 5b c7 7c d1 29 f2 d8 8e 28 1d Aug 26 13:22:33.862136: | 5a 31 7f 1a 85 c4 5d 0a 1f bc 2b 94 22 68 08 b4 Aug 26 13:22:33.862139: | 20 06 2a 39 30 27 5b 3f bc fc 20 70 87 8d e2 86 Aug 26 13:22:33.862141: | ca f6 1b 32 9b c3 8d fe b8 03 52 30 da 6b 3a 24 Aug 26 13:22:33.862144: | 2d ff d9 a2 89 7d 1e 92 41 78 17 fc 74 21 97 08 Aug 26 13:22:33.862146: | b4 e6 64 2b b9 25 2f 47 1a 9e 43 9e 15 48 e5 9f Aug 26 13:22:33.862149: | b0 81 57 92 86 2c d9 ef 68 da 24 15 59 d9 cf c3 Aug 26 13:22:33.862151: | f3 49 8b 67 e8 c7 9d fc 9d a6 50 cc 0a 13 61 ba Aug 26 13:22:33.862154: | b2 47 74 16 a5 08 53 8b 10 ee 26 c0 3e 8b eb 75 Aug 26 13:22:33.862156: | 95 66 3d 59 20 e6 d8 dd 51 27 33 16 77 a8 e0 05 Aug 26 13:22:33.862159: | 1c 30 cd 4f e8 2a 0b 50 05 61 c7 50 91 cc 9a 60 Aug 26 13:22:33.862161: | d4 1e ec 46 08 45 37 b9 08 75 2e 11 35 a2 ae e6 Aug 26 13:22:33.862164: | 87 b6 e3 27 b0 dd ab cb cc 59 aa fe 42 77 84 4f Aug 26 13:22:33.862167: | 11 e5 cf e9 31 8c 53 a1 ea 8c 57 b8 25 64 ed 0d Aug 26 13:22:33.862169: | 66 e3 89 59 cc 0c 3e b1 ff 2b ed 2c fb 75 7d 12 Aug 26 13:22:33.862172: | 9a a8 b7 bd e5 4e 7c af 92 3a 2a 83 cc 48 f3 34 Aug 26 13:22:33.862174: | 55 75 e2 b8 85 b3 4a 57 e5 43 67 e8 f1 ec 7c 90 Aug 26 13:22:33.862177: | 10 76 56 8f 20 a8 e9 b1 72 1c e7 10 4b b2 12 09 Aug 26 13:22:33.862179: | 92 ed 90 a4 91 2f 30 9a 22 5e 3b a7 ba 83 74 d0 Aug 26 13:22:33.862181: | 93 c0 51 08 98 5a 3d b3 c5 b3 29 25 Aug 26 13:22:33.862240: | state #6 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:22:33.862245: | libevent_free: release ptr-libevent@0x560749ada478 Aug 26 13:22:33.862251: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f0ef8002b78 Aug 26 13:22:33.862256: | event_schedule: new EVENT_RETRANSMIT-pe@0x7f0ef8002b78 Aug 26 13:22:33.862260: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #6 Aug 26 13:22:33.862263: | libevent_malloc: new ptr-libevent@0x560749ada478 size 128 Aug 26 13:22:33.862269: | #6 STATE_QUICK_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11039.604721 Aug 26 13:22:33.862275: | resume sending helper answer for #6 suppresed complete_v1_state_transition() Aug 26 13:22:33.862281: | #6 spent 0.714 milliseconds in resume sending helper answer Aug 26 13:22:33.862286: | stop processing: state #6 connection "northnet-eastnet-b" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:22:33.862296: | libevent_free: release ptr-libevent@0x7f0efc005df8 Aug 26 13:22:33.862300: | processing signal PLUTO_SIGCHLD Aug 26 13:22:33.862305: | waitpid returned ECHILD (no child processes left) Aug 26 13:22:33.862310: | spent 0.00553 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 13:22:33.862316: | timer_event_cb: processing event@0x560749ac9ca8 Aug 26 13:22:33.862332: | handling event EVENT_SA_REPLACE for child state #4 Aug 26 13:22:33.862337: | start processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:22:33.862343: | picked newest_ipsec_sa #4 for #4 Aug 26 13:22:33.862346: | replacing stale IPsec SA Aug 26 13:22:33.862350: | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351) Aug 26 13:22:33.862353: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:22:33.862359: | creating state object #7 at 0x560749adef88 Aug 26 13:22:33.862362: | State DB: adding IKEv1 state #7 in UNDEFINED Aug 26 13:22:33.862369: | pstats #7 ikev1.ipsec started Aug 26 13:22:33.862373: | duplicating state object #3 "northnet-eastnet-b" as #7 for IPSEC SA Aug 26 13:22:33.862379: | #7 setting local endpoint to 192.1.3.33:500 from #3.st_localport (in duplicate_state() at state.c:1484) Aug 26 13:22:33.862384: | in connection_discard for connection northnet-eastnet-b Aug 26 13:22:33.862389: | suspend processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) Aug 26 13:22:33.862394: | start processing: state #7 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) Aug 26 13:22:33.862402: | child state #7: UNDEFINED(ignore) => QUICK_I1(established CHILD SA) Aug 26 13:22:33.862408: "north-a-dpd" #7: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO to replace #4 {using isakmp#3 msgid:c98395f3 proposal=defaults pfsgroup=MODP2048} Aug 26 13:22:33.862412: | adding quick_outI1 KE work-order 12 for state #7 Aug 26 13:22:33.862415: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x560749ac97d8 Aug 26 13:22:33.862419: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #7 Aug 26 13:22:33.862422: | libevent_malloc: new ptr-libevent@0x7f0efc005df8 size 128 Aug 26 13:22:33.862432: | stop processing: state #7 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) Aug 26 13:22:33.862437: | resume processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) Aug 26 13:22:33.862441: | event_schedule: new EVENT_SA_EXPIRE-pe@0x560749ad1fb8 Aug 26 13:22:33.862444: | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #4 Aug 26 13:22:33.862447: | libevent_malloc: new ptr-libevent@0x560749ada0d8 size 128 Aug 26 13:22:33.862450: | libevent_free: release ptr-libevent@0x560749ac91b8 Aug 26 13:22:33.862453: | free_event_entry: release EVENT_SA_REPLACE-pe@0x560749ac9ca8 Aug 26 13:22:33.862458: | #4 spent 0.141 milliseconds in timer_event_cb() EVENT_SA_REPLACE Aug 26 13:22:33.862463: | stop processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:557) Aug 26 13:22:33.862468: | crypto helper 4 resuming Aug 26 13:22:33.862468: | timer_event_cb: processing event@0x560749ad1fb8 Aug 26 13:22:33.862488: | handling event EVENT_SA_EXPIRE for child state #4 Aug 26 13:22:33.862481: | crypto helper 4 starting work-order 12 for state #7 Aug 26 13:22:33.862494: | start processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:22:33.862499: | crypto helper 4 doing build KE and nonce (quick_outI1 KE); request ID 12 Aug 26 13:22:33.862505: | picked newest_ipsec_sa #4 for #4 Aug 26 13:22:33.862512: | un-established partial CHILD SA timeout (SA expired) Aug 26 13:22:33.862515: | pstats #4 ikev1.ipsec re-failed exchange-timeout Aug 26 13:22:33.862518: | pstats #4 ikev1.ipsec deleted completed Aug 26 13:22:33.862522: | [RE]START processing: state #4 connection "north-a-dpd" from 192.1.2.23 (in delete_state() at state.c:879) Aug 26 13:22:33.862527: "north-a-dpd" #4: deleting state (STATE_QUICK_I2) aged 11.096s and sending notification Aug 26 13:22:33.862530: | child state #4: QUICK_I2(established CHILD SA) => delete Aug 26 13:22:33.862534: | get_sa_info esp.29fe7230@192.1.2.23 Aug 26 13:22:33.862545: | get_sa_info esp.8b2e7633@192.1.3.33 Aug 26 13:22:33.862553: "north-a-dpd" #4: ESP traffic information: in=0B out=0B Aug 26 13:22:33.862556: | #4 send IKEv1 delete notification for STATE_QUICK_I2 Aug 26 13:22:33.862559: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:22:33.862566: | **emit ISAKMP Message: Aug 26 13:22:33.862572: | initiator cookie: Aug 26 13:22:33.862574: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:33.862577: | responder cookie: Aug 26 13:22:33.862579: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:33.862582: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.862585: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:33.862587: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:22:33.862590: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:22:33.862593: | Message ID: 671541668 (0x2806e9a4) Aug 26 13:22:33.862596: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:22:33.862599: | ***emit ISAKMP Hash Payload: Aug 26 13:22:33.862602: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.862605: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:22:33.862608: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg' Aug 26 13:22:33.862612: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:22:33.862615: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:22:33.862617: | ***emit ISAKMP Delete Payload: Aug 26 13:22:33.862620: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.862622: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:22:33.862625: | protocol ID: 3 (0x3) Aug 26 13:22:33.862628: | SPI size: 4 (0x4) Aug 26 13:22:33.862630: | number of SPIs: 1 (0x1) Aug 26 13:22:33.862634: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D) Aug 26 13:22:33.862636: | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg' Aug 26 13:22:33.862640: | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload Aug 26 13:22:33.862642: | delete payload 8b 2e 76 33 Aug 26 13:22:33.862645: | emitting length of ISAKMP Delete Payload: 16 Aug 26 13:22:33.862663: | send delete HASH(1): Aug 26 13:22:33.862667: | 9a 9c 25 84 42 08 f8 df ac 8b 30 95 49 c5 e8 ec Aug 26 13:22:33.862670: | 1d d9 f7 e1 ef 45 2b 5f 38 90 3f ba 90 fe 72 a5 Aug 26 13:22:33.862678: | emitting 12 zero bytes of encryption padding into ISAKMP Message Aug 26 13:22:33.862681: | no IKEv1 message padding required Aug 26 13:22:33.862684: | emitting length of ISAKMP Message: 92 Aug 26 13:22:33.862696: | sending 92 bytes for delete notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3) Aug 26 13:22:33.862700: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:33.862703: | 08 10 05 01 28 06 e9 a4 00 00 00 5c 3a 8f 55 b7 Aug 26 13:22:33.862705: | 78 2c 7f 75 9b 76 20 64 43 9d a0 d2 52 c7 2d f0 Aug 26 13:22:33.862707: | 41 df 7f 23 0a 73 0f 37 f0 d0 df 9b 6e 0b 40 d3 Aug 26 13:22:33.862710: | 4b 73 f3 b1 ce 65 d0 7d c1 c4 42 b5 6f e5 31 85 Aug 26 13:22:33.862712: | 49 c3 47 e9 23 f1 aa 65 d8 61 24 5c Aug 26 13:22:33.862808: | running updown command "ipsec _updown" for verb down Aug 26 13:22:33.862813: | command executing down-client Aug 26 13:22:33.862859: | trusted_ca_nss: trustee A = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:33.862865: | trusted_ca_nss: trustor B = 'C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' Aug 26 13:22:33.862885: | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libreswan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566825742' PLUTO_CONN_POLIC Aug 26 13:22:33.862890: | popen cmd is 1409 chars long Aug 26 13:22:33.862894: | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUT: Aug 26 13:22:33.862897: | cmd( 80):O_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_I: Aug 26 13:22:33.862899: | cmd( 160):D='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testin: Aug 26 13:22:33.862902: | cmd( 240):g.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/: Aug 26 13:22:33.862905: | cmd( 320):24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_M: Aug 26 13:22:33.862908: | cmd( 400):Y_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUT: Aug 26 13:22:33.862911: | cmd( 480):O_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=: Aug 26 13:22:33.862913: | cmd( 560):Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.or: Aug 26 13:22:33.862916: | cmd( 640):g' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PE: Aug 26 13:22:33.862919: | cmd( 720):ER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO: Aug 26 13:22:33.862922: | cmd( 800):_PEER_CA='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=Libre: Aug 26 13:22:33.862924: | cmd( 880):swan test CA for mainca, E=testing@libreswan.org' PLUTO_STACK='netkey' PLUTO_ADD: Aug 26 13:22:33.862927: | cmd( 960):TIME='1566825742' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SA: Aug 26 13:22:33.862930: | cmd(1040):REF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRF: Aug 26 13:22:33.862933: | cmd(1120):AMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO: Aug 26 13:22:33.862936: | cmd(1200):_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT=: Aug 26 13:22:33.862938: | cmd(1280):'0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN: Aug 26 13:22:33.862941: | cmd(1360):=0x29fe7230 SPI_OUT=0x8b2e7633 ipsec _updown 2>&1: Aug 26 13:22:33.863498: | crypto helper 4 finished build KE and nonce (quick_outI1 KE); request ID 12 time elapsed 0.000998 seconds Aug 26 13:22:33.863514: | (#7) spent 0.735 milliseconds in crypto helper computing work-order 12: quick_outI1 KE (pcr) Aug 26 13:22:33.863518: | crypto helper 4 sending results from work-order 12 for state #7 to event queue Aug 26 13:22:33.863521: | scheduling resume sending helper answer for #7 Aug 26 13:22:33.863524: | libevent_malloc: new ptr-libevent@0x7f0f000072f8 size 128 Aug 26 13:22:33.863542: | crypto helper 4 waiting (nothing to do) Aug 26 13:22:33.870586: | shunt_eroute() called for connection 'north-a-dpd' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0 Aug 26 13:22:33.870597: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 Aug 26 13:22:33.870600: | priority calculation of connection "north-a-dpd" is 0xfe7e7 Aug 26 13:22:33.870604: | IPsec Sa SPD priority set to 1042407 Aug 26 13:22:33.870628: | delete esp.29fe7230@192.1.2.23 Aug 26 13:22:33.870638: | netlink response for Del SA esp.29fe7230@192.1.2.23 included non-error error Aug 26 13:22:33.870641: | priority calculation of connection "north-a-dpd" is 0xfe7e7 Aug 26 13:22:33.870646: | delete inbound eroute 192.0.22.0/24:0 --0-> 192.0.3.0/24:0 => unk255.10000@192.1.3.33 (raw_eroute) Aug 26 13:22:33.870660: | raw_eroute result=success Aug 26 13:22:33.870662: | delete esp.8b2e7633@192.1.3.33 Aug 26 13:22:33.870673: | netlink response for Del SA esp.8b2e7633@192.1.3.33 included non-error error Aug 26 13:22:33.870681: | in connection_discard for connection north-a-dpd Aug 26 13:22:33.870683: | State DB: deleting IKEv1 state #4 in QUICK_I2 Aug 26 13:22:33.870688: | child state #4: QUICK_I2(established CHILD SA) => UNDEFINED(ignore) Aug 26 13:22:33.870715: | stop processing: state #4 from 192.1.2.23 (in delete_state() at state.c:1143) Aug 26 13:22:33.870738: | libevent_free: release ptr-libevent@0x560749ada0d8 Aug 26 13:22:33.870741: | free_event_entry: release EVENT_SA_EXPIRE-pe@0x560749ad1fb8 Aug 26 13:22:33.870744: | in statetime_stop() and could not find #4 Aug 26 13:22:33.870746: | processing: STOP state #0 (in timer_event_cb() at timer.c:557) Aug 26 13:22:33.870761: | spent 0.00189 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:22:33.870774: | *received 92 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Aug 26 13:22:33.870776: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:33.870778: | 08 10 05 01 46 b6 be 1f 00 00 00 5c 2d 51 45 0a Aug 26 13:22:33.870779: | fc 9a d0 79 5d ed 8c cf 4c 43 02 57 84 63 be ea Aug 26 13:22:33.870781: | 1d 61 9e f3 78 7b 44 a3 5d e2 80 ee 41 b9 c9 f7 Aug 26 13:22:33.870782: | b3 f0 22 b2 ab 73 40 de a9 56 7e 2c 3b a7 47 ba Aug 26 13:22:33.870784: | f5 c0 bb 96 16 47 75 df fe 16 4a 1e Aug 26 13:22:33.870787: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:22:33.870790: | **parse ISAKMP Message: Aug 26 13:22:33.870792: | initiator cookie: Aug 26 13:22:33.870793: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:33.870795: | responder cookie: Aug 26 13:22:33.870796: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:33.870798: | next payload type: ISAKMP_NEXT_HASH (0x8) Aug 26 13:22:33.870800: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:33.870802: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:22:33.870804: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:22:33.870806: | Message ID: 1186381343 (0x46b6be1f) Aug 26 13:22:33.870808: | length: 92 (0x5c) Aug 26 13:22:33.870810: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) Aug 26 13:22:33.870813: | peer and cookies match on #7; msgid=00000000 st_msgid=c98395f3 st_msgid_phase15=00000000 Aug 26 13:22:33.870815: | peer and cookies match on #6; msgid=00000000 st_msgid=eda88a8d st_msgid_phase15=00000000 Aug 26 13:22:33.870817: | peer and cookies match on #3; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 Aug 26 13:22:33.870818: | p15 state object #3 found, in STATE_MAIN_I4 Aug 26 13:22:33.870820: | State DB: found IKEv1 state #3 in MAIN_I4 (find_v1_info_state) Aug 26 13:22:33.870824: | start processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) Aug 26 13:22:33.870836: | #3 is idle Aug 26 13:22:33.870838: | #3 idle Aug 26 13:22:33.870840: | received encrypted packet from 192.1.2.23:500 Aug 26 13:22:33.870850: | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 Aug 26 13:22:33.870852: | ***parse ISAKMP Hash Payload: Aug 26 13:22:33.870854: | next payload type: ISAKMP_NEXT_D (0xc) Aug 26 13:22:33.870856: | length: 36 (0x24) Aug 26 13:22:33.870858: | got payload 0x1000 (ISAKMP_NEXT_D) needed: 0x0 opt: 0x0 Aug 26 13:22:33.870860: | ***parse ISAKMP Delete Payload: Aug 26 13:22:33.870861: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.870863: | length: 28 (0x1c) Aug 26 13:22:33.870864: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:22:33.870866: | protocol ID: 1 (0x1) Aug 26 13:22:33.870868: | SPI size: 16 (0x10) Aug 26 13:22:33.870869: | number of SPIs: 1 (0x1) Aug 26 13:22:33.870883: | informational HASH(1): Aug 26 13:22:33.870885: | cb 4a 5b 59 65 ec 96 5c 6f aa 16 6d 3d 5b 45 02 Aug 26 13:22:33.870886: | 0f 70 17 20 49 b8 e1 43 14 ef 68 d1 3e 12 e4 4f Aug 26 13:22:33.870888: | received 'informational' message HASH(1) data ok Aug 26 13:22:33.870890: | parsing 8 raw bytes of ISAKMP Delete Payload into iCookie Aug 26 13:22:33.870894: | iCookie fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:33.870896: | parsing 8 raw bytes of ISAKMP Delete Payload into rCookie Aug 26 13:22:33.870897: | rCookie 52 50 c7 31 a6 db 77 66 Aug 26 13:22:33.870899: | State DB: found IKEv1 state #3 in MAIN_I4 (find_state_ikev1) Aug 26 13:22:33.870901: | del: Aug 26 13:22:33.870904: "northnet-eastnet-b" #3: received Delete SA payload: self-deleting ISAKMP State #3 Aug 26 13:22:33.870906: | pstats #3 ikev1.isakmp deleted completed Aug 26 13:22:33.870910: | [RE]START processing: state #3 connection "northnet-eastnet-b" from 192.1.2.23 (in delete_state() at state.c:879) Aug 26 13:22:33.870912: "northnet-eastnet-b" #3: deleting state (STATE_MAIN_I4) aged 43.188s and sending notification Aug 26 13:22:33.870914: | parent state #3: MAIN_I4(established IKE SA) => delete Aug 26 13:22:33.870946: | #3 send IKEv1 delete notification for STATE_MAIN_I4 Aug 26 13:22:33.870951: | **emit ISAKMP Message: Aug 26 13:22:33.870953: | initiator cookie: Aug 26 13:22:33.870955: | fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:33.870956: | responder cookie: Aug 26 13:22:33.870958: | 52 50 c7 31 a6 db 77 66 Aug 26 13:22:33.870959: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.870961: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:33.870963: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:22:33.870964: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:22:33.870966: | Message ID: 552408080 (0x20ed1410) Aug 26 13:22:33.870968: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:22:33.870970: | ***emit ISAKMP Hash Payload: Aug 26 13:22:33.870972: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.870974: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) Aug 26 13:22:33.870976: | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg' Aug 26 13:22:33.870978: | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload Aug 26 13:22:33.870980: | emitting length of ISAKMP Hash Payload: 36 Aug 26 13:22:33.870981: | ***emit ISAKMP Delete Payload: Aug 26 13:22:33.870983: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.870984: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:22:33.870986: | protocol ID: 1 (0x1) Aug 26 13:22:33.870988: | SPI size: 16 (0x10) Aug 26 13:22:33.870989: | number of SPIs: 1 (0x1) Aug 26 13:22:33.870991: | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D) Aug 26 13:22:33.870993: | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg' Aug 26 13:22:33.870995: | emitting 8 raw bytes of initiator SPI into ISAKMP Delete Payload Aug 26 13:22:33.870997: | initiator SPI fc a6 4a c1 e3 3a c1 65 Aug 26 13:22:33.870998: | emitting 8 raw bytes of responder SPI into ISAKMP Delete Payload Aug 26 13:22:33.871000: | responder SPI 52 50 c7 31 a6 db 77 66 Aug 26 13:22:33.871002: | emitting length of ISAKMP Delete Payload: 28 Aug 26 13:22:33.871013: | send delete HASH(1): Aug 26 13:22:33.871015: | 8d 84 a5 6c a4 6d 9b 12 04 84 2a 14 81 70 89 bd Aug 26 13:22:33.871016: | 59 ee 87 ca 94 3b 5a c9 fb 4d 9a 5a 62 0c 94 cb Aug 26 13:22:33.871021: | no IKEv1 message padding required Aug 26 13:22:33.871022: | emitting length of ISAKMP Message: 92 Aug 26 13:22:33.871031: | sending 92 bytes for delete notify through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #3) Aug 26 13:22:33.871033: | fc a6 4a c1 e3 3a c1 65 52 50 c7 31 a6 db 77 66 Aug 26 13:22:33.871034: | 08 10 05 01 20 ed 14 10 00 00 00 5c 63 72 f7 01 Aug 26 13:22:33.871036: | ba c5 40 fd 95 0a 27 5a 94 95 d1 69 ba de 46 b7 Aug 26 13:22:33.871037: | 04 97 eb aa 37 75 db 14 64 09 6c a3 eb 8b 07 89 Aug 26 13:22:33.871039: | 99 24 ae 5b 80 74 68 3e 4b ea 57 15 2e 5d 12 bb Aug 26 13:22:33.871040: | f5 60 e7 e6 40 4e 37 b0 99 48 55 a6 Aug 26 13:22:33.871069: | state #3 requesting EVENT_SA_REPLACE to be deleted Aug 26 13:22:33.871073: | libevent_free: release ptr-libevent@0x7f0ef4000f48 Aug 26 13:22:33.871076: | free_event_entry: release EVENT_SA_REPLACE-pe@0x7f0f00002b78 Aug 26 13:22:33.871079: "northnet-eastnet-b" #3: reschedule pending child #7 STATE_QUICK_I1 of connection "north-a-dpd" - the parent is going away Aug 26 13:22:33.871081: | state #7 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:22:33.871083: | libevent_free: release ptr-libevent@0x7f0efc005df8 Aug 26 13:22:33.871085: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x560749ac97d8 Aug 26 13:22:33.871087: | event_schedule: new EVENT_SA_REPLACE-pe@0x560749ac97d8 Aug 26 13:22:33.871090: | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #7 Aug 26 13:22:33.871092: | libevent_malloc: new ptr-libevent@0x7f0ef8003878 size 128 Aug 26 13:22:33.871095: "northnet-eastnet-b" #3: reschedule pending child #6 STATE_QUICK_I1 of connection "northnet-eastnet-b" - the parent is going away Aug 26 13:22:33.871097: | state #6 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:22:33.871099: | #6 STATE_QUICK_I1: retransmits: cleared Aug 26 13:22:33.871100: | libevent_free: release ptr-libevent@0x560749ada478 Aug 26 13:22:33.871103: | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f0ef8002b78 Aug 26 13:22:33.871105: | event_schedule: new EVENT_SA_REPLACE-pe@0x7f0ef8002b78 Aug 26 13:22:33.871107: | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #6 Aug 26 13:22:33.871109: | libevent_malloc: new ptr-libevent@0x560749ada478 size 128 Aug 26 13:22:33.871111: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:22:33.871113: | picked newest_isakmp_sa #0 for #3 Aug 26 13:22:33.871115: "northnet-eastnet-b" #3: deleting IKE SA for connection 'northnet-eastnet-b' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS Aug 26 13:22:33.871118: | add revival: connection 'northnet-eastnet-b' added to the list and scheduled for 0 seconds Aug 26 13:22:33.871120: | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds Aug 26 13:22:33.871123: | in connection_discard for connection northnet-eastnet-b Aug 26 13:22:33.871125: | State DB: deleting IKEv1 state #3 in MAIN_I4 Aug 26 13:22:33.871129: | parent state #3: MAIN_I4(established IKE SA) => UNDEFINED(ignore) Aug 26 13:22:33.871135: | unreference key: 0x560749ae5a88 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 2-- Aug 26 13:22:33.871148: | stop processing: state #3 from 192.1.2.23 (in delete_state() at state.c:1143) Aug 26 13:22:33.871155: | unreference key: 0x560749ae5a88 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- Aug 26 13:22:33.871160: | unreference key: 0x560749ad1e58 user-east@testing.libreswan.org cnt 1-- Aug 26 13:22:33.871163: | unreference key: 0x560749ae6d58 @east.testing.libreswan.org cnt 1-- Aug 26 13:22:33.871166: | unreference key: 0x560749ae2a98 east@testing.libreswan.org cnt 1-- Aug 26 13:22:33.871171: | unreference key: 0x560749ac69b8 192.1.2.23 cnt 1-- Aug 26 13:22:33.871182: | in statetime_start() with no state Aug 26 13:22:33.871184: | complete v1 state transition with STF_IGNORE Aug 26 13:22:33.871187: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) Aug 26 13:22:33.871189: | processing: STOP state #0 (in process_md() at demux.c:382) Aug 26 13:22:33.871191: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:22:33.871195: | spent 0.415 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:22:33.871200: | processing resume sending helper answer for #7 Aug 26 13:22:33.871203: | start processing: state #7 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:22:33.871206: | crypto helper 4 replies to request ID 12 Aug 26 13:22:33.871207: | calling continuation function 0x5607486cbb50 Aug 26 13:22:33.871211: | work-order 12 state #7 crypto result suppressed Aug 26 13:22:33.871219: | resume sending helper answer for #7 suppresed complete_v1_state_transition() Aug 26 13:22:33.871223: | #7 spent 0.0168 milliseconds in resume sending helper answer Aug 26 13:22:33.871226: | stop processing: state #7 connection "north-a-dpd" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:22:33.871227: | libevent_free: release ptr-libevent@0x7f0f000072f8 Aug 26 13:22:33.871229: | processing signal PLUTO_SIGCHLD Aug 26 13:22:33.871233: | waitpid returned ECHILD (no child processes left) Aug 26 13:22:33.871236: | spent 0.00378 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 13:22:33.871242: | spent 0.00118 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:22:33.871248: | *received 92 bytes from 192.1.2.23:500 on eth1 (192.1.3.33:500) Aug 26 13:22:33.871250: | b2 8a 78 70 6d 40 cb f8 82 e3 e7 2c 18 0e 64 06 Aug 26 13:22:33.871251: | 08 10 05 01 de 91 33 26 00 00 00 5c 2b 99 c2 20 Aug 26 13:22:33.871253: | 75 10 16 c7 81 91 29 ba 58 27 2d b7 65 5c 87 ec Aug 26 13:22:33.871254: | 9a d5 ee 37 6d 65 48 d7 18 a2 3e 8a 0e 5d e7 3d Aug 26 13:22:33.871256: | e6 f7 83 4e a1 0d 6c de 72 bf dc bc 5f db 42 71 Aug 26 13:22:33.871257: | 2f 14 dd f8 26 3f 27 e7 17 72 0a aa Aug 26 13:22:33.871260: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:22:33.871262: | **parse ISAKMP Message: Aug 26 13:22:33.871264: | initiator cookie: Aug 26 13:22:33.871265: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:22:33.871267: | responder cookie: Aug 26 13:22:33.871268: | 82 e3 e7 2c 18 0e 64 06 Aug 26 13:22:33.871270: | next payload type: ISAKMP_NEXT_HASH (0x8) Aug 26 13:22:33.871272: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:33.871273: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:22:33.871275: | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) Aug 26 13:22:33.871277: | Message ID: 3734057766 (0xde913326) Aug 26 13:22:33.871278: | length: 92 (0x5c) Aug 26 13:22:33.871280: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) Aug 26 13:22:33.871282: | State DB: IKEv1 state not found (find_v1_info_state) Aug 26 13:22:33.871284: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:22:33.871286: | Informational Exchange is for an unknown (expired?) SA with MSGID:0xde913326 Aug 26 13:22:33.871291: | - unknown SA's md->hdr.isa_ike_initiator_spi.bytes: Aug 26 13:22:33.871297: | b2 8a 78 70 6d 40 cb f8 Aug 26 13:22:33.871300: | - unknown SA's md->hdr.isa_ike_responder_spi.bytes: Aug 26 13:22:33.871301: | 82 e3 e7 2c 18 0e 64 06 Aug 26 13:22:33.871304: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) Aug 26 13:22:33.871306: | processing: STOP state #0 (in process_md() at demux.c:382) Aug 26 13:22:33.871308: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:22:33.871311: | spent 0.0636 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:22:33.871313: | timer_event_cb: processing event@0x560749ac97d8 Aug 26 13:22:33.871315: | handling event EVENT_SA_REPLACE for child state #7 Aug 26 13:22:33.871318: | start processing: state #7 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:22:33.871320: | picked newest_ipsec_sa #0 for #7 Aug 26 13:22:33.871322: | replacing stale IPsec SA Aug 26 13:22:33.871325: | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351) Aug 26 13:22:33.871327: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:22:33.871331: | creating state object #8 at 0x560749ac7f88 Aug 26 13:22:33.871333: | State DB: adding IKEv1 state #8 in UNDEFINED Aug 26 13:22:33.871335: | pstats #8 ikev1.isakmp started Aug 26 13:22:33.871339: | suspend processing: state #7 connection "north-a-dpd" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118) Aug 26 13:22:33.871342: | start processing: state #8 connection "north-a-dpd" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118) Aug 26 13:22:33.871346: | parent state #8: UNDEFINED(ignore) => MAIN_I1(half-open IKE SA) Aug 26 13:22:33.871348: | dup_any(fd@-1) -> fd@-1 (in main_outI1() at ikev1_main.c:123) Aug 26 13:22:33.871350: | Queuing pending IPsec SA negotiating with 192.1.2.23 "north-a-dpd" IKE SA #8 "north-a-dpd" Aug 26 13:22:33.871353: "north-a-dpd" #8: initiating Main Mode Aug 26 13:22:33.871372: | **emit ISAKMP Message: Aug 26 13:22:33.871374: | initiator cookie: Aug 26 13:22:33.871375: | 09 24 b0 86 da 6e 45 10 Aug 26 13:22:33.871377: | responder cookie: Aug 26 13:22:33.871378: | 00 00 00 00 00 00 00 00 Aug 26 13:22:33.871380: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:22:33.871382: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:22:33.871383: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:22:33.871385: | flags: none (0x0) Aug 26 13:22:33.871387: | Message ID: 0 (0x0) Aug 26 13:22:33.871388: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:22:33.871390: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:22:33.871393: | no specific IKE algorithms specified - using defaults Aug 26 13:22:33.871410: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP2048=14 eklen=0 Aug 26 13:22:33.871414: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP2048=14 eklen=0 Aug 26 13:22:33.871417: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP2048=14 eklen=0 Aug 26 13:22:33.871420: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP1536=5 eklen=0 Aug 26 13:22:33.871424: | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP1536=5 eklen=0 Aug 26 13:22:33.871429: | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP1536=5 eklen=0 Aug 26 13:22:33.871434: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP2048=14 eklen=0 Aug 26 13:22:33.871437: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP2048=14 eklen=0 Aug 26 13:22:33.871441: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP2048=14 eklen=0 Aug 26 13:22:33.871444: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP1536=5 eklen=0 Aug 26 13:22:33.871448: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP1536=5 eklen=0 Aug 26 13:22:33.871451: | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP1536=5 eklen=0 Aug 26 13:22:33.871454: | oakley_alg_makedb() returning 0x560749ad33d8 Aug 26 13:22:33.871458: | ***emit ISAKMP Security Association Payload: Aug 26 13:22:33.871460: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:22:33.871462: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:22:33.871464: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:22:33.871466: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:22:33.871468: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:22:33.871470: | ****emit IPsec DOI SIT: Aug 26 13:22:33.871472: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:22:33.871474: | ikev1_out_sa pcn: 0 has 1 valid proposals Aug 26 13:22:33.871476: | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 18 Aug 26 13:22:33.871477: | ****emit ISAKMP Proposal Payload: Aug 26 13:22:33.871479: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.871481: | proposal number: 0 (0x0) Aug 26 13:22:33.871482: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:22:33.871484: | SPI size: 0 (0x0) Aug 26 13:22:33.871486: | number of transforms: 18 (0x12) Aug 26 13:22:33.871487: | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' Aug 26 13:22:33.871489: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.871492: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871494: | ISAKMP transform number: 0 (0x0) Aug 26 13:22:33.871496: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.871497: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.871499: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871502: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.871503: | length/value: 1 (0x1) Aug 26 13:22:33.871505: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.871507: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871509: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.871510: | length/value: 3600 (0xe10) Aug 26 13:22:33.871512: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871514: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.871515: | length/value: 7 (0x7) Aug 26 13:22:33.871517: | [7 is OAKLEY_AES_CBC] Aug 26 13:22:33.871518: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871520: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.871522: | length/value: 4 (0x4) Aug 26 13:22:33.871523: | [4 is OAKLEY_SHA2_256] Aug 26 13:22:33.871525: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871526: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.871528: | length/value: 3 (0x3) Aug 26 13:22:33.871529: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.871531: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871533: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.871534: | length/value: 14 (0xe) Aug 26 13:22:33.871536: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:33.871537: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871539: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:22:33.871541: | length/value: 256 (0x100) Aug 26 13:22:33.871542: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:22:33.871544: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.871546: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871547: | ISAKMP transform number: 1 (0x1) Aug 26 13:22:33.871549: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.871551: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871553: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.871554: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871556: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.871558: | length/value: 1 (0x1) Aug 26 13:22:33.871559: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.871561: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871562: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.871564: | length/value: 3600 (0xe10) Aug 26 13:22:33.871565: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871567: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.871569: | length/value: 7 (0x7) Aug 26 13:22:33.871570: | [7 is OAKLEY_AES_CBC] Aug 26 13:22:33.871572: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871573: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.871575: | length/value: 4 (0x4) Aug 26 13:22:33.871576: | [4 is OAKLEY_SHA2_256] Aug 26 13:22:33.871578: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871580: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.871581: | length/value: 3 (0x3) Aug 26 13:22:33.871583: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.871584: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871586: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.871587: | length/value: 14 (0xe) Aug 26 13:22:33.871589: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:33.871590: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871593: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:22:33.871595: | length/value: 128 (0x80) Aug 26 13:22:33.871596: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:22:33.871598: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.871600: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871601: | ISAKMP transform number: 2 (0x2) Aug 26 13:22:33.871603: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.871605: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871606: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.871608: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871610: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.871611: | length/value: 1 (0x1) Aug 26 13:22:33.871613: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.871614: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871616: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.871617: | length/value: 3600 (0xe10) Aug 26 13:22:33.871619: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871621: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.871622: | length/value: 7 (0x7) Aug 26 13:22:33.871624: | [7 is OAKLEY_AES_CBC] Aug 26 13:22:33.871625: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871627: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.871628: | length/value: 6 (0x6) Aug 26 13:22:33.871630: | [6 is OAKLEY_SHA2_512] Aug 26 13:22:33.871631: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871633: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.871634: | length/value: 3 (0x3) Aug 26 13:22:33.871636: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.871637: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871639: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.871641: | length/value: 14 (0xe) Aug 26 13:22:33.871642: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:33.871644: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871645: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:22:33.871647: | length/value: 256 (0x100) Aug 26 13:22:33.871648: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:22:33.871650: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.871652: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871653: | ISAKMP transform number: 3 (0x3) Aug 26 13:22:33.871655: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.871657: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871658: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.871660: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871662: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.871663: | length/value: 1 (0x1) Aug 26 13:22:33.871665: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.871666: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871668: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.871669: | length/value: 3600 (0xe10) Aug 26 13:22:33.871671: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871673: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.871674: | length/value: 7 (0x7) Aug 26 13:22:33.871676: | [7 is OAKLEY_AES_CBC] Aug 26 13:22:33.871677: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871679: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.871680: | length/value: 6 (0x6) Aug 26 13:22:33.871682: | [6 is OAKLEY_SHA2_512] Aug 26 13:22:33.871683: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871685: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.871687: | length/value: 3 (0x3) Aug 26 13:22:33.871689: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.871690: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871692: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.871693: | length/value: 14 (0xe) Aug 26 13:22:33.871695: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:33.871697: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871698: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:22:33.871700: | length/value: 128 (0x80) Aug 26 13:22:33.871701: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:22:33.871703: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.871704: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871706: | ISAKMP transform number: 4 (0x4) Aug 26 13:22:33.871708: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.871709: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871711: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.871713: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871714: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.871716: | length/value: 1 (0x1) Aug 26 13:22:33.871717: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.871719: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871721: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.871722: | length/value: 3600 (0xe10) Aug 26 13:22:33.871724: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871725: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.871727: | length/value: 7 (0x7) Aug 26 13:22:33.871728: | [7 is OAKLEY_AES_CBC] Aug 26 13:22:33.871730: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871732: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.871733: | length/value: 2 (0x2) Aug 26 13:22:33.871735: | [2 is OAKLEY_SHA1] Aug 26 13:22:33.871736: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871738: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.871739: | length/value: 3 (0x3) Aug 26 13:22:33.871741: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.871742: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871744: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.871745: | length/value: 14 (0xe) Aug 26 13:22:33.871747: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:33.871748: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871750: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:22:33.871752: | length/value: 256 (0x100) Aug 26 13:22:33.871753: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:22:33.871755: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.871756: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871758: | ISAKMP transform number: 5 (0x5) Aug 26 13:22:33.871759: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.871761: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871763: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.871765: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871766: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.871768: | length/value: 1 (0x1) Aug 26 13:22:33.871769: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.871771: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871773: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.871774: | length/value: 3600 (0xe10) Aug 26 13:22:33.871776: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871777: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.871779: | length/value: 7 (0x7) Aug 26 13:22:33.871781: | [7 is OAKLEY_AES_CBC] Aug 26 13:22:33.871783: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871784: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.871786: | length/value: 2 (0x2) Aug 26 13:22:33.871787: | [2 is OAKLEY_SHA1] Aug 26 13:22:33.871789: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871790: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.871792: | length/value: 3 (0x3) Aug 26 13:22:33.871793: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.871795: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871797: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.871798: | length/value: 14 (0xe) Aug 26 13:22:33.871800: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:33.871801: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871803: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:22:33.871804: | length/value: 128 (0x80) Aug 26 13:22:33.871806: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:22:33.871807: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.871809: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871811: | ISAKMP transform number: 6 (0x6) Aug 26 13:22:33.871812: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.871814: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871816: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.871817: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871819: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.871821: | length/value: 1 (0x1) Aug 26 13:22:33.871822: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.871824: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871825: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.871827: | length/value: 3600 (0xe10) Aug 26 13:22:33.871828: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871830: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.871832: | length/value: 7 (0x7) Aug 26 13:22:33.871833: | [7 is OAKLEY_AES_CBC] Aug 26 13:22:33.871835: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871836: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.871838: | length/value: 4 (0x4) Aug 26 13:22:33.871839: | [4 is OAKLEY_SHA2_256] Aug 26 13:22:33.871841: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871842: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.871844: | length/value: 3 (0x3) Aug 26 13:22:33.871845: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.871847: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871848: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.871850: | length/value: 5 (0x5) Aug 26 13:22:33.871851: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:22:33.871853: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871855: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:22:33.871856: | length/value: 256 (0x100) Aug 26 13:22:33.871858: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:22:33.871859: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.871861: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871862: | ISAKMP transform number: 7 (0x7) Aug 26 13:22:33.871864: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.871866: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871868: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.871869: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871871: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.871872: | length/value: 1 (0x1) Aug 26 13:22:33.871874: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.871876: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871878: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.871880: | length/value: 3600 (0xe10) Aug 26 13:22:33.871881: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871883: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.871884: | length/value: 7 (0x7) Aug 26 13:22:33.871886: | [7 is OAKLEY_AES_CBC] Aug 26 13:22:33.871887: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871889: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.871890: | length/value: 4 (0x4) Aug 26 13:22:33.871892: | [4 is OAKLEY_SHA2_256] Aug 26 13:22:33.871894: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871895: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.871897: | length/value: 3 (0x3) Aug 26 13:22:33.871898: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.871900: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871901: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.871903: | length/value: 5 (0x5) Aug 26 13:22:33.871904: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:22:33.871906: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871907: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:22:33.871909: | length/value: 128 (0x80) Aug 26 13:22:33.871911: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:22:33.871912: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.871914: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871915: | ISAKMP transform number: 8 (0x8) Aug 26 13:22:33.871917: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.871919: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871920: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.871922: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871924: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.871925: | length/value: 1 (0x1) Aug 26 13:22:33.871927: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.871928: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871930: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.871931: | length/value: 3600 (0xe10) Aug 26 13:22:33.871933: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871935: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.871936: | length/value: 7 (0x7) Aug 26 13:22:33.871938: | [7 is OAKLEY_AES_CBC] Aug 26 13:22:33.871939: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871941: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.871942: | length/value: 6 (0x6) Aug 26 13:22:33.871944: | [6 is OAKLEY_SHA2_512] Aug 26 13:22:33.871945: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871947: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.871948: | length/value: 3 (0x3) Aug 26 13:22:33.871950: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.871951: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871953: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.871955: | length/value: 5 (0x5) Aug 26 13:22:33.871956: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:22:33.871958: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871959: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:22:33.871961: | length/value: 256 (0x100) Aug 26 13:22:33.871962: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:22:33.871964: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.871966: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871967: | ISAKMP transform number: 9 (0x9) Aug 26 13:22:33.871969: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.871971: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.871973: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.871975: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871977: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.871978: | length/value: 1 (0x1) Aug 26 13:22:33.871980: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.871981: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871983: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.871984: | length/value: 3600 (0xe10) Aug 26 13:22:33.871986: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871988: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.871989: | length/value: 7 (0x7) Aug 26 13:22:33.871991: | [7 is OAKLEY_AES_CBC] Aug 26 13:22:33.871992: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.871994: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.871995: | length/value: 6 (0x6) Aug 26 13:22:33.871997: | [6 is OAKLEY_SHA2_512] Aug 26 13:22:33.871998: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872000: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.872001: | length/value: 3 (0x3) Aug 26 13:22:33.872003: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.872005: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872006: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.872008: | length/value: 5 (0x5) Aug 26 13:22:33.872009: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:22:33.872011: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872012: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:22:33.872014: | length/value: 128 (0x80) Aug 26 13:22:33.872015: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:22:33.872017: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.872019: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.872020: | ISAKMP transform number: 10 (0xa) Aug 26 13:22:33.872022: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.872024: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.872025: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.872027: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872029: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.872030: | length/value: 1 (0x1) Aug 26 13:22:33.872032: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.872033: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872035: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.872036: | length/value: 3600 (0xe10) Aug 26 13:22:33.872038: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872040: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.872041: | length/value: 7 (0x7) Aug 26 13:22:33.872043: | [7 is OAKLEY_AES_CBC] Aug 26 13:22:33.872044: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872046: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.872047: | length/value: 2 (0x2) Aug 26 13:22:33.872049: | [2 is OAKLEY_SHA1] Aug 26 13:22:33.872050: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872052: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.872053: | length/value: 3 (0x3) Aug 26 13:22:33.872055: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.872056: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872058: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.872060: | length/value: 5 (0x5) Aug 26 13:22:33.872061: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:22:33.872063: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872064: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:22:33.872066: | length/value: 256 (0x100) Aug 26 13:22:33.872067: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:22:33.872070: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.872071: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.872073: | ISAKMP transform number: 11 (0xb) Aug 26 13:22:33.872075: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.872076: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.872078: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.872080: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872081: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.872083: | length/value: 1 (0x1) Aug 26 13:22:33.872084: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.872086: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872088: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.872089: | length/value: 3600 (0xe10) Aug 26 13:22:33.872091: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872092: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.872094: | length/value: 7 (0x7) Aug 26 13:22:33.872095: | [7 is OAKLEY_AES_CBC] Aug 26 13:22:33.872097: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872099: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.872100: | length/value: 2 (0x2) Aug 26 13:22:33.872102: | [2 is OAKLEY_SHA1] Aug 26 13:22:33.872103: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872105: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.872106: | length/value: 3 (0x3) Aug 26 13:22:33.872108: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.872109: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872111: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.872112: | length/value: 5 (0x5) Aug 26 13:22:33.872114: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:22:33.872115: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872117: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:22:33.872119: | length/value: 128 (0x80) Aug 26 13:22:33.872120: | emitting length of ISAKMP Transform Payload (ISAKMP): 36 Aug 26 13:22:33.872122: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.872123: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.872125: | ISAKMP transform number: 12 (0xc) Aug 26 13:22:33.872126: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.872128: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.872130: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.872132: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872133: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.872135: | length/value: 1 (0x1) Aug 26 13:22:33.872136: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.872138: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872140: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.872141: | length/value: 3600 (0xe10) Aug 26 13:22:33.872143: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872144: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.872146: | length/value: 5 (0x5) Aug 26 13:22:33.872147: | [5 is OAKLEY_3DES_CBC] Aug 26 13:22:33.872149: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872150: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.872152: | length/value: 4 (0x4) Aug 26 13:22:33.872153: | [4 is OAKLEY_SHA2_256] Aug 26 13:22:33.872155: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872157: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.872158: | length/value: 3 (0x3) Aug 26 13:22:33.872160: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.872161: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872163: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.872165: | length/value: 14 (0xe) Aug 26 13:22:33.872167: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:33.872168: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:22:33.872170: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.872171: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.872173: | ISAKMP transform number: 13 (0xd) Aug 26 13:22:33.872175: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.872176: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.872178: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.872180: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872181: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.872183: | length/value: 1 (0x1) Aug 26 13:22:33.872184: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.872186: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872188: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.872189: | length/value: 3600 (0xe10) Aug 26 13:22:33.872191: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872192: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.872194: | length/value: 5 (0x5) Aug 26 13:22:33.872195: | [5 is OAKLEY_3DES_CBC] Aug 26 13:22:33.872197: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872198: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.872200: | length/value: 6 (0x6) Aug 26 13:22:33.872201: | [6 is OAKLEY_SHA2_512] Aug 26 13:22:33.872203: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872205: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.872206: | length/value: 3 (0x3) Aug 26 13:22:33.872208: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.872209: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872211: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.872212: | length/value: 14 (0xe) Aug 26 13:22:33.872214: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:33.872215: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:22:33.872217: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.872219: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.872220: | ISAKMP transform number: 14 (0xe) Aug 26 13:22:33.872222: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.872223: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.872225: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.872227: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872228: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.872230: | length/value: 1 (0x1) Aug 26 13:22:33.872232: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.872233: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872235: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.872236: | length/value: 3600 (0xe10) Aug 26 13:22:33.872238: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872239: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.872241: | length/value: 5 (0x5) Aug 26 13:22:33.872242: | [5 is OAKLEY_3DES_CBC] Aug 26 13:22:33.872244: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872246: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.872247: | length/value: 2 (0x2) Aug 26 13:22:33.872249: | [2 is OAKLEY_SHA1] Aug 26 13:22:33.872250: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872252: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.872253: | length/value: 3 (0x3) Aug 26 13:22:33.872255: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.872256: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872260: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.872262: | length/value: 14 (0xe) Aug 26 13:22:33.872263: | [14 is OAKLEY_GROUP_MODP2048] Aug 26 13:22:33.872265: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:22:33.872266: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.872268: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.872270: | ISAKMP transform number: 15 (0xf) Aug 26 13:22:33.872271: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.872273: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.872275: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.872276: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872278: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.872279: | length/value: 1 (0x1) Aug 26 13:22:33.872281: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.872283: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872284: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.872286: | length/value: 3600 (0xe10) Aug 26 13:22:33.872287: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872293: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.872295: | length/value: 5 (0x5) Aug 26 13:22:33.872296: | [5 is OAKLEY_3DES_CBC] Aug 26 13:22:33.872298: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872299: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.872301: | length/value: 4 (0x4) Aug 26 13:22:33.872302: | [4 is OAKLEY_SHA2_256] Aug 26 13:22:33.872304: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872306: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.872307: | length/value: 3 (0x3) Aug 26 13:22:33.872309: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.872310: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872312: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.872313: | length/value: 5 (0x5) Aug 26 13:22:33.872315: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:22:33.872316: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:22:33.872318: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.872321: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.872324: | ISAKMP transform number: 16 (0x10) Aug 26 13:22:33.872328: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.872331: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.872334: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.872337: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872339: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.872342: | length/value: 1 (0x1) Aug 26 13:22:33.872344: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.872347: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872350: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.872352: | length/value: 3600 (0xe10) Aug 26 13:22:33.872355: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872356: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.872358: | length/value: 5 (0x5) Aug 26 13:22:33.872359: | [5 is OAKLEY_3DES_CBC] Aug 26 13:22:33.872361: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872362: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.872364: | length/value: 6 (0x6) Aug 26 13:22:33.872365: | [6 is OAKLEY_SHA2_512] Aug 26 13:22:33.872367: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872369: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.872370: | length/value: 3 (0x3) Aug 26 13:22:33.872372: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.872373: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872376: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.872378: | length/value: 5 (0x5) Aug 26 13:22:33.872379: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:22:33.872381: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:22:33.872383: | *****emit ISAKMP Transform Payload (ISAKMP): Aug 26 13:22:33.872384: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.872386: | ISAKMP transform number: 17 (0x11) Aug 26 13:22:33.872387: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:22:33.872389: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) Aug 26 13:22:33.872391: | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' Aug 26 13:22:33.872393: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872394: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) Aug 26 13:22:33.872396: | length/value: 1 (0x1) Aug 26 13:22:33.872397: | [1 is OAKLEY_LIFE_SECONDS] Aug 26 13:22:33.872399: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872401: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) Aug 26 13:22:33.872402: | length/value: 3600 (0xe10) Aug 26 13:22:33.872404: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872405: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:22:33.872407: | length/value: 5 (0x5) Aug 26 13:22:33.872408: | [5 is OAKLEY_3DES_CBC] Aug 26 13:22:33.872410: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872411: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:22:33.872413: | length/value: 2 (0x2) Aug 26 13:22:33.872414: | [2 is OAKLEY_SHA1] Aug 26 13:22:33.872416: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872418: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:22:33.872419: | length/value: 3 (0x3) Aug 26 13:22:33.872421: | [3 is OAKLEY_RSA_SIG] Aug 26 13:22:33.872422: | ******emit ISAKMP Oakley attribute: Aug 26 13:22:33.872424: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:22:33.872425: | length/value: 5 (0x5) Aug 26 13:22:33.872427: | [5 is OAKLEY_GROUP_MODP1536] Aug 26 13:22:33.872428: | emitting length of ISAKMP Transform Payload (ISAKMP): 32 Aug 26 13:22:33.872430: | emitting length of ISAKMP Proposal Payload: 632 Aug 26 13:22:33.872432: | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0 Aug 26 13:22:33.872434: | emitting length of ISAKMP Security Association Payload: 644 Aug 26 13:22:33.872435: | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 Aug 26 13:22:33.872439: | out_vid(): sending [FRAGMENTATION] Aug 26 13:22:33.872441: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:22:33.872442: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:22:33.872444: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:22:33.872447: | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:22:33.872448: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:22:33.872451: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:22:33.872452: | V_ID 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 Aug 26 13:22:33.872454: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:22:33.872456: | out_vid(): sending [Dead Peer Detection] Aug 26 13:22:33.872457: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:22:33.872459: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.872461: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:22:33.872463: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:22:33.872466: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:22:33.872468: | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 Aug 26 13:22:33.872471: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:22:33.872473: | nat add vid Aug 26 13:22:33.872476: | sending draft and RFC NATT VIDs Aug 26 13:22:33.872478: | out_vid(): sending [RFC 3947] Aug 26 13:22:33.872479: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:22:33.872481: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:22:33.872483: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:22:33.872485: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:22:33.872486: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:22:33.872488: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:22:33.872490: | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f Aug 26 13:22:33.872491: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:22:33.872493: | skipping VID_NATT_RFC Aug 26 13:22:33.872495: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-03] Aug 26 13:22:33.872496: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:22:33.872498: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:22:33.872499: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:22:33.872501: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:22:33.872503: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:22:33.872505: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:22:33.872507: | V_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Aug 26 13:22:33.872508: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:22:33.872510: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02_n] Aug 26 13:22:33.872511: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:22:33.872513: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:22:33.872515: | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:22:33.872517: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:22:33.872518: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:22:33.872520: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:22:33.872522: | V_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f Aug 26 13:22:33.872523: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:22:33.872525: | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02] Aug 26 13:22:33.872526: | ***emit ISAKMP Vendor ID Payload: Aug 26 13:22:33.872528: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:22:33.872531: | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) Aug 26 13:22:33.872534: | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' Aug 26 13:22:33.872537: | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload Aug 26 13:22:33.872540: | V_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 Aug 26 13:22:33.872542: | emitting length of ISAKMP Vendor ID Payload: 20 Aug 26 13:22:33.872544: | no IKEv1 message padding required Aug 26 13:22:33.872546: | emitting length of ISAKMP Message: 792 Aug 26 13:22:33.872551: | sending 792 bytes for reply packet for main_outI1 through eth1 from 192.1.3.33:500 to 192.1.2.23:500 (using #8) Aug 26 13:22:33.872554: | 09 24 b0 86 da 6e 45 10 00 00 00 00 00 00 00 00 Aug 26 13:22:33.872555: | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 Aug 26 13:22:33.872557: | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 Aug 26 13:22:33.872558: | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:33.872560: | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:22:33.872561: | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 Aug 26 13:22:33.872563: | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 Aug 26 13:22:33.872564: | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 Aug 26 13:22:33.872566: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 Aug 26 13:22:33.872567: | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 Aug 26 13:22:33.872569: | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:22:33.872570: | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 Aug 26 13:22:33.872572: | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:33.872573: | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:22:33.872575: | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 Aug 26 13:22:33.872576: | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 Aug 26 13:22:33.872578: | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 Aug 26 13:22:33.872579: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 Aug 26 13:22:33.872581: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:22:33.872582: | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:22:33.872584: | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:22:33.872585: | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:33.872587: | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:22:33.872588: | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 Aug 26 13:22:33.872590: | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 Aug 26 13:22:33.872591: | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 Aug 26 13:22:33.872593: | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 Aug 26 13:22:33.872594: | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 Aug 26 13:22:33.872596: | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 Aug 26 13:22:33.872597: | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 Aug 26 13:22:33.872599: | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:33.872600: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e Aug 26 13:22:33.872602: | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:33.872603: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e Aug 26 13:22:33.872605: | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:33.872606: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e Aug 26 13:22:33.872608: | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:33.872609: | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 Aug 26 13:22:33.872611: | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:33.872612: | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 Aug 26 13:22:33.872614: | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 Aug 26 13:22:33.872615: | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 Aug 26 13:22:33.872617: | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f Aug 26 13:22:33.872618: | 00 d6 c2 d3 0d 00 00 14 af ca d7 13 68 a1 f1 c9 Aug 26 13:22:33.872620: | 6b 86 96 fc 77 57 01 00 0d 00 00 14 4a 13 1c 81 Aug 26 13:22:33.872621: | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 Aug 26 13:22:33.872623: | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 Aug 26 13:22:33.872624: | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 Aug 26 13:22:33.872626: | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 Aug 26 13:22:33.872627: | 7c fd b2 fc 68 b6 a4 48 Aug 26 13:22:33.872642: | event_schedule: new EVENT_RETRANSMIT-pe@0x560749ad3858 Aug 26 13:22:33.872646: | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #8 Aug 26 13:22:33.872649: | libevent_malloc: new ptr-libevent@0x7f0f00003878 size 128 Aug 26 13:22:33.872653: | #8 STATE_MAIN_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11039.615109 Aug 26 13:22:33.872657: | #8 spent 1.32 milliseconds in main_outI1() Aug 26 13:22:33.872660: | stop processing: state #8 connection "north-a-dpd" from 192.1.2.23 (in main_outI1() at ikev1_main.c:228) Aug 26 13:22:33.872662: | event_schedule: new EVENT_SA_EXPIRE-pe@0x7f0f00002b78 Aug 26 13:22:33.872665: | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #7 Aug 26 13:22:33.872666: | libevent_malloc: new ptr-libevent@0x560749ac91b8 size 128 Aug 26 13:22:33.872669: | libevent_free: release ptr-libevent@0x7f0ef8003878 Aug 26 13:22:33.872670: | free_event_entry: release EVENT_SA_REPLACE-pe@0x560749ac97d8 Aug 26 13:22:33.872673: | #7 spent 1.35 milliseconds in timer_event_cb() EVENT_SA_REPLACE Aug 26 13:22:33.872675: | processing: STOP state #0 (in timer_event_cb() at timer.c:557) Aug 26 13:22:33.872677: | timer_event_cb: processing event@0x7f0ef8002b78 Aug 26 13:22:33.872679: | handling event EVENT_SA_REPLACE for child state #6 Aug 26 13:22:33.872682: | start processing: state #6 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:22:33.872684: | picked newest_ipsec_sa #0 for #6 Aug 26 13:22:33.872686: | replacing stale IPsec SA Aug 26 13:22:33.872689: | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351) Aug 26 13:22:33.872690: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:22:33.872693: | Queuing pending IPsec SA negotiating with 192.1.2.23 "northnet-eastnet-b" IKE SA #8 "north-a-dpd" Aug 26 13:22:33.872696: | event_schedule: new EVENT_SA_EXPIRE-pe@0x560749ac97d8 Aug 26 13:22:33.872698: | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #6 Aug 26 13:22:33.872700: | libevent_malloc: new ptr-libevent@0x7f0ef8003878 size 128 Aug 26 13:22:33.872701: | libevent_free: release ptr-libevent@0x560749ada478 Aug 26 13:22:33.872703: | free_event_entry: release EVENT_SA_REPLACE-pe@0x7f0ef8002b78 Aug 26 13:22:33.872706: | #6 spent 0.028 milliseconds in timer_event_cb() EVENT_SA_REPLACE Aug 26 13:22:33.872709: | stop processing: state #6 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:557) Aug 26 13:22:33.872710: | processing global timer EVENT_REVIVE_CONNS Aug 26 13:22:33.872713: Initiating connection northnet-eastnet-b which received a Delete/Notify but must remain up per local policy Aug 26 13:22:33.872715: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:22:33.872718: | start processing: connection "northnet-eastnet-b" (in initiate_a_connection() at initiate.c:186) Aug 26 13:22:33.872720: | empty esp_info, returning defaults for ENCRYPT Aug 26 13:22:33.872722: | connection 'northnet-eastnet-b' +POLICY_UP Aug 26 13:22:33.872724: | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) Aug 26 13:22:33.872726: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:22:33.872728: | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "northnet-eastnet-b" Aug 26 13:22:33.872730: | stop processing: connection "northnet-eastnet-b" (in initiate_a_connection() at initiate.c:349) Aug 26 13:22:33.872733: | spent 0.0201 milliseconds in global timer EVENT_REVIVE_CONNS Aug 26 13:22:33.872737: | timer_event_cb: processing event@0x7f0f00002b78 Aug 26 13:22:33.872739: | handling event EVENT_SA_EXPIRE for child state #7 Aug 26 13:22:33.872741: | start processing: state #7 connection "north-a-dpd" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:22:33.872743: | picked newest_ipsec_sa #0 for #7 Aug 26 13:22:33.872745: | un-established partial CHILD SA timeout (SA expired) Aug 26 13:22:33.872747: | pstats #7 ikev1.ipsec failed exchange-timeout Aug 26 13:22:33.872748: | pstats #7 ikev1.ipsec deleted exchange-timeout Aug 26 13:22:33.872751: | [RE]START processing: state #7 connection "north-a-dpd" from 192.1.2.23 (in delete_state() at state.c:879) Aug 26 13:22:33.872754: "north-a-dpd" #7: deleting state (STATE_QUICK_I1) aged 0.010s and NOT sending notification Aug 26 13:22:33.872756: | child state #7: QUICK_I1(established CHILD SA) => delete Aug 26 13:22:33.872759: | child state #7: QUICK_I1(established CHILD SA) => CHILDSA_DEL(informational) Aug 26 13:22:33.872761: | priority calculation of connection "north-a-dpd" is 0xfe7e7 Aug 26 13:22:33.872765: | delete inbound eroute 192.0.22.0/24:0 --0-> 192.0.3.0/24:0 => unk255.10000@192.1.3.33 (raw_eroute) Aug 26 13:22:33.872774: | raw_eroute result=success Aug 26 13:22:33.872777: | in connection_discard for connection north-a-dpd Aug 26 13:22:33.872779: | State DB: deleting IKEv1 state #7 in CHILDSA_DEL Aug 26 13:22:33.872781: | child state #7: CHILDSA_DEL(informational) => UNDEFINED(ignore) Aug 26 13:22:33.872784: | stop processing: state #7 from 192.1.2.23 (in delete_state() at state.c:1143) Aug 26 13:22:33.872786: | libevent_free: release ptr-libevent@0x560749ac91b8 Aug 26 13:22:33.872788: | free_event_entry: release EVENT_SA_EXPIRE-pe@0x7f0f00002b78 Aug 26 13:22:33.872790: | in statetime_stop() and could not find #7 Aug 26 13:22:33.872792: | processing: STOP state #0 (in timer_event_cb() at timer.c:557) Aug 26 13:22:33.872794: | timer_event_cb: processing event@0x560749ac97d8 Aug 26 13:22:33.872796: | handling event EVENT_SA_EXPIRE for child state #6 Aug 26 13:22:33.872798: | start processing: state #6 connection "northnet-eastnet-b" from 192.1.2.23 (in timer_event_cb() at timer.c:250) Aug 26 13:22:33.872801: | picked newest_ipsec_sa #0 for #6 Aug 26 13:22:33.872802: | un-established partial CHILD SA timeout (SA expired) Aug 26 13:22:33.872804: | pstats #6 ikev1.ipsec failed exchange-timeout Aug 26 13:22:33.872805: | pstats #6 ikev1.ipsec deleted exchange-timeout Aug 26 13:22:33.872808: | [RE]START processing: state #6 connection "northnet-eastnet-b" from 192.1.2.23 (in delete_state() at state.c:879) Aug 26 13:22:33.872810: "northnet-eastnet-b" #6: deleting state (STATE_QUICK_I1) aged 0.021s and NOT sending notification Aug 26 13:22:33.872812: | child state #6: QUICK_I1(established CHILD SA) => delete Aug 26 13:22:33.872813: | child state #6: QUICK_I1(established CHILD SA) => CHILDSA_DEL(informational) Aug 26 13:22:33.872816: | priority calculation of connection "northnet-eastnet-b" is 0xfe7e7 Aug 26 13:22:33.872819: | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.3.0/24:0 => unk255.10000@192.1.3.33 (raw_eroute) Aug 26 13:22:33.872825: | raw_eroute result=success Aug 26 13:22:33.872827: | in connection_discard for connection northnet-eastnet-b Aug 26 13:22:33.872829: | State DB: deleting IKEv1 state #6 in CHILDSA_DEL Aug 26 13:22:33.872831: | child state #6: CHILDSA_DEL(informational) => UNDEFINED(ignore) Aug 26 13:22:33.872845: | stop processing: state #6 from 192.1.2.23 (in delete_state() at state.c:1143) Aug 26 13:22:33.872858: | libevent_free: release ptr-libevent@0x7f0ef8003878 Aug 26 13:22:33.872860: | free_event_entry: release EVENT_SA_EXPIRE-pe@0x560749ac97d8 Aug 26 13:22:33.872862: | in statetime_stop() and could not find #6 Aug 26 13:22:33.872864: | processing: STOP state #0 (in timer_event_cb() at timer.c:557) Aug 26 13:22:34.368710: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:22:34.368732: shutting down Aug 26 13:22:34.368738: | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825) Aug 26 13:22:34.368741: destroying root certificate cache Aug 26 13:22:34.368764: | certs and keys locked by 'free_preshared_secrets' Aug 26 13:22:34.368765: forgetting secrets Aug 26 13:22:34.368771: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 13:22:34.368778: | unreference key: 0x560749ac6758 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org cnt 1-- Aug 26 13:22:34.368782: | unreference key: 0x560749ac6308 user-east@testing.libreswan.org cnt 1-- Aug 26 13:22:34.368784: | unreference key: 0x560749ac4818 @east.testing.libreswan.org cnt 1-- Aug 26 13:22:34.368789: | unreference key: 0x560749ac5558 east@testing.libreswan.org cnt 1-- Aug 26 13:22:34.368793: | unreference key: 0x560749ac57c8 192.1.2.23 cnt 1-- Aug 26 13:22:34.368797: | unreference key: 0x560749ac09a8 C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org cnt 1-- Aug 26 13:22:34.368801: | unreference key: 0x560749abfdc8 user-north@testing.libreswan.org cnt 1-- Aug 26 13:22:34.368803: | unreference key: 0x560749abc9c8 @north.testing.libreswan.org cnt 1-- Aug 26 13:22:34.368807: | start processing: connection "northnet-eastnet-b" (in delete_connection() at connections.c:189) Aug 26 13:22:34.368809: | removing pending policy for no connection {0x560749ae1308} Aug 26 13:22:34.368811: | Deleting states for connection - including all other IPsec SA's of this IKE SA Aug 26 13:22:34.368813: | pass 0 Aug 26 13:22:34.368814: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 13:22:34.368816: | state #8 Aug 26 13:22:34.368818: | pass 1 Aug 26 13:22:34.368819: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 13:22:34.368821: | state #8 Aug 26 13:22:34.368824: | shunt_eroute() called for connection 'northnet-eastnet-b' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0 Aug 26 13:22:34.368826: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 Aug 26 13:22:34.368828: | priority calculation of connection "northnet-eastnet-b" is 0xfe7e7 Aug 26 13:22:34.369098: | priority calculation of connection "northnet-eastnet-b" is 0xfe7e7 Aug 26 13:22:34.369107: | FOR_EACH_CONNECTION_... in route_owner Aug 26 13:22:34.369109: | conn northnet-eastnet-b mark 0/00000000, 0/00000000 vs Aug 26 13:22:34.369111: | conn northnet-eastnet-b mark 0/00000000, 0/00000000 Aug 26 13:22:34.369113: | conn northnet-eastnet-b mark 0/00000000, 0/00000000 vs Aug 26 13:22:34.369114: | conn north-a-dpd mark 0/00000000, 0/00000000 Aug 26 13:22:34.369117: | route owner of "northnet-eastnet-b" unrouted: NULL Aug 26 13:22:34.369119: | running updown command "ipsec _updown" for verb unroute Aug 26 13:22:34.369121: | command executing unroute-client Aug 26 13:22:34.369158: | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastnet-b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO Aug 26 13:22:34.369161: | popen cmd is 1277 chars long Aug 26 13:22:34.369163: | cmd( 0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='northnet-eastn: Aug 26 13:22:34.369165: | cmd( 80):et-b' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' : Aug 26 13:22:34.369167: | cmd( 160):PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=no: Aug 26 13:22:34.369168: | cmd( 240):rth.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT=': Aug 26 13:22:34.369170: | cmd( 320):192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.: Aug 26 13:22:34.369172: | cmd( 400):0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE=: Aug 26 13:22:34.369173: | cmd( 480):'none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Lib: Aug 26 13:22:34.369176: | cmd( 560):reswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.l: Aug 26 13:22:34.369178: | cmd( 640):ibreswan.org' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0': Aug 26 13:22:34.369180: | cmd( 720): PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL=: Aug 26 13:22:34.369182: | cmd( 800):'0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='R: Aug 26 13:22:34.369183: | cmd( 880):SASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO: Aug 26 13:22:34.369185: | cmd( 960):_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_P: Aug 26 13:22:34.369187: | cmd(1040):EER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER: Aug 26 13:22:34.369188: | cmd(1120):='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE=: Aug 26 13:22:34.369190: | cmd(1200):'' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1: Aug 26 13:22:34.376956: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.376974: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.376976: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.376979: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.376981: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.376982: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.376984: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.376991: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377034: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377038: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377039: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377041: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377043: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377045: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377087: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377091: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377092: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377094: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377096: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377098: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377107: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377118: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377127: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377242: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377252: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377262: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.377273: "northnet-eastnet-b": unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.381564: | flush revival: connection 'northnet-eastnet-b' wasn't on the list Aug 26 13:22:34.381578: | stop processing: connection "northnet-eastnet-b" (in discard_connection() at connections.c:249) Aug 26 13:22:34.381590: | start processing: connection "north-a-dpd" (in delete_connection() at connections.c:189) Aug 26 13:22:34.381593: | removing pending policy for no connection {0x560749ad2128} Aug 26 13:22:34.381595: | Deleting states for connection - including all other IPsec SA's of this IKE SA Aug 26 13:22:34.381597: | pass 0 Aug 26 13:22:34.381599: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 13:22:34.381601: | state #8 Aug 26 13:22:34.381603: | suspend processing: connection "north-a-dpd" (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:22:34.381607: | start processing: state #8 connection "north-a-dpd" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:22:34.381610: | pstats #8 ikev1.isakmp deleted other Aug 26 13:22:34.381614: | [RE]START processing: state #8 connection "north-a-dpd" from 192.1.2.23 (in delete_state() at state.c:879) Aug 26 13:22:34.381617: "north-a-dpd" #8: deleting state (STATE_MAIN_I1) aged 0.510s and NOT sending notification Aug 26 13:22:34.381620: | parent state #8: MAIN_I1(half-open IKE SA) => delete Aug 26 13:22:34.381677: | state #8 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:22:34.381681: | #8 STATE_MAIN_I1: retransmits: cleared Aug 26 13:22:34.381689: | libevent_free: release ptr-libevent@0x7f0f00003878 Aug 26 13:22:34.381693: | free_event_entry: release EVENT_RETRANSMIT-pe@0x560749ad3858 Aug 26 13:22:34.381695: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:22:34.381697: | picked newest_isakmp_sa #0 for #8 Aug 26 13:22:34.381700: "north-a-dpd" #8: deleting IKE SA for connection 'north-a-dpd' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS Aug 26 13:22:34.381702: | add revival: connection 'north-a-dpd' added to the list and scheduled for 0 seconds Aug 26 13:22:34.381704: | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds Aug 26 13:22:34.381715: | stop processing: connection "north-a-dpd" (BACKGROUND) (in update_state_connection() at connections.c:4076) Aug 26 13:22:34.381721: | start processing: connection NULL (in update_state_connection() at connections.c:4077) Aug 26 13:22:34.381724: | in connection_discard for connection north-a-dpd Aug 26 13:22:34.381727: | State DB: deleting IKEv1 state #8 in MAIN_I1 Aug 26 13:22:34.381735: | parent state #8: MAIN_I1(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:22:34.381742: | stop processing: state #8 from 192.1.2.23 (in delete_state() at state.c:1143) Aug 26 13:22:34.381747: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:22:34.381750: | pass 1 Aug 26 13:22:34.381753: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 13:22:34.381758: | shunt_eroute() called for connection 'north-a-dpd' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0 Aug 26 13:22:34.381762: | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 Aug 26 13:22:34.381766: | priority calculation of connection "north-a-dpd" is 0xfe7e7 Aug 26 13:22:34.381792: | priority calculation of connection "north-a-dpd" is 0xfe7e7 Aug 26 13:22:34.381801: | FOR_EACH_CONNECTION_... in route_owner Aug 26 13:22:34.381803: | conn north-a-dpd mark 0/00000000, 0/00000000 vs Aug 26 13:22:34.381805: | conn north-a-dpd mark 0/00000000, 0/00000000 Aug 26 13:22:34.381807: | route owner of "north-a-dpd" unrouted: NULL Aug 26 13:22:34.381809: | running updown command "ipsec _updown" for verb unroute Aug 26 13:22:34.381811: | command executing unroute-client Aug 26 13:22:34.381848: | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_MY_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.testing.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswan.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN Aug 26 13:22:34.381854: | popen cmd is 1272 chars long Aug 26 13:22:34.381856: | cmd( 0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='north-a-dpd' P: Aug 26 13:22:34.381858: | cmd( 80):LUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.3.254' PLUTO_ME='192.1.3.33' PLUTO_M: Aug 26 13:22:34.381860: | cmd( 160):Y_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan, OU=Test Department, CN=north.tes: Aug 26 13:22:34.381861: | cmd( 240):ting.libreswan.org, E=user-north@testing.libreswan.org' PLUTO_MY_CLIENT='192.0.3: Aug 26 13:22:34.381863: | cmd( 320):.0/24' PLUTO_MY_CLIENT_NET='192.0.3.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUT: Aug 26 13:22:34.381865: | cmd( 400):O_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' : Aug 26 13:22:34.381866: | cmd( 480):PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='C=CA, ST=Ontario, L=Toronto, O=Libreswan,: Aug 26 13:22:34.381868: | cmd( 560): OU=Test Department, CN=east.testing.libreswan.org, E=user-east@testing.libreswa: Aug 26 13:22:34.381870: | cmd( 640):n.org' PLUTO_PEER_CLIENT='192.0.22.0/24' PLUTO_PEER_CLIENT_NET='192.0.22.0' PLUT: Aug 26 13:22:34.381871: | cmd( 720):O_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' P: Aug 26 13:22:34.381873: | cmd( 800):LUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG: Aug 26 13:22:34.381875: | cmd( 880):+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN: Aug 26 13:22:34.381876: | cmd( 960):_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_C: Aug 26 13:22:34.381878: | cmd(1040):ISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' P: Aug 26 13:22:34.381880: | cmd(1120):LUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VT: Aug 26 13:22:34.381881: | cmd(1200):I_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1: Aug 26 13:22:34.390003: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390022: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390024: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390027: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390028: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390030: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390031: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390033: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390046: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390050: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390092: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390095: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390097: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390098: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390100: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390104: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390115: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390124: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390134: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390143: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390153: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390163: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390172: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390287: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390301: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390311: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.390322: unroute-client output: Error: Peer netns reference is invalid. Aug 26 13:22:34.394325: | free hp@0x560749ac4fd8 Aug 26 13:22:34.394337: | flush revival: connection 'north-a-dpd' revival flushed Aug 26 13:22:34.394341: | processing: STOP connection NULL (in discard_connection() at connections.c:249) Aug 26 13:22:34.394369: | crl fetch request list locked by 'free_crl_fetch' Aug 26 13:22:34.394371: | crl fetch request list unlocked by 'free_crl_fetch' Aug 26 13:22:34.394382: shutting down interface lo/lo 127.0.0.1:4500 Aug 26 13:22:34.394385: shutting down interface lo/lo 127.0.0.1:500 Aug 26 13:22:34.394387: shutting down interface eth0/eth0 192.0.3.254:4500 Aug 26 13:22:34.394389: shutting down interface eth0/eth0 192.0.3.254:500 Aug 26 13:22:34.394391: shutting down interface eth1/eth1 192.1.3.33:4500 Aug 26 13:22:34.394393: shutting down interface eth1/eth1 192.1.3.33:500 Aug 26 13:22:34.394397: | FOR_EACH_STATE_... in delete_states_dead_interfaces Aug 26 13:22:34.394407: | libevent_free: release ptr-libevent@0x560749aae6e8 Aug 26 13:22:34.394409: | free_event_entry: release EVENT_NULL-pe@0x560749aba408 Aug 26 13:22:34.394418: | libevent_free: release ptr-libevent@0x560749a552c8 Aug 26 13:22:34.394420: | free_event_entry: release EVENT_NULL-pe@0x560749aba4b8 Aug 26 13:22:34.394425: | libevent_free: release ptr-libevent@0x560749a54be8 Aug 26 13:22:34.394427: | free_event_entry: release EVENT_NULL-pe@0x560749aba568 Aug 26 13:22:34.394431: | libevent_free: release ptr-libevent@0x560749a542a8 Aug 26 13:22:34.394433: | free_event_entry: release EVENT_NULL-pe@0x560749aba618 Aug 26 13:22:34.394437: | libevent_free: release ptr-libevent@0x560749a543a8 Aug 26 13:22:34.394439: | free_event_entry: release EVENT_NULL-pe@0x560749aba6c8 Aug 26 13:22:34.394443: | libevent_free: release ptr-libevent@0x560749a544a8 Aug 26 13:22:34.394445: | free_event_entry: release EVENT_NULL-pe@0x560749aba778 Aug 26 13:22:34.394450: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 13:22:34.394809: | libevent_free: release ptr-libevent@0x560749aae798 Aug 26 13:22:34.394815: | free_event_entry: release EVENT_NULL-pe@0x560749aa2d28 Aug 26 13:22:34.394820: | libevent_free: release ptr-libevent@0x560749a55218 Aug 26 13:22:34.394821: | free_event_entry: release EVENT_NULL-pe@0x560749aa2888 Aug 26 13:22:34.394824: | libevent_free: release ptr-libevent@0x560749a9b8b8 Aug 26 13:22:34.394826: | free_event_entry: release EVENT_NULL-pe@0x560749a5c7f8 Aug 26 13:22:34.394829: | global timer EVENT_REINIT_SECRET uninitialized Aug 26 13:22:34.394831: | global timer EVENT_SHUNT_SCAN uninitialized Aug 26 13:22:34.394832: | global timer EVENT_PENDING_DDNS uninitialized Aug 26 13:22:34.394834: | global timer EVENT_PENDING_PHASE2 uninitialized Aug 26 13:22:34.394836: | global timer EVENT_CHECK_CRLS uninitialized Aug 26 13:22:34.394837: | global timer EVENT_REVIVE_CONNS uninitialized Aug 26 13:22:34.394839: | global timer EVENT_FREE_ROOT_CERTS uninitialized Aug 26 13:22:34.394840: | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized Aug 26 13:22:34.394842: | global timer EVENT_NAT_T_KEEPALIVE uninitialized Aug 26 13:22:34.394846: | libevent_free: release ptr-libevent@0x560749a60dc8 Aug 26 13:22:34.394848: | signal event handler PLUTO_SIGCHLD uninstalled Aug 26 13:22:34.394852: | libevent_free: release ptr-libevent@0x5607499d5838 Aug 26 13:22:34.394854: | signal event handler PLUTO_SIGTERM uninstalled Aug 26 13:22:34.394856: | libevent_free: release ptr-libevent@0x5607499deba8 Aug 26 13:22:34.394858: | signal event handler PLUTO_SIGHUP uninstalled Aug 26 13:22:34.394860: | libevent_free: release ptr-libevent@0x560749ab9ea8 Aug 26 13:22:34.394862: | signal event handler PLUTO_SIGSYS uninstalled Aug 26 13:22:34.394863: | releasing event base Aug 26 13:22:34.394872: | libevent_free: release ptr-libevent@0x560749ab9d78 Aug 26 13:22:34.394874: | libevent_free: release ptr-libevent@0x560749a9d148 Aug 26 13:22:34.394877: | libevent_free: release ptr-libevent@0x560749a9d0f8 Aug 26 13:22:34.394879: | libevent_free: release ptr-libevent@0x560749abb478 Aug 26 13:22:34.394881: | libevent_free: release ptr-libevent@0x560749a9d0b8 Aug 26 13:22:34.394883: | libevent_free: release ptr-libevent@0x560749ab9a08 Aug 26 13:22:34.394885: | libevent_free: release ptr-libevent@0x560749ab9c78 Aug 26 13:22:34.394887: | libevent_free: release ptr-libevent@0x560749a9d2f8 Aug 26 13:22:34.394888: | libevent_free: release ptr-libevent@0x560749aa28f8 Aug 26 13:22:34.394890: | libevent_free: release ptr-libevent@0x560749aa2558 Aug 26 13:22:34.394891: | libevent_free: release ptr-libevent@0x560749aba7e8 Aug 26 13:22:34.394893: | libevent_free: release ptr-libevent@0x560749aba738 Aug 26 13:22:34.394894: | libevent_free: release ptr-libevent@0x560749aba688 Aug 26 13:22:34.394896: | libevent_free: release ptr-libevent@0x560749aba5d8 Aug 26 13:22:34.394897: | libevent_free: release ptr-libevent@0x560749aba528 Aug 26 13:22:34.394899: | libevent_free: release ptr-libevent@0x560749aba478 Aug 26 13:22:34.394901: | libevent_free: release ptr-libevent@0x5607499d50d8 Aug 26 13:22:34.394902: | libevent_free: release ptr-libevent@0x560749ab9cf8 Aug 26 13:22:34.394904: | libevent_free: release ptr-libevent@0x560749ab9cb8 Aug 26 13:22:34.394905: | libevent_free: release ptr-libevent@0x560749ab9b78 Aug 26 13:22:34.394907: | libevent_free: release ptr-libevent@0x560749ab9d38 Aug 26 13:22:34.394909: | libevent_free: release ptr-libevent@0x560749ab9a48 Aug 26 13:22:34.394910: | libevent_free: release ptr-libevent@0x560749a62958 Aug 26 13:22:34.394912: | libevent_free: release ptr-libevent@0x560749a628d8 Aug 26 13:22:34.394914: | libevent_free: release ptr-libevent@0x5607499d5448 Aug 26 13:22:34.394915: | releasing global libevent data Aug 26 13:22:34.394917: | libevent_free: release ptr-libevent@0x560749a62ad8 Aug 26 13:22:34.394919: | libevent_free: release ptr-libevent@0x560749a62a58 Aug 26 13:22:34.394921: | libevent_free: release ptr-libevent@0x560749a629d8 Aug 26 13:22:34.394948: leak detective found no leaks