Aug 26 13:08:26.365068: FIPS Product: YES Aug 26 13:08:26.365197: FIPS Kernel: NO Aug 26 13:08:26.365200: FIPS Mode: NO Aug 26 13:08:26.365203: NSS DB directory: sql:/etc/ipsec.d Aug 26 13:08:26.365362: Initializing NSS Aug 26 13:08:26.365372: Opening NSS database "sql:/etc/ipsec.d" read-only Aug 26 13:08:26.428022: NSS initialized Aug 26 13:08:26.428043: NSS crypto library initialized Aug 26 13:08:26.428047: FIPS HMAC integrity support [enabled] Aug 26 13:08:26.428049: FIPS mode disabled for pluto daemon Aug 26 13:08:26.489202: FIPS HMAC integrity verification self-test FAILED Aug 26 13:08:26.489308: libcap-ng support [enabled] Aug 26 13:08:26.489321: Linux audit support [enabled] Aug 26 13:08:26.489345: Linux audit activated Aug 26 13:08:26.489350: Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:2486 Aug 26 13:08:26.489354: core dump dir: /tmp Aug 26 13:08:26.489357: secrets file: /etc/ipsec.secrets Aug 26 13:08:26.489359: leak-detective disabled Aug 26 13:08:26.489361: NSS crypto [enabled] Aug 26 13:08:26.489364: XAUTH PAM support [enabled] Aug 26 13:08:26.489437: | libevent is using pluto's memory allocator Aug 26 13:08:26.489445: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Aug 26 13:08:26.489457: | libevent_malloc: new ptr-libevent@0x55ea70a323d0 size 40 Aug 26 13:08:26.489464: | libevent_malloc: new ptr-libevent@0x55ea70a33680 size 40 Aug 26 13:08:26.489467: | libevent_malloc: new ptr-libevent@0x55ea70a336b0 size 40 Aug 26 13:08:26.489469: | creating event base Aug 26 13:08:26.489473: | libevent_malloc: new ptr-libevent@0x55ea70a33640 size 56 Aug 26 13:08:26.489476: | libevent_malloc: new ptr-libevent@0x55ea70a336e0 size 664 Aug 26 13:08:26.489487: | libevent_malloc: new ptr-libevent@0x55ea70a33980 size 24 Aug 26 13:08:26.489491: | libevent_malloc: new ptr-libevent@0x55ea70a25140 size 384 Aug 26 13:08:26.489501: | libevent_malloc: new ptr-libevent@0x55ea70a339a0 size 16 Aug 26 13:08:26.489503: | libevent_malloc: new ptr-libevent@0x55ea70a339c0 size 40 Aug 26 13:08:26.489506: | libevent_malloc: new ptr-libevent@0x55ea70a339f0 size 48 Aug 26 13:08:26.489512: | libevent_realloc: new ptr-libevent@0x55ea709b7370 size 256 Aug 26 13:08:26.489516: | libevent_malloc: new ptr-libevent@0x55ea70a33a30 size 16 Aug 26 13:08:26.489521: | libevent_free: release ptr-libevent@0x55ea70a33640 Aug 26 13:08:26.489525: | libevent initialized Aug 26 13:08:26.489529: | libevent_realloc: new ptr-libevent@0x55ea70a33a50 size 64 Aug 26 13:08:26.489532: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Aug 26 13:08:26.489547: | init_nat_traversal() initialized with keep_alive=0s Aug 26 13:08:26.489550: NAT-Traversal support [enabled] Aug 26 13:08:26.489553: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Aug 26 13:08:26.489560: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Aug 26 13:08:26.489567: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Aug 26 13:08:26.489600: | global one-shot timer EVENT_REVIVE_CONNS initialized Aug 26 13:08:26.489605: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Aug 26 13:08:26.489609: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Aug 26 13:08:26.489659: Encryption algorithms: Aug 26 13:08:26.489668: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c Aug 26 13:08:26.489674: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b Aug 26 13:08:26.489678: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a Aug 26 13:08:26.489682: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des Aug 26 13:08:26.489686: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Aug 26 13:08:26.489695: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia Aug 26 13:08:26.489699: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c Aug 26 13:08:26.489704: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b Aug 26 13:08:26.489708: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a Aug 26 13:08:26.489712: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr Aug 26 13:08:26.489717: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes Aug 26 13:08:26.489721: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent Aug 26 13:08:26.489725: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish Aug 26 13:08:26.489728: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh Aug 26 13:08:26.489732: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac Aug 26 13:08:26.489735: NULL IKEv1: ESP IKEv2: ESP [] Aug 26 13:08:26.489738: CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Aug 26 13:08:26.489745: Hash algorithms: Aug 26 13:08:26.489748: MD5 IKEv1: IKE IKEv2: Aug 26 13:08:26.489751: SHA1 IKEv1: IKE IKEv2: FIPS sha Aug 26 13:08:26.489755: SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 Aug 26 13:08:26.489758: SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 Aug 26 13:08:26.489761: SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 Aug 26 13:08:26.489775: PRF algorithms: Aug 26 13:08:26.489779: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 Aug 26 13:08:26.489782: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 Aug 26 13:08:26.489786: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 Aug 26 13:08:26.489789: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 Aug 26 13:08:26.489793: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 Aug 26 13:08:26.489797: AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Aug 26 13:08:26.489821: Integrity algorithms: Aug 26 13:08:26.489826: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 Aug 26 13:08:26.489830: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 Aug 26 13:08:26.489834: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Aug 26 13:08:26.489838: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Aug 26 13:08:26.489842: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Aug 26 13:08:26.489845: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Aug 26 13:08:26.489849: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 Aug 26 13:08:26.489852: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Aug 26 13:08:26.489855: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Aug 26 13:08:26.489867: DH algorithms: Aug 26 13:08:26.489871: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 Aug 26 13:08:26.489874: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 Aug 26 13:08:26.489877: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 Aug 26 13:08:26.489883: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 Aug 26 13:08:26.489886: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 Aug 26 13:08:26.489889: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 Aug 26 13:08:26.489892: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 Aug 26 13:08:26.489895: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 Aug 26 13:08:26.489898: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 Aug 26 13:08:26.489902: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 Aug 26 13:08:26.489905: DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 Aug 26 13:08:26.489907: testing CAMELLIA_CBC: Aug 26 13:08:26.489910: Camellia: 16 bytes with 128-bit key Aug 26 13:08:26.490018: Camellia: 16 bytes with 128-bit key Aug 26 13:08:26.490054: Camellia: 16 bytes with 256-bit key Aug 26 13:08:26.490086: Camellia: 16 bytes with 256-bit key Aug 26 13:08:26.490119: testing AES_GCM_16: Aug 26 13:08:26.490122: empty string Aug 26 13:08:26.490149: one block Aug 26 13:08:26.490176: two blocks Aug 26 13:08:26.490204: two blocks with associated data Aug 26 13:08:26.490233: testing AES_CTR: Aug 26 13:08:26.490236: Encrypting 16 octets using AES-CTR with 128-bit key Aug 26 13:08:26.490265: Encrypting 32 octets using AES-CTR with 128-bit key Aug 26 13:08:26.490301: Encrypting 36 octets using AES-CTR with 128-bit key Aug 26 13:08:26.490337: Encrypting 16 octets using AES-CTR with 192-bit key Aug 26 13:08:26.490367: Encrypting 32 octets using AES-CTR with 192-bit key Aug 26 13:08:26.490398: Encrypting 36 octets using AES-CTR with 192-bit key Aug 26 13:08:26.490431: Encrypting 16 octets using AES-CTR with 256-bit key Aug 26 13:08:26.490461: Encrypting 32 octets using AES-CTR with 256-bit key Aug 26 13:08:26.490492: Encrypting 36 octets using AES-CTR with 256-bit key Aug 26 13:08:26.490525: testing AES_CBC: Aug 26 13:08:26.490528: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Aug 26 13:08:26.490557: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Aug 26 13:08:26.490590: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Aug 26 13:08:26.490623: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Aug 26 13:08:26.490664: testing AES_XCBC: Aug 26 13:08:26.490668: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input Aug 26 13:08:26.490786: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input Aug 26 13:08:26.490918: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input Aug 26 13:08:26.491040: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input Aug 26 13:08:26.491165: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input Aug 26 13:08:26.491292: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input Aug 26 13:08:26.491421: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input Aug 26 13:08:26.491688: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Aug 26 13:08:26.491809: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Aug 26 13:08:26.491938: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Aug 26 13:08:26.492162: testing HMAC_MD5: Aug 26 13:08:26.492166: RFC 2104: MD5_HMAC test 1 Aug 26 13:08:26.492332: RFC 2104: MD5_HMAC test 2 Aug 26 13:08:26.492483: RFC 2104: MD5_HMAC test 3 Aug 26 13:08:26.492661: 8 CPU cores online Aug 26 13:08:26.492666: starting up 7 crypto helpers Aug 26 13:08:26.492699: started thread for crypto helper 0 Aug 26 13:08:26.492705: | starting up helper thread 0 Aug 26 13:08:26.492725: | status value returned by setting the priority of this thread (crypto helper 0) 22 Aug 26 13:08:26.492729: | crypto helper 0 waiting (nothing to do) Aug 26 13:08:26.492731: | starting up helper thread 1 Aug 26 13:08:26.492746: | status value returned by setting the priority of this thread (crypto helper 1) 22 Aug 26 13:08:26.492750: | crypto helper 1 waiting (nothing to do) Aug 26 13:08:26.492725: started thread for crypto helper 1 Aug 26 13:08:26.496389: started thread for crypto helper 2 Aug 26 13:08:26.496416: started thread for crypto helper 3 Aug 26 13:08:26.496436: started thread for crypto helper 4 Aug 26 13:08:26.496459: started thread for crypto helper 5 Aug 26 13:08:26.496479: started thread for crypto helper 6 Aug 26 13:08:26.496484: | checking IKEv1 state table Aug 26 13:08:26.496493: | MAIN_R0: category: half-open IKE SA flags: 0: Aug 26 13:08:26.496496: | -> MAIN_R1 EVENT_SO_DISCARD Aug 26 13:08:26.496499: | MAIN_I1: category: half-open IKE SA flags: 0: Aug 26 13:08:26.496502: | -> MAIN_I2 EVENT_RETRANSMIT Aug 26 13:08:26.496505: | MAIN_R1: category: open IKE SA flags: 200: Aug 26 13:08:26.496508: | -> MAIN_R2 EVENT_RETRANSMIT Aug 26 13:08:26.496511: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:08:26.496513: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:08:26.496516: | MAIN_I2: category: open IKE SA flags: 0: Aug 26 13:08:26.496519: | -> MAIN_I3 EVENT_RETRANSMIT Aug 26 13:08:26.496521: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:08:26.496524: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:08:26.496527: | MAIN_R2: category: open IKE SA flags: 0: Aug 26 13:08:26.496530: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:08:26.496532: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:08:26.496535: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 13:08:26.496538: | MAIN_I3: category: open IKE SA flags: 0: Aug 26 13:08:26.496540: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:08:26.496543: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:08:26.496545: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 13:08:26.496548: | MAIN_R3: category: established IKE SA flags: 200: Aug 26 13:08:26.496551: | -> UNDEFINED EVENT_NULL Aug 26 13:08:26.496554: | MAIN_I4: category: established IKE SA flags: 0: Aug 26 13:08:26.496557: | -> UNDEFINED EVENT_NULL Aug 26 13:08:26.496559: | AGGR_R0: category: half-open IKE SA flags: 0: Aug 26 13:08:26.496562: | -> AGGR_R1 EVENT_SO_DISCARD Aug 26 13:08:26.496565: | AGGR_I1: category: half-open IKE SA flags: 0: Aug 26 13:08:26.496567: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 13:08:26.496570: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 13:08:26.496573: | AGGR_R1: category: open IKE SA flags: 200: Aug 26 13:08:26.496576: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 13:08:26.496578: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 13:08:26.496581: | AGGR_I2: category: established IKE SA flags: 200: Aug 26 13:08:26.496584: | -> UNDEFINED EVENT_NULL Aug 26 13:08:26.496587: | AGGR_R2: category: established IKE SA flags: 0: Aug 26 13:08:26.496589: | -> UNDEFINED EVENT_NULL Aug 26 13:08:26.496592: | QUICK_R0: category: established CHILD SA flags: 0: Aug 26 13:08:26.496595: | -> QUICK_R1 EVENT_RETRANSMIT Aug 26 13:08:26.496598: | QUICK_I1: category: established CHILD SA flags: 0: Aug 26 13:08:26.496600: | -> QUICK_I2 EVENT_SA_REPLACE Aug 26 13:08:26.496603: | QUICK_R1: category: established CHILD SA flags: 0: Aug 26 13:08:26.496606: | -> QUICK_R2 EVENT_SA_REPLACE Aug 26 13:08:26.496609: | QUICK_I2: category: established CHILD SA flags: 200: Aug 26 13:08:26.496611: | -> UNDEFINED EVENT_NULL Aug 26 13:08:26.496614: | QUICK_R2: category: established CHILD SA flags: 0: Aug 26 13:08:26.496617: | -> UNDEFINED EVENT_NULL Aug 26 13:08:26.496620: | INFO: category: informational flags: 0: Aug 26 13:08:26.496623: | -> UNDEFINED EVENT_NULL Aug 26 13:08:26.496626: | INFO_PROTECTED: category: informational flags: 0: Aug 26 13:08:26.496628: | -> UNDEFINED EVENT_NULL Aug 26 13:08:26.496631: | XAUTH_R0: category: established IKE SA flags: 0: Aug 26 13:08:26.496634: | -> XAUTH_R1 EVENT_NULL Aug 26 13:08:26.496636: | XAUTH_R1: category: established IKE SA flags: 0: Aug 26 13:08:26.496639: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:08:26.496643: | MODE_CFG_R0: category: informational flags: 0: Aug 26 13:08:26.496651: | -> MODE_CFG_R1 EVENT_SA_REPLACE Aug 26 13:08:26.496654: | MODE_CFG_R1: category: established IKE SA flags: 0: Aug 26 13:08:26.496657: | -> MODE_CFG_R2 EVENT_SA_REPLACE Aug 26 13:08:26.496660: | MODE_CFG_R2: category: established IKE SA flags: 0: Aug 26 13:08:26.496663: | -> UNDEFINED EVENT_NULL Aug 26 13:08:26.496666: | MODE_CFG_I1: category: established IKE SA flags: 0: Aug 26 13:08:26.496669: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:08:26.496672: | XAUTH_I0: category: established IKE SA flags: 0: Aug 26 13:08:26.496675: | -> XAUTH_I1 EVENT_RETRANSMIT Aug 26 13:08:26.496677: | XAUTH_I1: category: established IKE SA flags: 0: Aug 26 13:08:26.496685: | starting up helper thread 4 Aug 26 13:08:26.496692: | starting up helper thread 2 Aug 26 13:08:26.496680: | -> MAIN_I4 EVENT_RETRANSMIT Aug 26 13:08:26.496704: | status value returned by setting the priority of this thread (crypto helper 2) 22 Aug 26 13:08:26.496707: | checking IKEv2 state table Aug 26 13:08:26.496678: | starting up helper thread 6 Aug 26 13:08:26.496715: | status value returned by setting the priority of this thread (crypto helper 6) 22 Aug 26 13:08:26.496717: | PARENT_I0: category: ignore flags: 0: Aug 26 13:08:26.496726: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Aug 26 13:08:26.496730: | PARENT_I1: category: half-open IKE SA flags: 0: Aug 26 13:08:26.496733: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) Aug 26 13:08:26.496740: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) Aug 26 13:08:26.496744: | PARENT_I2: category: open IKE SA flags: 0: Aug 26 13:08:26.496747: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Aug 26 13:08:26.496749: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Aug 26 13:08:26.496752: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Aug 26 13:08:26.496707: | crypto helper 2 waiting (nothing to do) Aug 26 13:08:26.496762: | starting up helper thread 3 Aug 26 13:08:26.496755: | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Aug 26 13:08:26.496768: | crypto helper 6 waiting (nothing to do) Aug 26 13:08:26.496776: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Aug 26 13:08:26.496780: | PARENT_I3: category: established IKE SA flags: 0: Aug 26 13:08:26.496783: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) Aug 26 13:08:26.496785: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) Aug 26 13:08:26.496789: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) Aug 26 13:08:26.496791: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) Aug 26 13:08:26.496794: | PARENT_R0: category: half-open IKE SA flags: 0: Aug 26 13:08:26.496797: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) Aug 26 13:08:26.496800: | PARENT_R1: category: half-open IKE SA flags: 0: Aug 26 13:08:26.496803: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) Aug 26 13:08:26.496806: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) Aug 26 13:08:26.496809: | PARENT_R2: category: established IKE SA flags: 0: Aug 26 13:08:26.496812: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) Aug 26 13:08:26.496815: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) Aug 26 13:08:26.496817: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) Aug 26 13:08:26.496820: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) Aug 26 13:08:26.496823: | V2_CREATE_I0: category: established IKE SA flags: 0: Aug 26 13:08:26.496826: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Aug 26 13:08:26.496829: | V2_CREATE_I: category: established IKE SA flags: 0: Aug 26 13:08:26.496836: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Aug 26 13:08:26.496840: | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: Aug 26 13:08:26.496843: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Aug 26 13:08:26.496847: | V2_REKEY_IKE_I: category: established IKE SA flags: 0: Aug 26 13:08:26.496849: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Aug 26 13:08:26.496852: | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: Aug 26 13:08:26.496855: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Aug 26 13:08:26.496858: | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: Aug 26 13:08:26.496861: | V2_CREATE_R: category: established IKE SA flags: 0: Aug 26 13:08:26.496864: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) Aug 26 13:08:26.496867: | V2_REKEY_IKE_R: category: established IKE SA flags: 0: Aug 26 13:08:26.496870: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) Aug 26 13:08:26.496873: | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: Aug 26 13:08:26.496876: | V2_IPSEC_I: category: established CHILD SA flags: 0: Aug 26 13:08:26.496880: | V2_IPSEC_R: category: established CHILD SA flags: 0: Aug 26 13:08:26.496883: | IKESA_DEL: category: established IKE SA flags: 0: Aug 26 13:08:26.496885: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Aug 26 13:08:26.496889: | CHILDSA_DEL: category: informational flags: 0: Aug 26 13:08:26.496908: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 Aug 26 13:08:26.497346: | Hard-wiring algorithms Aug 26 13:08:26.497355: | adding AES_CCM_16 to kernel algorithm db Aug 26 13:08:26.497360: | adding AES_CCM_12 to kernel algorithm db Aug 26 13:08:26.497363: | adding AES_CCM_8 to kernel algorithm db Aug 26 13:08:26.497366: | adding 3DES_CBC to kernel algorithm db Aug 26 13:08:26.497368: | adding CAMELLIA_CBC to kernel algorithm db Aug 26 13:08:26.497371: | adding AES_GCM_16 to kernel algorithm db Aug 26 13:08:26.497374: | adding AES_GCM_12 to kernel algorithm db Aug 26 13:08:26.497376: | adding AES_GCM_8 to kernel algorithm db Aug 26 13:08:26.497379: | adding AES_CTR to kernel algorithm db Aug 26 13:08:26.497382: | adding AES_CBC to kernel algorithm db Aug 26 13:08:26.497384: | adding SERPENT_CBC to kernel algorithm db Aug 26 13:08:26.497387: | adding TWOFISH_CBC to kernel algorithm db Aug 26 13:08:26.497390: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Aug 26 13:08:26.497393: | adding NULL to kernel algorithm db Aug 26 13:08:26.497395: | adding CHACHA20_POLY1305 to kernel algorithm db Aug 26 13:08:26.497398: | adding HMAC_MD5_96 to kernel algorithm db Aug 26 13:08:26.497401: | adding HMAC_SHA1_96 to kernel algorithm db Aug 26 13:08:26.497403: | adding HMAC_SHA2_512_256 to kernel algorithm db Aug 26 13:08:26.497406: | adding HMAC_SHA2_384_192 to kernel algorithm db Aug 26 13:08:26.497409: | adding HMAC_SHA2_256_128 to kernel algorithm db Aug 26 13:08:26.497411: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Aug 26 13:08:26.497414: | adding AES_XCBC_96 to kernel algorithm db Aug 26 13:08:26.497416: | adding AES_CMAC_96 to kernel algorithm db Aug 26 13:08:26.497419: | adding NONE to kernel algorithm db Aug 26 13:08:26.497445: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Aug 26 13:08:26.497452: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Aug 26 13:08:26.497455: | setup kernel fd callback Aug 26 13:08:26.497458: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x55ea70a3de00 Aug 26 13:08:26.497462: | libevent_malloc: new ptr-libevent@0x55ea70a45260 size 128 Aug 26 13:08:26.497465: | libevent_malloc: new ptr-libevent@0x55ea70a33b90 size 16 Aug 26 13:08:26.497471: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x55ea70a386a0 Aug 26 13:08:26.497478: | libevent_malloc: new ptr-libevent@0x55ea70a452f0 size 128 Aug 26 13:08:26.497481: | libevent_malloc: new ptr-libevent@0x55ea70a385f0 size 16 Aug 26 13:08:26.497695: | starting up helper thread 5 Aug 26 13:08:26.497707: | status value returned by setting the priority of this thread (crypto helper 5) 22 Aug 26 13:08:26.497711: | crypto helper 5 waiting (nothing to do) Aug 26 13:08:26.497717: | global one-shot timer EVENT_CHECK_CRLS initialized Aug 26 13:08:26.497726: selinux support is enabled. Aug 26 13:08:26.499840: | unbound context created - setting debug level to 5 Aug 26 13:08:26.499882: | /etc/hosts lookups activated Aug 26 13:08:26.499897: | /etc/resolv.conf usage activated Aug 26 13:08:26.499964: | outgoing-port-avoid set 0-65535 Aug 26 13:08:26.499997: | outgoing-port-permit set 32768-60999 Aug 26 13:08:26.500001: | Loading dnssec root key from:/var/lib/unbound/root.key Aug 26 13:08:26.500005: | No additional dnssec trust anchors defined via dnssec-trusted= option Aug 26 13:08:26.500008: | Setting up events, loop start Aug 26 13:08:26.500014: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x55ea70a383f0 Aug 26 13:08:26.500018: | libevent_malloc: new ptr-libevent@0x55ea70a4f810 size 128 Aug 26 13:08:26.500024: | libevent_malloc: new ptr-libevent@0x55ea70a4f8a0 size 16 Aug 26 13:08:26.500032: | libevent_realloc: new ptr-libevent@0x55ea709b55b0 size 256 Aug 26 13:08:26.500036: | libevent_malloc: new ptr-libevent@0x55ea70a4f8c0 size 8 Aug 26 13:08:26.500040: | libevent_realloc: new ptr-libevent@0x55ea70a445d0 size 144 Aug 26 13:08:26.500043: | libevent_malloc: new ptr-libevent@0x55ea70a4f8e0 size 152 Aug 26 13:08:26.500047: | libevent_malloc: new ptr-libevent@0x55ea70a4f980 size 16 Aug 26 13:08:26.500052: | signal event handler PLUTO_SIGCHLD installed Aug 26 13:08:26.500055: | libevent_malloc: new ptr-libevent@0x55ea70a4f9a0 size 8 Aug 26 13:08:26.500058: | libevent_malloc: new ptr-libevent@0x55ea70a4f9c0 size 152 Aug 26 13:08:26.500062: | signal event handler PLUTO_SIGTERM installed Aug 26 13:08:26.500065: | libevent_malloc: new ptr-libevent@0x55ea70a4fa60 size 8 Aug 26 13:08:26.500068: | libevent_malloc: new ptr-libevent@0x55ea70a4fa80 size 152 Aug 26 13:08:26.500071: | signal event handler PLUTO_SIGHUP installed Aug 26 13:08:26.500074: | libevent_malloc: new ptr-libevent@0x55ea70a4fb20 size 8 Aug 26 13:08:26.500077: | libevent_realloc: release ptr-libevent@0x55ea70a445d0 Aug 26 13:08:26.500081: | libevent_realloc: new ptr-libevent@0x55ea70a4fb40 size 256 Aug 26 13:08:26.500084: | libevent_malloc: new ptr-libevent@0x55ea70a445d0 size 152 Aug 26 13:08:26.500087: | signal event handler PLUTO_SIGSYS installed Aug 26 13:08:26.500449: | created addconn helper (pid:2981) using fork+execve Aug 26 13:08:26.500476: | forked child 2981 Aug 26 13:08:26.500522: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:08:26.500540: listening for IKE messages Aug 26 13:08:26.496695: | status value returned by setting the priority of this thread (crypto helper 4) 22 Aug 26 13:08:26.502435: | crypto helper 4 waiting (nothing to do) Aug 26 13:08:26.496769: | status value returned by setting the priority of this thread (crypto helper 3) 22 Aug 26 13:08:26.502463: | crypto helper 3 waiting (nothing to do) Aug 26 13:08:26.502479: | Inspecting interface lo Aug 26 13:08:26.502486: | found lo with address 127.0.0.1 Aug 26 13:08:26.502490: | Inspecting interface eth0 Aug 26 13:08:26.502494: | found eth0 with address 192.0.2.254 Aug 26 13:08:26.502497: | Inspecting interface eth1 Aug 26 13:08:26.502501: | found eth1 with address 192.1.2.23 Aug 26 13:08:26.502625: Kernel supports NIC esp-hw-offload Aug 26 13:08:26.502645: adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.23:500 Aug 26 13:08:26.502727: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 13:08:26.502733: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 13:08:26.502737: adding interface eth1/eth1 192.1.2.23:4500 Aug 26 13:08:26.502772: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.2.254:500 Aug 26 13:08:26.502795: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 13:08:26.502800: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 13:08:26.502805: adding interface eth0/eth0 192.0.2.254:4500 Aug 26 13:08:26.502831: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 Aug 26 13:08:26.502855: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 13:08:26.502860: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 13:08:26.502863: adding interface lo/lo 127.0.0.1:4500 Aug 26 13:08:26.502920: | no interfaces to sort Aug 26 13:08:26.502925: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 13:08:26.502935: | add_fd_read_event_handler: new ethX-pe@0x55ea70a39170 Aug 26 13:08:26.502939: | libevent_malloc: new ptr-libevent@0x55ea70a4feb0 size 128 Aug 26 13:08:26.502944: | libevent_malloc: new ptr-libevent@0x55ea70a4ff40 size 16 Aug 26 13:08:26.502955: | setup callback for interface lo 127.0.0.1:4500 fd 22 Aug 26 13:08:26.502959: | add_fd_read_event_handler: new ethX-pe@0x55ea70a4ff60 Aug 26 13:08:26.502965: | libevent_malloc: new ptr-libevent@0x55ea70a4ffa0 size 128 Aug 26 13:08:26.502971: | libevent_malloc: new ptr-libevent@0x55ea70a50030 size 16 Aug 26 13:08:26.502977: | setup callback for interface lo 127.0.0.1:500 fd 21 Aug 26 13:08:26.502981: | add_fd_read_event_handler: new ethX-pe@0x55ea70a50050 Aug 26 13:08:26.502985: | libevent_malloc: new ptr-libevent@0x55ea70a50090 size 128 Aug 26 13:08:26.502989: | libevent_malloc: new ptr-libevent@0x55ea70a50120 size 16 Aug 26 13:08:26.502994: | setup callback for interface eth0 192.0.2.254:4500 fd 20 Aug 26 13:08:26.502998: | add_fd_read_event_handler: new ethX-pe@0x55ea70a50140 Aug 26 13:08:26.503001: | libevent_malloc: new ptr-libevent@0x55ea70a50180 size 128 Aug 26 13:08:26.503005: | libevent_malloc: new ptr-libevent@0x55ea70a50210 size 16 Aug 26 13:08:26.503011: | setup callback for interface eth0 192.0.2.254:500 fd 19 Aug 26 13:08:26.503014: | add_fd_read_event_handler: new ethX-pe@0x55ea70a50230 Aug 26 13:08:26.503018: | libevent_malloc: new ptr-libevent@0x55ea70a50270 size 128 Aug 26 13:08:26.503021: | libevent_malloc: new ptr-libevent@0x55ea70a50300 size 16 Aug 26 13:08:26.503031: | setup callback for interface eth1 192.1.2.23:4500 fd 18 Aug 26 13:08:26.503035: | add_fd_read_event_handler: new ethX-pe@0x55ea70a50320 Aug 26 13:08:26.503039: | libevent_malloc: new ptr-libevent@0x55ea70a50360 size 128 Aug 26 13:08:26.503042: | libevent_malloc: new ptr-libevent@0x55ea70a503f0 size 16 Aug 26 13:08:26.503048: | setup callback for interface eth1 192.1.2.23:500 fd 17 Aug 26 13:08:26.503055: | certs and keys locked by 'free_preshared_secrets' Aug 26 13:08:26.503058: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 13:08:26.503082: loading secrets from "/etc/ipsec.secrets" Aug 26 13:08:26.503097: | Processing PSK at line 1: passed Aug 26 13:08:26.503101: | certs and keys locked by 'process_secret' Aug 26 13:08:26.503104: | certs and keys unlocked by 'process_secret' Aug 26 13:08:26.503115: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:08:26.503123: | spent 1.19 milliseconds in whack Aug 26 13:08:26.636014: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:08:26.636045: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:08:26.636050: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 13:08:26.636053: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:08:26.636055: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 13:08:26.636059: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:08:26.636067: | Added new connection test with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 13:08:26.636070: | from whack: got --esp=aes256-sha1,aes-sha1 Aug 26 13:08:26.636095: | ESP/AH string values: AES_CBC_256-HMAC_SHA1_96, AES_CBC-HMAC_SHA1_96 Aug 26 13:08:26.636107: | counting wild cards for 192.1.2.23 is 0 Aug 26 13:08:26.636112: | counting wild cards for 192.1.2.45 is 0 Aug 26 13:08:26.636123: | connect_to_host_pair: 192.1.2.23:500 192.1.2.45:500 -> hp@(nil): none Aug 26 13:08:26.636127: | new hp@0x55ea70a1c900 Aug 26 13:08:26.636131: added connection description "test" Aug 26 13:08:26.636140: | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 13:08:26.636152: | 192.1.2.23/32===192.1.2.23<192.1.2.23>...192.1.2.45<192.1.2.45>===10.1.1.0/29 Aug 26 13:08:26.636159: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:08:26.636166: | spent 0.16 milliseconds in whack Aug 26 13:08:26.638103: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:08:26.638132: listening for IKE messages Aug 26 13:08:26.638625: | Inspecting interface lo Aug 26 13:08:26.638639: | found lo with address 127.0.0.1 Aug 26 13:08:26.638642: | Inspecting interface eth0 Aug 26 13:08:26.638647: | found eth0 with address 192.0.2.254 Aug 26 13:08:26.638650: | Inspecting interface eth1 Aug 26 13:08:26.638654: | found eth1 with address 192.1.2.23 Aug 26 13:08:26.638711: | no interfaces to sort Aug 26 13:08:26.638722: | libevent_free: release ptr-libevent@0x55ea70a4feb0 Aug 26 13:08:26.638726: | free_event_entry: release EVENT_NULL-pe@0x55ea70a39170 Aug 26 13:08:26.638730: | add_fd_read_event_handler: new ethX-pe@0x55ea70a39170 Aug 26 13:08:26.638733: | libevent_malloc: new ptr-libevent@0x55ea70a4feb0 size 128 Aug 26 13:08:26.638741: | setup callback for interface lo 127.0.0.1:4500 fd 22 Aug 26 13:08:26.638746: | libevent_free: release ptr-libevent@0x55ea70a4ffa0 Aug 26 13:08:26.638749: | free_event_entry: release EVENT_NULL-pe@0x55ea70a4ff60 Aug 26 13:08:26.638752: | add_fd_read_event_handler: new ethX-pe@0x55ea70a4ff60 Aug 26 13:08:26.638756: | libevent_malloc: new ptr-libevent@0x55ea70a4ffa0 size 128 Aug 26 13:08:26.638761: | setup callback for interface lo 127.0.0.1:500 fd 21 Aug 26 13:08:26.638765: | libevent_free: release ptr-libevent@0x55ea70a50090 Aug 26 13:08:26.638768: | free_event_entry: release EVENT_NULL-pe@0x55ea70a50050 Aug 26 13:08:26.638771: | add_fd_read_event_handler: new ethX-pe@0x55ea70a50050 Aug 26 13:08:26.638774: | libevent_malloc: new ptr-libevent@0x55ea70a50090 size 128 Aug 26 13:08:26.638779: | setup callback for interface eth0 192.0.2.254:4500 fd 20 Aug 26 13:08:26.638783: | libevent_free: release ptr-libevent@0x55ea70a50180 Aug 26 13:08:26.638786: | free_event_entry: release EVENT_NULL-pe@0x55ea70a50140 Aug 26 13:08:26.638789: | add_fd_read_event_handler: new ethX-pe@0x55ea70a50140 Aug 26 13:08:26.638792: | libevent_malloc: new ptr-libevent@0x55ea70a50180 size 128 Aug 26 13:08:26.638797: | setup callback for interface eth0 192.0.2.254:500 fd 19 Aug 26 13:08:26.638801: | libevent_free: release ptr-libevent@0x55ea70a50270 Aug 26 13:08:26.638804: | free_event_entry: release EVENT_NULL-pe@0x55ea70a50230 Aug 26 13:08:26.638807: | add_fd_read_event_handler: new ethX-pe@0x55ea70a50230 Aug 26 13:08:26.638809: | libevent_malloc: new ptr-libevent@0x55ea70a50270 size 128 Aug 26 13:08:26.638814: | setup callback for interface eth1 192.1.2.23:4500 fd 18 Aug 26 13:08:26.638819: | libevent_free: release ptr-libevent@0x55ea70a50360 Aug 26 13:08:26.638822: | free_event_entry: release EVENT_NULL-pe@0x55ea70a50320 Aug 26 13:08:26.638824: | add_fd_read_event_handler: new ethX-pe@0x55ea70a50320 Aug 26 13:08:26.638827: | libevent_malloc: new ptr-libevent@0x55ea70a50360 size 128 Aug 26 13:08:26.638832: | setup callback for interface eth1 192.1.2.23:500 fd 17 Aug 26 13:08:26.638835: | certs and keys locked by 'free_preshared_secrets' Aug 26 13:08:26.638837: forgetting secrets Aug 26 13:08:26.638842: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 13:08:26.638855: loading secrets from "/etc/ipsec.secrets" Aug 26 13:08:26.638866: | Processing PSK at line 1: passed Aug 26 13:08:26.638868: | certs and keys locked by 'process_secret' Aug 26 13:08:26.638869: | certs and keys unlocked by 'process_secret' Aug 26 13:08:26.638876: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:08:26.638881: | spent 0.784 milliseconds in whack Aug 26 13:08:26.641093: | processing signal PLUTO_SIGCHLD Aug 26 13:08:26.641115: | waitpid returned pid 2981 (exited with status 0) Aug 26 13:08:26.641120: | reaped addconn helper child (status 0) Aug 26 13:08:26.641125: | waitpid returned ECHILD (no child processes left) Aug 26 13:08:26.641131: | spent 0.0182 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 13:08:27.404534: | spent 0.00387 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:27.404573: | *received 92 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:27.404579: | 1a 5d b7 67 4c 5b aa cb 00 00 00 00 00 00 00 00 Aug 26 13:08:27.404581: | 01 10 02 00 00 00 00 00 00 00 00 5c 00 00 00 40 Aug 26 13:08:27.404583: | 00 00 00 01 00 00 00 01 00 00 00 34 01 01 00 02 Aug 26 13:08:27.404586: | 03 00 00 1c 01 01 00 00 80 01 00 07 80 0e 00 80 Aug 26 13:08:27.404588: | 80 02 00 01 80 03 00 01 80 04 00 04 00 00 00 10 Aug 26 13:08:27.404590: | 02 01 00 00 80 03 00 01 80 04 00 04 Aug 26 13:08:27.404597: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:27.404601: | **parse ISAKMP Message: Aug 26 13:08:27.404604: | initiator cookie: Aug 26 13:08:27.404607: | 1a 5d b7 67 4c 5b aa cb Aug 26 13:08:27.404609: | responder cookie: Aug 26 13:08:27.404611: | 00 00 00 00 00 00 00 00 Aug 26 13:08:27.404614: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.404617: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.404620: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.404622: | flags: none (0x0) Aug 26 13:08:27.404625: | Message ID: 0 (0x0) Aug 26 13:08:27.404627: | length: 92 (0x5c) Aug 26 13:08:27.404630: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:27.404635: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:27.404637: | #null state always idle Aug 26 13:08:27.404641: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:27.404645: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:27.404647: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.404650: | length: 64 (0x40) Aug 26 13:08:27.404652: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.404655: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:27.404658: | in statetime_start() with no state Aug 26 13:08:27.404664: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:27.404670: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:27.404674: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.404678: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:27.404681: | find_next_host_connection returns test Aug 26 13:08:27.404683: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.404686: | find_next_host_connection returns empty Aug 26 13:08:27.404719: | creating state object #1 at 0x55ea70a530e0 Aug 26 13:08:27.404724: | State DB: adding IKEv1 state #1 in UNDEFINED Aug 26 13:08:27.404733: | pstats #1 ikev1.isakmp started Aug 26 13:08:27.404738: | #1 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:27.404746: | start processing: state #1 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:27.404750: | parent state #1: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:27.404754: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:27.404757: "test" #1: responding to Main Mode Aug 26 13:08:27.404793: | **emit ISAKMP Message: Aug 26 13:08:27.404798: | initiator cookie: Aug 26 13:08:27.404801: | 1a 5d b7 67 4c 5b aa cb Aug 26 13:08:27.404803: | responder cookie: Aug 26 13:08:27.404806: | b8 51 e1 62 65 7e e7 0a Aug 26 13:08:27.404809: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.404812: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.404814: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.404817: | flags: none (0x0) Aug 26 13:08:27.404820: | Message ID: 0 (0x0) Aug 26 13:08:27.404823: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.404826: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:27.404829: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:27.404833: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:27.404835: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.404839: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:27.404842: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:27.404845: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:27.404849: | ****parse IPsec DOI SIT: Aug 26 13:08:27.404851: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:27.404854: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:27.404856: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.404858: | length: 52 (0x34) Aug 26 13:08:27.404861: | proposal number: 1 (0x1) Aug 26 13:08:27.404863: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:27.404865: | SPI size: 0 (0x0) Aug 26 13:08:27.404867: | number of transforms: 2 (0x2) Aug 26 13:08:27.404869: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:27.404872: | next payload type: ISAKMP_NEXT_T (0x3) Aug 26 13:08:27.404874: | length: 28 (0x1c) Aug 26 13:08:27.404876: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:27.404878: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:27.404881: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.404884: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:27.404886: | length/value: 7 (0x7) Aug 26 13:08:27.404888: | [7 is OAKLEY_AES_CBC] Aug 26 13:08:27.404892: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.404894: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) Aug 26 13:08:27.404896: | length/value: 128 (0x80) Aug 26 13:08:27.404899: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.404901: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:08:27.404903: | length/value: 1 (0x1) Aug 26 13:08:27.404906: | [1 is OAKLEY_MD5] Aug 26 13:08:27.404908: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.404911: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:08:27.404913: | length/value: 1 (0x1) Aug 26 13:08:27.404916: | [1 is OAKLEY_PRESHARED_KEY] Aug 26 13:08:27.404921: | started looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK Aug 26 13:08:27.404924: | actually looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK Aug 26 13:08:27.404929: | line 1: key type PKK_PSK(192.1.2.23) to type PKK_PSK Aug 26 13:08:27.404933: | 1: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Aug 26 13:08:27.404936: | 2: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Aug 26 13:08:27.404938: | line 1: match=002 Aug 26 13:08:27.404941: | match 002 beats previous best_match 000 match=0x55ea70a45440 (line=1) Aug 26 13:08:27.404944: | concluding with best_match=002 best=0x55ea70a45440 (lineno=1) Aug 26 13:08:27.404947: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.404949: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:08:27.404952: | length/value: 4 (0x4) Aug 26 13:08:27.404955: | [4 is OAKLEY_GROUP_GP185(UNUSED)] Aug 26 13:08:27.404963: "test" #1: OAKLEY_GROUP 4 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Aug 26 13:08:27.404966: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:27.404969: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.404971: | length: 16 (0x10) Aug 26 13:08:27.404973: | ISAKMP transform number: 2 (0x2) Aug 26 13:08:27.404975: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:27.404978: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.404980: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:08:27.404982: | length/value: 1 (0x1) Aug 26 13:08:27.404984: | [1 is OAKLEY_PRESHARED_KEY] Aug 26 13:08:27.404988: | started looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK Aug 26 13:08:27.404991: | actually looking for secret for 192.1.2.23->192.1.2.45 of kind PKK_PSK Aug 26 13:08:27.404995: | line 1: key type PKK_PSK(192.1.2.23) to type PKK_PSK Aug 26 13:08:27.404998: | 1: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Aug 26 13:08:27.405001: | 2: compared key (none) to 192.1.2.23 / 192.1.2.45 -> 002 Aug 26 13:08:27.405003: | line 1: match=002 Aug 26 13:08:27.405006: | match 002 beats previous best_match 000 match=0x55ea70a45440 (line=1) Aug 26 13:08:27.405009: | concluding with best_match=002 best=0x55ea70a45440 (lineno=1) Aug 26 13:08:27.405011: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.405014: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:08:27.405017: | length/value: 4 (0x4) Aug 26 13:08:27.405019: | [4 is OAKLEY_GROUP_GP185(UNUSED)] Aug 26 13:08:27.405022: "test" #1: OAKLEY_GROUP 4 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Aug 26 13:08:27.405025: "test" #1: no acceptable Oakley Transform Aug 26 13:08:27.405029: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:27.405033: | [RE]START processing: state #1 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:27.405036: | #1 is idle Aug 26 13:08:27.406312: "test" #1: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:27.406329: | **emit ISAKMP Message: Aug 26 13:08:27.406334: | initiator cookie: Aug 26 13:08:27.406337: | 1a 5d b7 67 4c 5b aa cb Aug 26 13:08:27.406340: | responder cookie: Aug 26 13:08:27.406342: | b8 51 e1 62 65 7e e7 0a Aug 26 13:08:27.406346: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.406348: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.406350: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:27.406353: | flags: none (0x0) Aug 26 13:08:27.406356: | Message ID: 0 (0x0) Aug 26 13:08:27.406359: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.406363: | ***emit ISAKMP Notification Payload: Aug 26 13:08:27.406366: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.406368: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.406371: | protocol ID: 1 (0x1) Aug 26 13:08:27.406374: | SPI size: 0 (0x0) Aug 26 13:08:27.406376: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:27.406380: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:27.406383: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:27.406386: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:27.406389: | emitting length of ISAKMP Message: 40 Aug 26 13:08:27.406400: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #1) Aug 26 13:08:27.406403: | 1a 5d b7 67 4c 5b aa cb b8 51 e1 62 65 7e e7 0a Aug 26 13:08:27.406405: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:27.406408: | 00 00 00 01 01 00 00 0e Aug 26 13:08:27.406453: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:27.406460: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:27.406471: | stop processing: state #1 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:27.406474: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:27.406482: | spent 0.738 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:27.544770: | spent 0.00422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:27.544797: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:27.544803: | d3 8b c5 93 ff e9 da c5 00 00 00 00 00 00 00 00 Aug 26 13:08:27.544806: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 13:08:27.544808: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 13:08:27.544811: | 00 00 00 18 01 01 00 00 80 01 00 1e 80 02 00 13 Aug 26 13:08:27.544813: | 80 03 00 13 80 04 00 18 Aug 26 13:08:27.544817: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:27.544820: | **parse ISAKMP Message: Aug 26 13:08:27.544822: | initiator cookie: Aug 26 13:08:27.544824: | d3 8b c5 93 ff e9 da c5 Aug 26 13:08:27.544825: | responder cookie: Aug 26 13:08:27.544827: | 00 00 00 00 00 00 00 00 Aug 26 13:08:27.544829: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.544831: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.544833: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.544834: | flags: none (0x0) Aug 26 13:08:27.544836: | Message ID: 0 (0x0) Aug 26 13:08:27.544838: | length: 72 (0x48) Aug 26 13:08:27.544840: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:27.544843: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:27.544845: | #null state always idle Aug 26 13:08:27.544847: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:27.544850: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:27.544852: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.544853: | length: 44 (0x2c) Aug 26 13:08:27.544855: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.544857: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:27.544859: | in statetime_start() with no state Aug 26 13:08:27.544862: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:27.544866: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:27.544868: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.544871: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:27.544873: | find_next_host_connection returns test Aug 26 13:08:27.544874: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.544876: | find_next_host_connection returns empty Aug 26 13:08:27.544897: | creating state object #2 at 0x55ea70a53ba0 Aug 26 13:08:27.544900: | State DB: adding IKEv1 state #2 in UNDEFINED Aug 26 13:08:27.544905: | pstats #2 ikev1.isakmp started Aug 26 13:08:27.544908: | #2 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:27.544912: | start processing: state #2 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:27.544915: | parent state #2: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:27.544917: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:27.544919: "test" #2: responding to Main Mode Aug 26 13:08:27.544923: | **emit ISAKMP Message: Aug 26 13:08:27.544925: | initiator cookie: Aug 26 13:08:27.544927: | d3 8b c5 93 ff e9 da c5 Aug 26 13:08:27.544928: | responder cookie: Aug 26 13:08:27.544930: | 7c f6 50 70 32 e6 f4 ba Aug 26 13:08:27.544932: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.544933: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.544935: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.544941: | flags: none (0x0) Aug 26 13:08:27.544943: | Message ID: 0 (0x0) Aug 26 13:08:27.544945: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.544947: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:27.544949: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:27.544950: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:27.544952: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.544954: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:27.544956: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:27.544958: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:27.544960: | ****parse IPsec DOI SIT: Aug 26 13:08:27.544962: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:27.544964: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:27.544966: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.544967: | length: 32 (0x20) Aug 26 13:08:27.544969: | proposal number: 1 (0x1) Aug 26 13:08:27.544971: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:27.544972: | SPI size: 0 (0x0) Aug 26 13:08:27.544974: | number of transforms: 1 (0x1) Aug 26 13:08:27.544976: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:27.544977: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.544979: | length: 24 (0x18) Aug 26 13:08:27.544981: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:27.544982: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:27.544984: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.544986: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:27.544988: | length/value: 30 (0x1e) Aug 26 13:08:27.544991: "test" #2: 30?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:27.544993: "test" #2: no acceptable Oakley Transform Aug 26 13:08:27.544995: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:27.544999: | [RE]START processing: state #2 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:27.545000: | #2 is idle Aug 26 13:08:27.545081: "test" #2: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:27.545088: | **emit ISAKMP Message: Aug 26 13:08:27.545091: | initiator cookie: Aug 26 13:08:27.545094: | d3 8b c5 93 ff e9 da c5 Aug 26 13:08:27.545097: | responder cookie: Aug 26 13:08:27.545100: | 7c f6 50 70 32 e6 f4 ba Aug 26 13:08:27.545103: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.545106: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.545110: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:27.545112: | flags: none (0x0) Aug 26 13:08:27.545115: | Message ID: 0 (0x0) Aug 26 13:08:27.545119: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.545123: | ***emit ISAKMP Notification Payload: Aug 26 13:08:27.545126: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.545129: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.545132: | protocol ID: 1 (0x1) Aug 26 13:08:27.545135: | SPI size: 0 (0x0) Aug 26 13:08:27.545139: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:27.545143: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:27.545146: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:27.545148: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:27.545150: | emitting length of ISAKMP Message: 40 Aug 26 13:08:27.545154: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #2) Aug 26 13:08:27.545159: | d3 8b c5 93 ff e9 da c5 7c f6 50 70 32 e6 f4 ba Aug 26 13:08:27.545161: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:27.545162: | 00 00 00 01 01 00 00 0e Aug 26 13:08:27.545186: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:27.545195: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:27.545201: | stop processing: state #2 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:27.545205: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:27.545210: | spent 0.409 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:27.575587: | spent 0.00352 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:27.575615: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:27.575618: | 03 4f 6b e5 b5 cd 80 54 00 00 00 00 00 00 00 00 Aug 26 13:08:27.575620: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:27.575621: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:27.575623: | 00 00 00 14 01 01 00 00 80 02 00 13 80 03 00 13 Aug 26 13:08:27.575624: | 80 04 00 18 Aug 26 13:08:27.575628: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:27.575632: | **parse ISAKMP Message: Aug 26 13:08:27.575634: | initiator cookie: Aug 26 13:08:27.575635: | 03 4f 6b e5 b5 cd 80 54 Aug 26 13:08:27.575637: | responder cookie: Aug 26 13:08:27.575638: | 00 00 00 00 00 00 00 00 Aug 26 13:08:27.575640: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.575642: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.575644: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.575646: | flags: none (0x0) Aug 26 13:08:27.575648: | Message ID: 0 (0x0) Aug 26 13:08:27.575649: | length: 68 (0x44) Aug 26 13:08:27.575651: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:27.575654: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:27.575656: | #null state always idle Aug 26 13:08:27.575659: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:27.575661: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:27.575663: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.575664: | length: 40 (0x28) Aug 26 13:08:27.575666: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.575668: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:27.575670: | in statetime_start() with no state Aug 26 13:08:27.575674: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:27.575677: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:27.575679: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.575682: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:27.575684: | find_next_host_connection returns test Aug 26 13:08:27.575686: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.575687: | find_next_host_connection returns empty Aug 26 13:08:27.575710: | creating state object #3 at 0x55ea70a54660 Aug 26 13:08:27.575713: | State DB: adding IKEv1 state #3 in UNDEFINED Aug 26 13:08:27.575717: | pstats #3 ikev1.isakmp started Aug 26 13:08:27.575720: | #3 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:27.575724: | start processing: state #3 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:27.575727: | parent state #3: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:27.575730: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:27.575732: "test" #3: responding to Main Mode Aug 26 13:08:27.575736: | **emit ISAKMP Message: Aug 26 13:08:27.575741: | initiator cookie: Aug 26 13:08:27.575742: | 03 4f 6b e5 b5 cd 80 54 Aug 26 13:08:27.575744: | responder cookie: Aug 26 13:08:27.575746: | e8 06 7c 75 0a e9 84 57 Aug 26 13:08:27.575747: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.575749: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.575751: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.575753: | flags: none (0x0) Aug 26 13:08:27.575754: | Message ID: 0 (0x0) Aug 26 13:08:27.575756: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.575758: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:27.575760: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:27.575762: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:27.575764: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.575766: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:27.575769: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:27.575772: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:27.575775: | ****parse IPsec DOI SIT: Aug 26 13:08:27.575778: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:27.575781: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:27.575784: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.575786: | length: 28 (0x1c) Aug 26 13:08:27.575789: | proposal number: 1 (0x1) Aug 26 13:08:27.575791: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:27.575794: | SPI size: 0 (0x0) Aug 26 13:08:27.575796: | number of transforms: 1 (0x1) Aug 26 13:08:27.575799: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:27.575802: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.575804: | length: 20 (0x14) Aug 26 13:08:27.575807: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:27.575809: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:27.575812: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.575815: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:08:27.575818: | length/value: 19 (0x13) Aug 26 13:08:27.575822: "test" #3: 19?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Aug 26 13:08:27.575825: "test" #3: no acceptable Oakley Transform Aug 26 13:08:27.575828: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:27.575833: | [RE]START processing: state #3 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:27.575836: | #3 is idle Aug 26 13:08:27.575984: "test" #3: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:27.575991: | **emit ISAKMP Message: Aug 26 13:08:27.575994: | initiator cookie: Aug 26 13:08:27.575996: | 03 4f 6b e5 b5 cd 80 54 Aug 26 13:08:27.575998: | responder cookie: Aug 26 13:08:27.575999: | e8 06 7c 75 0a e9 84 57 Aug 26 13:08:27.576001: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.576003: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.576004: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:27.576006: | flags: none (0x0) Aug 26 13:08:27.576008: | Message ID: 0 (0x0) Aug 26 13:08:27.576010: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.576012: | ***emit ISAKMP Notification Payload: Aug 26 13:08:27.576014: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.576015: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.576017: | protocol ID: 1 (0x1) Aug 26 13:08:27.576019: | SPI size: 0 (0x0) Aug 26 13:08:27.576020: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:27.576023: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:27.576028: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:27.576031: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:27.576032: | emitting length of ISAKMP Message: 40 Aug 26 13:08:27.576037: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #3) Aug 26 13:08:27.576039: | 03 4f 6b e5 b5 cd 80 54 e8 06 7c 75 0a e9 84 57 Aug 26 13:08:27.576040: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:27.576042: | 00 00 00 01 01 00 00 0e Aug 26 13:08:27.576066: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:27.576075: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:27.576081: | stop processing: state #3 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:27.576084: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:27.576089: | spent 0.407 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:27.605036: | spent 0.00372 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:27.605072: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:27.605078: | 0f 5c f0 28 bc c6 5a 28 00 00 00 00 00 00 00 00 Aug 26 13:08:27.605081: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:27.605084: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:27.605086: | 00 00 00 14 01 01 00 00 80 01 00 1e 80 03 00 13 Aug 26 13:08:27.605088: | 80 04 00 18 Aug 26 13:08:27.605094: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:27.605099: | **parse ISAKMP Message: Aug 26 13:08:27.605102: | initiator cookie: Aug 26 13:08:27.605105: | 0f 5c f0 28 bc c6 5a 28 Aug 26 13:08:27.605107: | responder cookie: Aug 26 13:08:27.605110: | 00 00 00 00 00 00 00 00 Aug 26 13:08:27.605113: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.605116: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.605119: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.605122: | flags: none (0x0) Aug 26 13:08:27.605125: | Message ID: 0 (0x0) Aug 26 13:08:27.605128: | length: 68 (0x44) Aug 26 13:08:27.605131: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:27.605137: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:27.605140: | #null state always idle Aug 26 13:08:27.605144: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:27.605148: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:27.605152: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.605154: | length: 40 (0x28) Aug 26 13:08:27.605157: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.605160: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:27.605162: | in statetime_start() with no state Aug 26 13:08:27.605169: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:27.605176: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:27.605180: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.605184: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:27.605187: | find_next_host_connection returns test Aug 26 13:08:27.605190: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.605193: | find_next_host_connection returns empty Aug 26 13:08:27.605219: | creating state object #4 at 0x55ea70a55120 Aug 26 13:08:27.605223: | State DB: adding IKEv1 state #4 in UNDEFINED Aug 26 13:08:27.605230: | pstats #4 ikev1.isakmp started Aug 26 13:08:27.605236: | #4 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:27.605247: | start processing: state #4 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:27.605251: | parent state #4: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:27.605255: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:27.605259: "test" #4: responding to Main Mode Aug 26 13:08:27.605264: | **emit ISAKMP Message: Aug 26 13:08:27.605267: | initiator cookie: Aug 26 13:08:27.605270: | 0f 5c f0 28 bc c6 5a 28 Aug 26 13:08:27.605273: | responder cookie: Aug 26 13:08:27.605275: | 1e bd 38 38 d8 c4 bb 7a Aug 26 13:08:27.605278: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.605282: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.605284: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.605287: | flags: none (0x0) Aug 26 13:08:27.605302: | Message ID: 0 (0x0) Aug 26 13:08:27.605306: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.605310: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:27.605313: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:27.605316: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:27.605319: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.605322: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:27.605325: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:27.605329: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:27.605333: | ****parse IPsec DOI SIT: Aug 26 13:08:27.605336: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:27.605339: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:27.605342: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.605345: | length: 28 (0x1c) Aug 26 13:08:27.605347: | proposal number: 1 (0x1) Aug 26 13:08:27.605350: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:27.605353: | SPI size: 0 (0x0) Aug 26 13:08:27.605356: | number of transforms: 1 (0x1) Aug 26 13:08:27.605360: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:27.605363: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.605365: | length: 20 (0x14) Aug 26 13:08:27.605368: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:27.605370: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:27.605373: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.605376: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:27.605379: | length/value: 30 (0x1e) Aug 26 13:08:27.605384: "test" #4: 30?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:27.605387: "test" #4: no acceptable Oakley Transform Aug 26 13:08:27.605390: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:27.605396: | [RE]START processing: state #4 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:27.605399: | #4 is idle Aug 26 13:08:27.605990: "test" #4: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:27.605999: | **emit ISAKMP Message: Aug 26 13:08:27.606003: | initiator cookie: Aug 26 13:08:27.606005: | 0f 5c f0 28 bc c6 5a 28 Aug 26 13:08:27.606008: | responder cookie: Aug 26 13:08:27.606010: | 1e bd 38 38 d8 c4 bb 7a Aug 26 13:08:27.606013: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.606016: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.606019: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:27.606021: | flags: none (0x0) Aug 26 13:08:27.606024: | Message ID: 0 (0x0) Aug 26 13:08:27.606027: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.606030: | ***emit ISAKMP Notification Payload: Aug 26 13:08:27.606036: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.606039: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.606042: | protocol ID: 1 (0x1) Aug 26 13:08:27.606044: | SPI size: 0 (0x0) Aug 26 13:08:27.606047: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:27.606050: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:27.606054: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:27.606057: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:27.606060: | emitting length of ISAKMP Message: 40 Aug 26 13:08:27.606067: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #4) Aug 26 13:08:27.606070: | 0f 5c f0 28 bc c6 5a 28 1e bd 38 38 d8 c4 bb 7a Aug 26 13:08:27.606072: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:27.606075: | 00 00 00 01 01 00 00 0e Aug 26 13:08:27.606111: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:27.606118: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:27.606123: | stop processing: state #4 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:27.606127: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:27.606134: | spent 0.534 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:27.638672: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:27.638703: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:27.638709: | 2e 0c 8d 8a f0 3b b7 02 00 00 00 00 00 00 00 00 Aug 26 13:08:27.638713: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:27.638715: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:27.638718: | 00 00 00 14 01 01 00 00 80 01 00 1e 80 02 00 13 Aug 26 13:08:27.638720: | 80 04 00 18 Aug 26 13:08:27.638725: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:27.638729: | **parse ISAKMP Message: Aug 26 13:08:27.638732: | initiator cookie: Aug 26 13:08:27.638734: | 2e 0c 8d 8a f0 3b b7 02 Aug 26 13:08:27.638737: | responder cookie: Aug 26 13:08:27.638739: | 00 00 00 00 00 00 00 00 Aug 26 13:08:27.638742: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.638745: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.638747: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.638750: | flags: none (0x0) Aug 26 13:08:27.638752: | Message ID: 0 (0x0) Aug 26 13:08:27.638755: | length: 68 (0x44) Aug 26 13:08:27.638758: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:27.638763: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:27.638767: | #null state always idle Aug 26 13:08:27.638774: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:27.638778: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:27.638781: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.638783: | length: 40 (0x28) Aug 26 13:08:27.638786: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.638790: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:27.638793: | in statetime_start() with no state Aug 26 13:08:27.638799: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:27.638804: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:27.638808: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.638812: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:27.638815: | find_next_host_connection returns test Aug 26 13:08:27.638817: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.638824: | find_next_host_connection returns empty Aug 26 13:08:27.638855: | creating state object #5 at 0x55ea70a55be0 Aug 26 13:08:27.638860: | State DB: adding IKEv1 state #5 in UNDEFINED Aug 26 13:08:27.638866: | pstats #5 ikev1.isakmp started Aug 26 13:08:27.638870: | #5 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:27.638877: | start processing: state #5 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:27.638881: | parent state #5: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:27.638884: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:27.638887: "test" #5: responding to Main Mode Aug 26 13:08:27.638893: | **emit ISAKMP Message: Aug 26 13:08:27.638895: | initiator cookie: Aug 26 13:08:27.638898: | 2e 0c 8d 8a f0 3b b7 02 Aug 26 13:08:27.638900: | responder cookie: Aug 26 13:08:27.638902: | a4 26 ef 68 24 f7 78 ce Aug 26 13:08:27.638904: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.638907: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.638910: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.638912: | flags: none (0x0) Aug 26 13:08:27.638915: | Message ID: 0 (0x0) Aug 26 13:08:27.638917: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.638921: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:27.638924: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:27.638926: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:27.638929: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.638932: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:27.638935: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:27.638938: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:27.638942: | ****parse IPsec DOI SIT: Aug 26 13:08:27.638945: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:27.638949: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:27.638951: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.638954: | length: 28 (0x1c) Aug 26 13:08:27.638957: | proposal number: 1 (0x1) Aug 26 13:08:27.638960: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:27.638962: | SPI size: 0 (0x0) Aug 26 13:08:27.638965: | number of transforms: 1 (0x1) Aug 26 13:08:27.638968: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:27.638971: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.638974: | length: 20 (0x14) Aug 26 13:08:27.638976: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:27.638979: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:27.638982: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.638985: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:27.638988: | length/value: 30 (0x1e) Aug 26 13:08:27.638993: "test" #5: 30?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:27.638996: "test" #5: no acceptable Oakley Transform Aug 26 13:08:27.639000: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:27.639004: | [RE]START processing: state #5 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:27.639007: | #5 is idle Aug 26 13:08:27.639483: "test" #5: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:27.639494: | **emit ISAKMP Message: Aug 26 13:08:27.639497: | initiator cookie: Aug 26 13:08:27.639500: | 2e 0c 8d 8a f0 3b b7 02 Aug 26 13:08:27.639502: | responder cookie: Aug 26 13:08:27.639504: | a4 26 ef 68 24 f7 78 ce Aug 26 13:08:27.639506: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.639511: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.639514: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:27.639517: | flags: none (0x0) Aug 26 13:08:27.639519: | Message ID: 0 (0x0) Aug 26 13:08:27.639522: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.639526: | ***emit ISAKMP Notification Payload: Aug 26 13:08:27.639529: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.639532: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.639534: | protocol ID: 1 (0x1) Aug 26 13:08:27.639537: | SPI size: 0 (0x0) Aug 26 13:08:27.639540: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:27.639543: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:27.639546: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:27.639549: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:27.639552: | emitting length of ISAKMP Message: 40 Aug 26 13:08:27.639559: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #5) Aug 26 13:08:27.639562: | 2e 0c 8d 8a f0 3b b7 02 a4 26 ef 68 24 f7 78 ce Aug 26 13:08:27.639565: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:27.639567: | 00 00 00 01 01 00 00 0e Aug 26 13:08:27.639602: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:27.639610: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:27.639615: | stop processing: state #5 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:27.639618: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:27.639624: | spent 0.908 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:27.667701: | spent 0.00364 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:27.667731: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:27.667736: | 03 d9 43 28 a5 c7 63 29 00 00 00 00 00 00 00 00 Aug 26 13:08:27.667739: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:27.667742: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:27.667745: | 00 00 00 14 01 01 00 00 80 01 00 1e 80 02 00 13 Aug 26 13:08:27.667747: | 80 03 00 13 Aug 26 13:08:27.667753: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:27.667758: | **parse ISAKMP Message: Aug 26 13:08:27.667761: | initiator cookie: Aug 26 13:08:27.667763: | 03 d9 43 28 a5 c7 63 29 Aug 26 13:08:27.667766: | responder cookie: Aug 26 13:08:27.667769: | 00 00 00 00 00 00 00 00 Aug 26 13:08:27.667772: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.667775: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.667778: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.667781: | flags: none (0x0) Aug 26 13:08:27.667783: | Message ID: 0 (0x0) Aug 26 13:08:27.667786: | length: 68 (0x44) Aug 26 13:08:27.667789: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:27.667794: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:27.667796: | #null state always idle Aug 26 13:08:27.667800: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:27.667803: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:27.667806: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.667809: | length: 40 (0x28) Aug 26 13:08:27.667812: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.667815: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:27.667818: | in statetime_start() with no state Aug 26 13:08:27.667824: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:27.667834: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:27.667837: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.667841: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:27.667844: | find_next_host_connection returns test Aug 26 13:08:27.667846: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.667849: | find_next_host_connection returns empty Aug 26 13:08:27.667875: | creating state object #6 at 0x55ea70a566a0 Aug 26 13:08:27.667878: | State DB: adding IKEv1 state #6 in UNDEFINED Aug 26 13:08:27.667883: | pstats #6 ikev1.isakmp started Aug 26 13:08:27.667887: | #6 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:27.667894: | start processing: state #6 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:27.667897: | parent state #6: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:27.667901: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:27.667904: "test" #6: responding to Main Mode Aug 26 13:08:27.667909: | **emit ISAKMP Message: Aug 26 13:08:27.667911: | initiator cookie: Aug 26 13:08:27.667914: | 03 d9 43 28 a5 c7 63 29 Aug 26 13:08:27.667917: | responder cookie: Aug 26 13:08:27.667919: | e4 2d 7d 46 b8 a9 8c c0 Aug 26 13:08:27.667922: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.667925: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.667927: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.667930: | flags: none (0x0) Aug 26 13:08:27.667933: | Message ID: 0 (0x0) Aug 26 13:08:27.667936: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.667939: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:27.667942: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:27.667945: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:27.667947: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.667950: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:27.667953: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:27.667957: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:27.667960: | ****parse IPsec DOI SIT: Aug 26 13:08:27.667963: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:27.667966: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:27.667969: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.667971: | length: 28 (0x1c) Aug 26 13:08:27.667974: | proposal number: 1 (0x1) Aug 26 13:08:27.667976: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:27.667979: | SPI size: 0 (0x0) Aug 26 13:08:27.667982: | number of transforms: 1 (0x1) Aug 26 13:08:27.667985: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:27.667988: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.667990: | length: 20 (0x14) Aug 26 13:08:27.667993: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:27.667995: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:27.667998: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.668001: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:27.668004: | length/value: 30 (0x1e) Aug 26 13:08:27.668008: "test" #6: 30?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:27.668011: "test" #6: no acceptable Oakley Transform Aug 26 13:08:27.668014: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:27.668019: | [RE]START processing: state #6 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:27.668022: | #6 is idle Aug 26 13:08:27.668212: "test" #6: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:27.668220: | **emit ISAKMP Message: Aug 26 13:08:27.668223: | initiator cookie: Aug 26 13:08:27.668226: | 03 d9 43 28 a5 c7 63 29 Aug 26 13:08:27.668228: | responder cookie: Aug 26 13:08:27.668231: | e4 2d 7d 46 b8 a9 8c c0 Aug 26 13:08:27.668233: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.668236: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.668239: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:27.668241: | flags: none (0x0) Aug 26 13:08:27.668244: | Message ID: 0 (0x0) Aug 26 13:08:27.668247: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.668250: | ***emit ISAKMP Notification Payload: Aug 26 13:08:27.668253: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.668255: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.668258: | protocol ID: 1 (0x1) Aug 26 13:08:27.668260: | SPI size: 0 (0x0) Aug 26 13:08:27.668263: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:27.668267: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:27.668270: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:27.668273: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:27.668275: | emitting length of ISAKMP Message: 40 Aug 26 13:08:27.668282: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #6) Aug 26 13:08:27.668285: | 03 d9 43 28 a5 c7 63 29 e4 2d 7d 46 b8 a9 8c c0 Aug 26 13:08:27.668292: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:27.668297: | 00 00 00 01 01 00 00 0e Aug 26 13:08:27.668323: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:27.668329: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:27.668334: | stop processing: state #6 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:27.668338: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:27.668343: | spent 0.499 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:27.698107: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:27.698142: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:27.698147: | 56 e0 0b 50 50 32 6e 47 00 00 00 00 00 00 00 00 Aug 26 13:08:27.698150: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 13:08:27.698152: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 13:08:27.698155: | 00 00 00 18 01 01 00 00 80 01 00 1e 80 02 00 02 Aug 26 13:08:27.698157: | 80 03 00 05 80 04 00 08 Aug 26 13:08:27.698162: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:27.698167: | **parse ISAKMP Message: Aug 26 13:08:27.698171: | initiator cookie: Aug 26 13:08:27.698173: | 56 e0 0b 50 50 32 6e 47 Aug 26 13:08:27.698176: | responder cookie: Aug 26 13:08:27.698178: | 00 00 00 00 00 00 00 00 Aug 26 13:08:27.698181: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.698184: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.698187: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.698189: | flags: none (0x0) Aug 26 13:08:27.698192: | Message ID: 0 (0x0) Aug 26 13:08:27.698195: | length: 72 (0x48) Aug 26 13:08:27.698198: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:27.698202: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:27.698205: | #null state always idle Aug 26 13:08:27.698208: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:27.698211: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:27.698214: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.698221: | length: 44 (0x2c) Aug 26 13:08:27.698223: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.698226: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:27.698229: | in statetime_start() with no state Aug 26 13:08:27.698235: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:27.698241: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:27.698244: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.698249: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:27.698251: | find_next_host_connection returns test Aug 26 13:08:27.698254: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.698256: | find_next_host_connection returns empty Aug 26 13:08:27.698282: | creating state object #7 at 0x55ea70a57160 Aug 26 13:08:27.698286: | State DB: adding IKEv1 state #7 in UNDEFINED Aug 26 13:08:27.698296: | pstats #7 ikev1.isakmp started Aug 26 13:08:27.698304: | #7 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:27.698310: | start processing: state #7 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:27.698314: | parent state #7: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:27.698318: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:27.698322: "test" #7: responding to Main Mode Aug 26 13:08:27.698327: | **emit ISAKMP Message: Aug 26 13:08:27.698330: | initiator cookie: Aug 26 13:08:27.698332: | 56 e0 0b 50 50 32 6e 47 Aug 26 13:08:27.698335: | responder cookie: Aug 26 13:08:27.698338: | bd c1 8d 1b 9d 6b a9 4e Aug 26 13:08:27.698340: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.698343: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.698345: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.698348: | flags: none (0x0) Aug 26 13:08:27.698350: | Message ID: 0 (0x0) Aug 26 13:08:27.698353: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.698356: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:27.698359: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:27.698362: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:27.698365: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.698368: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:27.698371: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:27.698374: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:27.698377: | ****parse IPsec DOI SIT: Aug 26 13:08:27.698380: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:27.698383: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:27.698386: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.698388: | length: 32 (0x20) Aug 26 13:08:27.698391: | proposal number: 1 (0x1) Aug 26 13:08:27.698394: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:27.698396: | SPI size: 0 (0x0) Aug 26 13:08:27.698398: | number of transforms: 1 (0x1) Aug 26 13:08:27.698401: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:27.698404: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.698406: | length: 24 (0x18) Aug 26 13:08:27.698408: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:27.698411: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:27.698414: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.698417: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:27.698419: | length/value: 30 (0x1e) Aug 26 13:08:27.698424: "test" #7: 30?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:27.698430: "test" #7: no acceptable Oakley Transform Aug 26 13:08:27.698433: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:27.698438: | [RE]START processing: state #7 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:27.698441: | #7 is idle Aug 26 13:08:27.698535: "test" #7: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:27.698541: | **emit ISAKMP Message: Aug 26 13:08:27.698543: | initiator cookie: Aug 26 13:08:27.698545: | 56 e0 0b 50 50 32 6e 47 Aug 26 13:08:27.698548: | responder cookie: Aug 26 13:08:27.698550: | bd c1 8d 1b 9d 6b a9 4e Aug 26 13:08:27.698553: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.698555: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.698558: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:27.698561: | flags: none (0x0) Aug 26 13:08:27.698563: | Message ID: 0 (0x0) Aug 26 13:08:27.698566: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.698569: | ***emit ISAKMP Notification Payload: Aug 26 13:08:27.698572: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.698574: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.698577: | protocol ID: 1 (0x1) Aug 26 13:08:27.698579: | SPI size: 0 (0x0) Aug 26 13:08:27.698582: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:27.698584: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:27.698587: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:27.698590: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:27.698593: | emitting length of ISAKMP Message: 40 Aug 26 13:08:27.698600: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #7) Aug 26 13:08:27.698604: | 56 e0 0b 50 50 32 6e 47 bd c1 8d 1b 9d 6b a9 4e Aug 26 13:08:27.698606: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:27.698609: | 00 00 00 01 01 00 00 0e Aug 26 13:08:27.698641: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:27.698648: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:27.698653: | stop processing: state #7 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:27.698656: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:27.698662: | spent 0.506 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:27.729423: | spent 0.00401 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:27.729454: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:27.729460: | c1 2d da a3 e4 35 9c 00 00 00 00 00 00 00 00 00 Aug 26 13:08:27.729463: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:27.729466: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:27.729469: | 00 00 00 14 01 01 00 00 80 02 00 02 80 03 00 05 Aug 26 13:08:27.729472: | 80 04 00 08 Aug 26 13:08:27.729477: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:27.729482: | **parse ISAKMP Message: Aug 26 13:08:27.729486: | initiator cookie: Aug 26 13:08:27.729489: | c1 2d da a3 e4 35 9c 00 Aug 26 13:08:27.729492: | responder cookie: Aug 26 13:08:27.729494: | 00 00 00 00 00 00 00 00 Aug 26 13:08:27.729497: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.729501: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.729504: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.729507: | flags: none (0x0) Aug 26 13:08:27.729510: | Message ID: 0 (0x0) Aug 26 13:08:27.729513: | length: 68 (0x44) Aug 26 13:08:27.729521: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:27.729527: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:27.729531: | #null state always idle Aug 26 13:08:27.729534: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:27.729538: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:27.729541: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.729543: | length: 40 (0x28) Aug 26 13:08:27.729546: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.729549: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:27.729552: | in statetime_start() with no state Aug 26 13:08:27.729559: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:27.729565: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:27.729568: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.729573: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:27.729576: | find_next_host_connection returns test Aug 26 13:08:27.729579: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.729581: | find_next_host_connection returns empty Aug 26 13:08:27.729612: | creating state object #8 at 0x55ea70a57c20 Aug 26 13:08:27.729616: | State DB: adding IKEv1 state #8 in UNDEFINED Aug 26 13:08:27.729621: | pstats #8 ikev1.isakmp started Aug 26 13:08:27.729627: | #8 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:27.729633: | start processing: state #8 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:27.729638: | parent state #8: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:27.729642: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:27.729645: "test" #8: responding to Main Mode Aug 26 13:08:27.729651: | **emit ISAKMP Message: Aug 26 13:08:27.729654: | initiator cookie: Aug 26 13:08:27.729656: | c1 2d da a3 e4 35 9c 00 Aug 26 13:08:27.729659: | responder cookie: Aug 26 13:08:27.729662: | 95 16 67 86 d4 6a 79 ef Aug 26 13:08:27.729665: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.729668: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.729670: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.729673: | flags: none (0x0) Aug 26 13:08:27.729676: | Message ID: 0 (0x0) Aug 26 13:08:27.729679: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.729683: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:27.729686: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:27.729689: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:27.729692: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.729695: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:27.729698: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:27.729701: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:27.729705: | ****parse IPsec DOI SIT: Aug 26 13:08:27.729707: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:27.729710: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:27.729713: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.729716: | length: 28 (0x1c) Aug 26 13:08:27.729718: | proposal number: 1 (0x1) Aug 26 13:08:27.729721: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:27.729723: | SPI size: 0 (0x0) Aug 26 13:08:27.729726: | number of transforms: 1 (0x1) Aug 26 13:08:27.729729: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:27.729732: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.729737: | length: 20 (0x14) Aug 26 13:08:27.729740: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:27.729742: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:27.729745: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.729748: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:08:27.729751: | length/value: 2 (0x2) Aug 26 13:08:27.729754: | [2 is OAKLEY_SHA1] Aug 26 13:08:27.729757: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.729760: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:08:27.729762: | length/value: 5 (0x5) Aug 26 13:08:27.729765: | [5 is OAKLEY_RSA_REVISED_MODE] Aug 26 13:08:27.729769: "test" #8: Pluto does not support OAKLEY_RSA_REVISED_MODE authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Aug 26 13:08:27.729772: "test" #8: no acceptable Oakley Transform Aug 26 13:08:27.729775: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:27.729781: | [RE]START processing: state #8 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:27.729783: | #8 is idle Aug 26 13:08:27.731321: "test" #8: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:27.731333: | **emit ISAKMP Message: Aug 26 13:08:27.731337: | initiator cookie: Aug 26 13:08:27.731339: | c1 2d da a3 e4 35 9c 00 Aug 26 13:08:27.731342: | responder cookie: Aug 26 13:08:27.731344: | 95 16 67 86 d4 6a 79 ef Aug 26 13:08:27.731347: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.731350: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.731353: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:27.731356: | flags: none (0x0) Aug 26 13:08:27.731359: | Message ID: 0 (0x0) Aug 26 13:08:27.731362: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.731365: | ***emit ISAKMP Notification Payload: Aug 26 13:08:27.731368: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.731370: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.731373: | protocol ID: 1 (0x1) Aug 26 13:08:27.731376: | SPI size: 0 (0x0) Aug 26 13:08:27.731378: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:27.731381: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:27.731385: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:27.731388: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:27.731390: | emitting length of ISAKMP Message: 40 Aug 26 13:08:27.731397: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #8) Aug 26 13:08:27.731400: | c1 2d da a3 e4 35 9c 00 95 16 67 86 d4 6a 79 ef Aug 26 13:08:27.731403: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:27.731405: | 00 00 00 01 01 00 00 0e Aug 26 13:08:27.731443: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:27.731449: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:27.731455: | stop processing: state #8 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:27.731458: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:27.731465: | spent 0.54 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:27.764093: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:27.764120: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:27.764125: | cc 12 55 02 1e eb 06 b8 00 00 00 00 00 00 00 00 Aug 26 13:08:27.764128: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:27.764130: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:27.764133: | 00 00 00 14 01 01 00 00 80 01 00 1e 80 03 00 05 Aug 26 13:08:27.764135: | 80 04 00 08 Aug 26 13:08:27.764143: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:27.764148: | **parse ISAKMP Message: Aug 26 13:08:27.764151: | initiator cookie: Aug 26 13:08:27.764153: | cc 12 55 02 1e eb 06 b8 Aug 26 13:08:27.764156: | responder cookie: Aug 26 13:08:27.764159: | 00 00 00 00 00 00 00 00 Aug 26 13:08:27.764162: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.764165: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.764168: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.764171: | flags: none (0x0) Aug 26 13:08:27.764173: | Message ID: 0 (0x0) Aug 26 13:08:27.764176: | length: 68 (0x44) Aug 26 13:08:27.764179: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:27.764183: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:27.764186: | #null state always idle Aug 26 13:08:27.764190: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:27.764194: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:27.764196: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.764199: | length: 40 (0x28) Aug 26 13:08:27.764202: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.764205: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:27.764208: | in statetime_start() with no state Aug 26 13:08:27.764214: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:27.764220: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:27.764223: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.764227: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:27.764229: | find_next_host_connection returns test Aug 26 13:08:27.764232: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.764234: | find_next_host_connection returns empty Aug 26 13:08:27.764253: | creating state object #9 at 0x55ea70a586e0 Aug 26 13:08:27.764258: | State DB: adding IKEv1 state #9 in UNDEFINED Aug 26 13:08:27.764264: | pstats #9 ikev1.isakmp started Aug 26 13:08:27.764270: | #9 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:27.764276: | start processing: state #9 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:27.764280: | parent state #9: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:27.764284: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:27.764287: "test" #9: responding to Main Mode Aug 26 13:08:27.764300: | **emit ISAKMP Message: Aug 26 13:08:27.764303: | initiator cookie: Aug 26 13:08:27.764305: | cc 12 55 02 1e eb 06 b8 Aug 26 13:08:27.764308: | responder cookie: Aug 26 13:08:27.764310: | d8 03 fc 30 62 4d 36 60 Aug 26 13:08:27.764313: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.764316: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.764319: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.764322: | flags: none (0x0) Aug 26 13:08:27.764324: | Message ID: 0 (0x0) Aug 26 13:08:27.764328: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.764331: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:27.764334: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:27.764337: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:27.764339: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.764343: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:27.764346: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:27.764349: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:27.764355: | ****parse IPsec DOI SIT: Aug 26 13:08:27.764358: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:27.764361: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:27.764364: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.764367: | length: 28 (0x1c) Aug 26 13:08:27.764370: | proposal number: 1 (0x1) Aug 26 13:08:27.764372: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:27.764375: | SPI size: 0 (0x0) Aug 26 13:08:27.764377: | number of transforms: 1 (0x1) Aug 26 13:08:27.764381: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:27.764383: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.764386: | length: 20 (0x14) Aug 26 13:08:27.764388: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:27.764391: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:27.764394: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.764397: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:27.764400: | length/value: 30 (0x1e) Aug 26 13:08:27.764404: "test" #9: 30?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:27.764408: "test" #9: no acceptable Oakley Transform Aug 26 13:08:27.764411: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:27.764416: | [RE]START processing: state #9 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:27.764419: | #9 is idle Aug 26 13:08:27.764482: "test" #9: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:27.764487: | **emit ISAKMP Message: Aug 26 13:08:27.764490: | initiator cookie: Aug 26 13:08:27.764493: | cc 12 55 02 1e eb 06 b8 Aug 26 13:08:27.764496: | responder cookie: Aug 26 13:08:27.764498: | d8 03 fc 30 62 4d 36 60 Aug 26 13:08:27.764501: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.764504: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.764507: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:27.764509: | flags: none (0x0) Aug 26 13:08:27.764512: | Message ID: 0 (0x0) Aug 26 13:08:27.764515: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.764518: | ***emit ISAKMP Notification Payload: Aug 26 13:08:27.764521: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.764524: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.764526: | protocol ID: 1 (0x1) Aug 26 13:08:27.764529: | SPI size: 0 (0x0) Aug 26 13:08:27.764532: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:27.764535: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:27.764539: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:27.764542: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:27.764545: | emitting length of ISAKMP Message: 40 Aug 26 13:08:27.764552: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #9) Aug 26 13:08:27.764555: | cc 12 55 02 1e eb 06 b8 d8 03 fc 30 62 4d 36 60 Aug 26 13:08:27.764558: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:27.764560: | 00 00 00 01 01 00 00 0e Aug 26 13:08:27.764584: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:27.764590: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:27.764596: | stop processing: state #9 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:27.764600: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:27.764605: | spent 0.482 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:27.797495: | spent 0.0033 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:27.797535: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:27.797541: | 66 95 a0 4c 1f 5c 4a 10 00 00 00 00 00 00 00 00 Aug 26 13:08:27.797544: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:27.797547: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:27.797549: | 00 00 00 14 01 01 00 00 80 01 00 1e 80 02 00 02 Aug 26 13:08:27.797552: | 80 04 00 08 Aug 26 13:08:27.797557: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:27.797562: | **parse ISAKMP Message: Aug 26 13:08:27.797565: | initiator cookie: Aug 26 13:08:27.797568: | 66 95 a0 4c 1f 5c 4a 10 Aug 26 13:08:27.797571: | responder cookie: Aug 26 13:08:27.797574: | 00 00 00 00 00 00 00 00 Aug 26 13:08:27.797577: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.797580: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.797584: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.797587: | flags: none (0x0) Aug 26 13:08:27.797589: | Message ID: 0 (0x0) Aug 26 13:08:27.797592: | length: 68 (0x44) Aug 26 13:08:27.797596: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:27.797600: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:27.797603: | #null state always idle Aug 26 13:08:27.797607: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:27.797611: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:27.797614: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.797616: | length: 40 (0x28) Aug 26 13:08:27.797619: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.797622: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:27.797626: | in statetime_start() with no state Aug 26 13:08:27.797632: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:27.797638: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:27.797642: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.797646: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:27.797649: | find_next_host_connection returns test Aug 26 13:08:27.797652: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.797654: | find_next_host_connection returns empty Aug 26 13:08:27.797677: | creating state object #10 at 0x55ea70a591a0 Aug 26 13:08:27.797682: | State DB: adding IKEv1 state #10 in UNDEFINED Aug 26 13:08:27.797690: | pstats #10 ikev1.isakmp started Aug 26 13:08:27.797696: | #10 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:27.797703: | start processing: state #10 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:27.797707: | parent state #10: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:27.797711: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:27.797715: "test" #10: responding to Main Mode Aug 26 13:08:27.797720: | **emit ISAKMP Message: Aug 26 13:08:27.797723: | initiator cookie: Aug 26 13:08:27.797725: | 66 95 a0 4c 1f 5c 4a 10 Aug 26 13:08:27.797728: | responder cookie: Aug 26 13:08:27.797731: | 81 ca 89 17 cf 0c 78 4f Aug 26 13:08:27.797734: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.797737: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.797739: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.797742: | flags: none (0x0) Aug 26 13:08:27.797745: | Message ID: 0 (0x0) Aug 26 13:08:27.797748: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.797751: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:27.797755: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:27.797757: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:27.797762: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.797765: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:27.797769: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:27.797772: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:27.797776: | ****parse IPsec DOI SIT: Aug 26 13:08:27.797779: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:27.797782: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:27.797785: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.797787: | length: 28 (0x1c) Aug 26 13:08:27.797790: | proposal number: 1 (0x1) Aug 26 13:08:27.797793: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:27.797795: | SPI size: 0 (0x0) Aug 26 13:08:27.797798: | number of transforms: 1 (0x1) Aug 26 13:08:27.797801: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:27.797804: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.797806: | length: 20 (0x14) Aug 26 13:08:27.797809: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:27.797812: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:27.797815: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.797818: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:27.797821: | length/value: 30 (0x1e) Aug 26 13:08:27.797825: "test" #10: 30?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:27.797828: "test" #10: no acceptable Oakley Transform Aug 26 13:08:27.797832: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:27.797837: | [RE]START processing: state #10 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:27.797840: | #10 is idle Aug 26 13:08:27.797908: "test" #10: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:27.797912: | **emit ISAKMP Message: Aug 26 13:08:27.797915: | initiator cookie: Aug 26 13:08:27.797918: | 66 95 a0 4c 1f 5c 4a 10 Aug 26 13:08:27.797920: | responder cookie: Aug 26 13:08:27.797923: | 81 ca 89 17 cf 0c 78 4f Aug 26 13:08:27.797926: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.797928: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.797931: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:27.797934: | flags: none (0x0) Aug 26 13:08:27.797937: | Message ID: 0 (0x0) Aug 26 13:08:27.797939: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.797943: | ***emit ISAKMP Notification Payload: Aug 26 13:08:27.797946: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.797948: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.797951: | protocol ID: 1 (0x1) Aug 26 13:08:27.797953: | SPI size: 0 (0x0) Aug 26 13:08:27.797956: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:27.797960: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:27.797963: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:27.797967: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:27.797969: | emitting length of ISAKMP Message: 40 Aug 26 13:08:27.797976: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #10) Aug 26 13:08:27.797979: | 66 95 a0 4c 1f 5c 4a 10 81 ca 89 17 cf 0c 78 4f Aug 26 13:08:27.797982: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:27.797984: | 00 00 00 01 01 00 00 0e Aug 26 13:08:27.798015: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:27.798021: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:27.798026: | stop processing: state #10 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:27.798032: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:27.798037: | spent 0.499 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:27.830907: | spent 0.00362 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:27.830934: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:27.830940: | c2 c3 bc 31 85 23 34 15 00 00 00 00 00 00 00 00 Aug 26 13:08:27.830943: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:27.830945: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:27.830948: | 00 00 00 14 01 01 00 00 80 01 00 1e 80 02 00 02 Aug 26 13:08:27.830951: | 80 03 00 05 Aug 26 13:08:27.830956: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:27.830961: | **parse ISAKMP Message: Aug 26 13:08:27.830964: | initiator cookie: Aug 26 13:08:27.830967: | c2 c3 bc 31 85 23 34 15 Aug 26 13:08:27.830969: | responder cookie: Aug 26 13:08:27.830972: | 00 00 00 00 00 00 00 00 Aug 26 13:08:27.830975: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.830978: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.830981: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.830984: | flags: none (0x0) Aug 26 13:08:27.830987: | Message ID: 0 (0x0) Aug 26 13:08:27.830990: | length: 68 (0x44) Aug 26 13:08:27.830993: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:27.830997: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:27.831000: | #null state always idle Aug 26 13:08:27.831004: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:27.831008: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:27.831010: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.831013: | length: 40 (0x28) Aug 26 13:08:27.831015: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.831018: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:27.831021: | in statetime_start() with no state Aug 26 13:08:27.831027: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:27.831033: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:27.831037: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.831041: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:27.831044: | find_next_host_connection returns test Aug 26 13:08:27.831046: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.831049: | find_next_host_connection returns empty Aug 26 13:08:27.831072: | creating state object #11 at 0x55ea70a59c60 Aug 26 13:08:27.831076: | State DB: adding IKEv1 state #11 in UNDEFINED Aug 26 13:08:27.831081: | pstats #11 ikev1.isakmp started Aug 26 13:08:27.831086: | #11 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:27.831092: | start processing: state #11 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:27.831096: | parent state #11: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:27.831100: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:27.831103: "test" #11: responding to Main Mode Aug 26 13:08:27.831109: | **emit ISAKMP Message: Aug 26 13:08:27.831112: | initiator cookie: Aug 26 13:08:27.831115: | c2 c3 bc 31 85 23 34 15 Aug 26 13:08:27.831117: | responder cookie: Aug 26 13:08:27.831120: | 89 b6 ea 88 dc 2f 8e 51 Aug 26 13:08:27.831123: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.831125: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.831128: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.831131: | flags: none (0x0) Aug 26 13:08:27.831136: | Message ID: 0 (0x0) Aug 26 13:08:27.831140: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.831143: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:27.831146: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:27.831149: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:27.831152: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.831155: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:27.831158: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:27.831161: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:27.831165: | ****parse IPsec DOI SIT: Aug 26 13:08:27.831167: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:27.831170: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:27.831173: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.831175: | length: 28 (0x1c) Aug 26 13:08:27.831178: | proposal number: 1 (0x1) Aug 26 13:08:27.831181: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:27.831183: | SPI size: 0 (0x0) Aug 26 13:08:27.831186: | number of transforms: 1 (0x1) Aug 26 13:08:27.831189: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:27.831191: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.831194: | length: 20 (0x14) Aug 26 13:08:27.831197: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:27.831199: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:27.831202: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.831205: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:27.831208: | length/value: 30 (0x1e) Aug 26 13:08:27.831213: "test" #11: 30?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:27.831216: "test" #11: no acceptable Oakley Transform Aug 26 13:08:27.831219: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:27.831224: | [RE]START processing: state #11 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:27.831227: | #11 is idle Aug 26 13:08:27.831333: "test" #11: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:27.831342: | **emit ISAKMP Message: Aug 26 13:08:27.831346: | initiator cookie: Aug 26 13:08:27.831348: | c2 c3 bc 31 85 23 34 15 Aug 26 13:08:27.831351: | responder cookie: Aug 26 13:08:27.831354: | 89 b6 ea 88 dc 2f 8e 51 Aug 26 13:08:27.831357: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.831360: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.831363: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:27.831365: | flags: none (0x0) Aug 26 13:08:27.831368: | Message ID: 0 (0x0) Aug 26 13:08:27.831371: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.831375: | ***emit ISAKMP Notification Payload: Aug 26 13:08:27.831378: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.831381: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.831383: | protocol ID: 1 (0x1) Aug 26 13:08:27.831386: | SPI size: 0 (0x0) Aug 26 13:08:27.831389: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:27.831392: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:27.831395: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:27.831398: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:27.831401: | emitting length of ISAKMP Message: 40 Aug 26 13:08:27.831407: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #11) Aug 26 13:08:27.831412: | c2 c3 bc 31 85 23 34 15 89 b6 ea 88 dc 2f 8e 51 Aug 26 13:08:27.831415: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:27.831417: | 00 00 00 01 01 00 00 0e Aug 26 13:08:27.831444: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:27.831450: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:27.831455: | stop processing: state #11 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:27.831459: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:27.831464: | spent 0.506 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:27.867236: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:27.867268: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:27.867272: | 49 95 2d 99 33 96 10 48 00 00 00 00 00 00 00 00 Aug 26 13:08:27.867275: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 13:08:27.867277: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 13:08:27.867280: | 00 00 00 18 01 01 00 00 80 01 00 01 80 02 00 06 Aug 26 13:08:27.867282: | 80 03 00 11 80 04 00 1c Aug 26 13:08:27.867287: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:27.867297: | **parse ISAKMP Message: Aug 26 13:08:27.867301: | initiator cookie: Aug 26 13:08:27.867303: | 49 95 2d 99 33 96 10 48 Aug 26 13:08:27.867305: | responder cookie: Aug 26 13:08:27.867308: | 00 00 00 00 00 00 00 00 Aug 26 13:08:27.867311: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.867314: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.867317: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.867320: | flags: none (0x0) Aug 26 13:08:27.867322: | Message ID: 0 (0x0) Aug 26 13:08:27.867325: | length: 72 (0x48) Aug 26 13:08:27.867329: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:27.867333: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:27.867335: | #null state always idle Aug 26 13:08:27.867339: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:27.867343: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:27.867346: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.867348: | length: 44 (0x2c) Aug 26 13:08:27.867351: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.867354: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:27.867357: | in statetime_start() with no state Aug 26 13:08:27.867363: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:27.867369: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:27.867372: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.867375: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:27.867378: | find_next_host_connection returns test Aug 26 13:08:27.867381: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.867383: | find_next_host_connection returns empty Aug 26 13:08:27.867410: | creating state object #12 at 0x55ea70a5a720 Aug 26 13:08:27.867413: | State DB: adding IKEv1 state #12 in UNDEFINED Aug 26 13:08:27.867418: | pstats #12 ikev1.isakmp started Aug 26 13:08:27.867423: | #12 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:27.867429: | start processing: state #12 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:27.867432: | parent state #12: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:27.867436: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:27.867440: "test" #12: responding to Main Mode Aug 26 13:08:27.867445: | **emit ISAKMP Message: Aug 26 13:08:27.867447: | initiator cookie: Aug 26 13:08:27.867453: | 49 95 2d 99 33 96 10 48 Aug 26 13:08:27.867456: | responder cookie: Aug 26 13:08:27.867458: | 18 15 40 a5 5d c0 d0 8f Aug 26 13:08:27.867461: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.867464: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.867466: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.867469: | flags: none (0x0) Aug 26 13:08:27.867472: | Message ID: 0 (0x0) Aug 26 13:08:27.867475: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.867478: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:27.867481: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:27.867484: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:27.867486: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.867489: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:27.867493: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:27.867496: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:27.867499: | ****parse IPsec DOI SIT: Aug 26 13:08:27.867502: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:27.867505: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:27.867508: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.867510: | length: 32 (0x20) Aug 26 13:08:27.867513: | proposal number: 1 (0x1) Aug 26 13:08:27.867515: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:27.867518: | SPI size: 0 (0x0) Aug 26 13:08:27.867521: | number of transforms: 1 (0x1) Aug 26 13:08:27.867524: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:27.867527: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.867529: | length: 24 (0x18) Aug 26 13:08:27.867532: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:27.867534: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:27.867537: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.867540: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:27.867543: | length/value: 1 (0x1) Aug 26 13:08:27.867546: | [1 is OAKLEY_DES_CBC(UNUSED)] Aug 26 13:08:27.867550: "test" #12: OAKLEY_DES_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:27.867553: "test" #12: no acceptable Oakley Transform Aug 26 13:08:27.867556: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:27.867561: | [RE]START processing: state #12 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:27.867564: | #12 is idle Aug 26 13:08:27.867652: "test" #12: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:27.867657: | **emit ISAKMP Message: Aug 26 13:08:27.867660: | initiator cookie: Aug 26 13:08:27.867662: | 49 95 2d 99 33 96 10 48 Aug 26 13:08:27.867665: | responder cookie: Aug 26 13:08:27.867667: | 18 15 40 a5 5d c0 d0 8f Aug 26 13:08:27.867670: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.867673: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.867676: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:27.867678: | flags: none (0x0) Aug 26 13:08:27.867681: | Message ID: 0 (0x0) Aug 26 13:08:27.867684: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.867687: | ***emit ISAKMP Notification Payload: Aug 26 13:08:27.867689: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.867692: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.867694: | protocol ID: 1 (0x1) Aug 26 13:08:27.867697: | SPI size: 0 (0x0) Aug 26 13:08:27.867700: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:27.867703: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:27.867708: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:27.867711: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:27.867714: | emitting length of ISAKMP Message: 40 Aug 26 13:08:27.867721: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #12) Aug 26 13:08:27.867723: | 49 95 2d 99 33 96 10 48 18 15 40 a5 5d c0 d0 8f Aug 26 13:08:27.867726: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:27.867728: | 00 00 00 01 01 00 00 0e Aug 26 13:08:27.867753: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:27.867759: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:27.867764: | stop processing: state #12 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:27.867768: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:27.867773: | spent 0.495 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:27.900692: | spent 0.00423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:27.900723: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:27.900728: | 6e cb 94 61 34 ba b2 77 00 00 00 00 00 00 00 00 Aug 26 13:08:27.900731: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:27.900733: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:27.900736: | 00 00 00 14 01 01 00 00 80 02 00 06 80 03 00 11 Aug 26 13:08:27.900738: | 80 04 00 1c Aug 26 13:08:27.900745: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:27.900749: | **parse ISAKMP Message: Aug 26 13:08:27.900753: | initiator cookie: Aug 26 13:08:27.900755: | 6e cb 94 61 34 ba b2 77 Aug 26 13:08:27.900758: | responder cookie: Aug 26 13:08:27.900761: | 00 00 00 00 00 00 00 00 Aug 26 13:08:27.900764: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.900767: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.900771: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.900774: | flags: none (0x0) Aug 26 13:08:27.900776: | Message ID: 0 (0x0) Aug 26 13:08:27.900779: | length: 68 (0x44) Aug 26 13:08:27.900782: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:27.900787: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:27.900790: | #null state always idle Aug 26 13:08:27.900795: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:27.900798: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:27.900801: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.900804: | length: 40 (0x28) Aug 26 13:08:27.900806: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.900809: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:27.900812: | in statetime_start() with no state Aug 26 13:08:27.900818: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:27.900824: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:27.900827: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.900831: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:27.900834: | find_next_host_connection returns test Aug 26 13:08:27.900837: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.900840: | find_next_host_connection returns empty Aug 26 13:08:27.900860: | creating state object #13 at 0x55ea70a5b1e0 Aug 26 13:08:27.900864: | State DB: adding IKEv1 state #13 in UNDEFINED Aug 26 13:08:27.900868: | pstats #13 ikev1.isakmp started Aug 26 13:08:27.900873: | #13 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:27.900883: | start processing: state #13 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:27.900888: | parent state #13: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:27.900892: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:27.900895: "test" #13: responding to Main Mode Aug 26 13:08:27.900900: | **emit ISAKMP Message: Aug 26 13:08:27.900903: | initiator cookie: Aug 26 13:08:27.900906: | 6e cb 94 61 34 ba b2 77 Aug 26 13:08:27.900908: | responder cookie: Aug 26 13:08:27.900910: | ac 8a c2 09 98 dd 11 10 Aug 26 13:08:27.900913: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.900916: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.900918: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.900921: | flags: none (0x0) Aug 26 13:08:27.900923: | Message ID: 0 (0x0) Aug 26 13:08:27.900926: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.900929: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:27.900932: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:27.900935: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:27.900937: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.900941: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:27.900944: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:27.900947: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:27.900951: | ****parse IPsec DOI SIT: Aug 26 13:08:27.900954: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:27.900957: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:27.900960: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.900962: | length: 28 (0x1c) Aug 26 13:08:27.900965: | proposal number: 1 (0x1) Aug 26 13:08:27.900968: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:27.900970: | SPI size: 0 (0x0) Aug 26 13:08:27.900973: | number of transforms: 1 (0x1) Aug 26 13:08:27.900976: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:27.900979: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.900981: | length: 20 (0x14) Aug 26 13:08:27.900984: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:27.900986: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:27.900989: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.900993: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:08:27.900995: | length/value: 6 (0x6) Aug 26 13:08:27.900998: | [6 is OAKLEY_SHA2_512] Aug 26 13:08:27.901002: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.901005: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:08:27.901008: | length/value: 17 (0x11) Aug 26 13:08:27.901012: "test" #13: Pluto does not support 17?? authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Aug 26 13:08:27.901016: "test" #13: no acceptable Oakley Transform Aug 26 13:08:27.901020: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:27.901025: | [RE]START processing: state #13 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:27.901028: | #13 is idle Aug 26 13:08:27.901099: "test" #13: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:27.901105: | **emit ISAKMP Message: Aug 26 13:08:27.901109: | initiator cookie: Aug 26 13:08:27.901111: | 6e cb 94 61 34 ba b2 77 Aug 26 13:08:27.901114: | responder cookie: Aug 26 13:08:27.901116: | ac 8a c2 09 98 dd 11 10 Aug 26 13:08:27.901119: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.901123: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.901128: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:27.901131: | flags: none (0x0) Aug 26 13:08:27.901134: | Message ID: 0 (0x0) Aug 26 13:08:27.901137: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.901140: | ***emit ISAKMP Notification Payload: Aug 26 13:08:27.901144: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.901147: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.901149: | protocol ID: 1 (0x1) Aug 26 13:08:27.901152: | SPI size: 0 (0x0) Aug 26 13:08:27.901155: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:27.901159: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:27.901163: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:27.901166: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:27.901169: | emitting length of ISAKMP Message: 40 Aug 26 13:08:27.901175: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #13) Aug 26 13:08:27.901178: | 6e cb 94 61 34 ba b2 77 ac 8a c2 09 98 dd 11 10 Aug 26 13:08:27.901181: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:27.901184: | 00 00 00 01 01 00 00 0e Aug 26 13:08:27.901214: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:27.901222: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:27.901228: | stop processing: state #13 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:27.901232: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:27.901238: | spent 0.514 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:27.943182: | spent 0.00385 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:27.943216: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:27.943220: | 72 cf 6c a6 a9 42 b6 c9 00 00 00 00 00 00 00 00 Aug 26 13:08:27.943223: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:27.943225: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:27.943227: | 00 00 00 14 01 01 00 00 80 01 00 01 80 03 00 11 Aug 26 13:08:27.943230: | 80 04 00 1c Aug 26 13:08:27.943235: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:27.943240: | **parse ISAKMP Message: Aug 26 13:08:27.943243: | initiator cookie: Aug 26 13:08:27.943245: | 72 cf 6c a6 a9 42 b6 c9 Aug 26 13:08:27.943248: | responder cookie: Aug 26 13:08:27.943250: | 00 00 00 00 00 00 00 00 Aug 26 13:08:27.943253: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.943256: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.943259: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.943262: | flags: none (0x0) Aug 26 13:08:27.943264: | Message ID: 0 (0x0) Aug 26 13:08:27.943267: | length: 68 (0x44) Aug 26 13:08:27.943270: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:27.943275: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:27.943278: | #null state always idle Aug 26 13:08:27.943281: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:27.943285: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:27.943291: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.943296: | length: 40 (0x28) Aug 26 13:08:27.943299: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.943302: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:27.943305: | in statetime_start() with no state Aug 26 13:08:27.943311: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:27.943317: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:27.943324: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.943329: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:27.943331: | find_next_host_connection returns test Aug 26 13:08:27.943334: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.943337: | find_next_host_connection returns empty Aug 26 13:08:27.943367: | creating state object #14 at 0x55ea70a5bca0 Aug 26 13:08:27.943371: | State DB: adding IKEv1 state #14 in UNDEFINED Aug 26 13:08:27.943377: | pstats #14 ikev1.isakmp started Aug 26 13:08:27.943382: | #14 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:27.943388: | start processing: state #14 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:27.943393: | parent state #14: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:27.943397: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:27.943400: "test" #14: responding to Main Mode Aug 26 13:08:27.943406: | **emit ISAKMP Message: Aug 26 13:08:27.943409: | initiator cookie: Aug 26 13:08:27.943411: | 72 cf 6c a6 a9 42 b6 c9 Aug 26 13:08:27.943414: | responder cookie: Aug 26 13:08:27.943417: | ac 4f d2 82 75 da 78 44 Aug 26 13:08:27.943420: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.943423: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.943426: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.943428: | flags: none (0x0) Aug 26 13:08:27.943431: | Message ID: 0 (0x0) Aug 26 13:08:27.943434: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.943437: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:27.943440: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:27.943443: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:27.943446: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.943450: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:27.943453: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:27.943456: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:27.943461: | ****parse IPsec DOI SIT: Aug 26 13:08:27.943464: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:27.943467: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:27.943469: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.943472: | length: 28 (0x1c) Aug 26 13:08:27.943475: | proposal number: 1 (0x1) Aug 26 13:08:27.943478: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:27.943480: | SPI size: 0 (0x0) Aug 26 13:08:27.943483: | number of transforms: 1 (0x1) Aug 26 13:08:27.943487: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:27.943490: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.943492: | length: 20 (0x14) Aug 26 13:08:27.943495: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:27.943498: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:27.943501: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.943504: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:27.943507: | length/value: 1 (0x1) Aug 26 13:08:27.943510: | [1 is OAKLEY_DES_CBC(UNUSED)] Aug 26 13:08:27.943514: "test" #14: OAKLEY_DES_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:27.943518: "test" #14: no acceptable Oakley Transform Aug 26 13:08:27.943521: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:27.943526: | [RE]START processing: state #14 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:27.943529: | #14 is idle Aug 26 13:08:27.943615: "test" #14: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:27.943621: | **emit ISAKMP Message: Aug 26 13:08:27.943624: | initiator cookie: Aug 26 13:08:27.943626: | 72 cf 6c a6 a9 42 b6 c9 Aug 26 13:08:27.943629: | responder cookie: Aug 26 13:08:27.943632: | ac 4f d2 82 75 da 78 44 Aug 26 13:08:27.943635: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.943637: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.943640: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:27.943643: | flags: none (0x0) Aug 26 13:08:27.943645: | Message ID: 0 (0x0) Aug 26 13:08:27.943649: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.943652: | ***emit ISAKMP Notification Payload: Aug 26 13:08:27.943655: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.943658: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.943661: | protocol ID: 1 (0x1) Aug 26 13:08:27.943663: | SPI size: 0 (0x0) Aug 26 13:08:27.943666: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:27.943670: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:27.943673: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:27.943676: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:27.943679: | emitting length of ISAKMP Message: 40 Aug 26 13:08:27.943685: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #14) Aug 26 13:08:27.943688: | 72 cf 6c a6 a9 42 b6 c9 ac 4f d2 82 75 da 78 44 Aug 26 13:08:27.943691: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:27.943693: | 00 00 00 01 01 00 00 0e Aug 26 13:08:27.943723: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:27.943730: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:27.943735: | stop processing: state #14 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:27.943739: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:27.943744: | spent 0.515 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:27.986423: | spent 0.00311 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:27.986453: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:27.986457: | e3 76 f8 77 ca a4 b8 50 00 00 00 00 00 00 00 00 Aug 26 13:08:27.986460: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:27.986463: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:27.986465: | 00 00 00 14 01 01 00 00 80 01 00 01 80 02 00 06 Aug 26 13:08:27.986468: | 80 04 00 1c Aug 26 13:08:27.986473: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:27.986477: | **parse ISAKMP Message: Aug 26 13:08:27.986481: | initiator cookie: Aug 26 13:08:27.986483: | e3 76 f8 77 ca a4 b8 50 Aug 26 13:08:27.986486: | responder cookie: Aug 26 13:08:27.986488: | 00 00 00 00 00 00 00 00 Aug 26 13:08:27.986491: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.986494: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.986497: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.986500: | flags: none (0x0) Aug 26 13:08:27.986503: | Message ID: 0 (0x0) Aug 26 13:08:27.986505: | length: 68 (0x44) Aug 26 13:08:27.986509: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:27.986513: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:27.986516: | #null state always idle Aug 26 13:08:27.986519: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:27.986522: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:27.986526: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.986532: | length: 40 (0x28) Aug 26 13:08:27.986535: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.986538: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:27.986541: | in statetime_start() with no state Aug 26 13:08:27.986547: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:27.986553: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:27.986556: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.986560: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:27.986563: | find_next_host_connection returns test Aug 26 13:08:27.986565: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:27.986568: | find_next_host_connection returns empty Aug 26 13:08:27.986595: | creating state object #15 at 0x55ea70a5c760 Aug 26 13:08:27.986599: | State DB: adding IKEv1 state #15 in UNDEFINED Aug 26 13:08:27.986603: | pstats #15 ikev1.isakmp started Aug 26 13:08:27.986608: | #15 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:27.986614: | start processing: state #15 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:27.986618: | parent state #15: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:27.986621: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:27.986625: "test" #15: responding to Main Mode Aug 26 13:08:27.986630: | **emit ISAKMP Message: Aug 26 13:08:27.986633: | initiator cookie: Aug 26 13:08:27.986635: | e3 76 f8 77 ca a4 b8 50 Aug 26 13:08:27.986638: | responder cookie: Aug 26 13:08:27.986640: | 3a 8f fe 55 48 a1 40 f4 Aug 26 13:08:27.986643: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:27.986646: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.986648: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:27.986651: | flags: none (0x0) Aug 26 13:08:27.986654: | Message ID: 0 (0x0) Aug 26 13:08:27.986657: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.986660: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:27.986663: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:27.986665: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:27.986668: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.986671: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:27.986675: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:27.986678: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:27.986681: | ****parse IPsec DOI SIT: Aug 26 13:08:27.986684: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:27.986687: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:27.986689: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.986692: | length: 28 (0x1c) Aug 26 13:08:27.986695: | proposal number: 1 (0x1) Aug 26 13:08:27.986697: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:27.986700: | SPI size: 0 (0x0) Aug 26 13:08:27.986703: | number of transforms: 1 (0x1) Aug 26 13:08:27.986706: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:27.986709: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.986711: | length: 20 (0x14) Aug 26 13:08:27.986714: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:27.986716: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:27.986719: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:27.986722: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:27.986725: | length/value: 1 (0x1) Aug 26 13:08:27.986730: | [1 is OAKLEY_DES_CBC(UNUSED)] Aug 26 13:08:27.986733: "test" #15: OAKLEY_DES_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:27.986736: "test" #15: no acceptable Oakley Transform Aug 26 13:08:27.986740: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:27.986745: | [RE]START processing: state #15 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:27.986747: | #15 is idle Aug 26 13:08:27.987202: "test" #15: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:27.987208: | **emit ISAKMP Message: Aug 26 13:08:27.987211: | initiator cookie: Aug 26 13:08:27.987214: | e3 76 f8 77 ca a4 b8 50 Aug 26 13:08:27.987216: | responder cookie: Aug 26 13:08:27.987219: | 3a 8f fe 55 48 a1 40 f4 Aug 26 13:08:27.987222: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.987224: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:27.987227: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:27.987230: | flags: none (0x0) Aug 26 13:08:27.987232: | Message ID: 0 (0x0) Aug 26 13:08:27.987235: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:27.987238: | ***emit ISAKMP Notification Payload: Aug 26 13:08:27.987241: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:27.987244: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:27.987246: | protocol ID: 1 (0x1) Aug 26 13:08:27.987249: | SPI size: 0 (0x0) Aug 26 13:08:27.987252: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:27.987255: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:27.987258: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:27.987261: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:27.987264: | emitting length of ISAKMP Message: 40 Aug 26 13:08:27.987270: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #15) Aug 26 13:08:27.987273: | e3 76 f8 77 ca a4 b8 50 3a 8f fe 55 48 a1 40 f4 Aug 26 13:08:27.987276: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:27.987278: | 00 00 00 01 01 00 00 0e Aug 26 13:08:27.987337: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:27.987347: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:27.987353: | stop processing: state #15 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:27.987356: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:27.987362: | spent 0.884 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.021307: | spent 0.00372 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.021338: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.021343: | e4 08 ae 93 38 c4 5a 0d 00 00 00 00 00 00 00 00 Aug 26 13:08:28.021345: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.021347: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.021349: | 00 00 00 14 01 01 00 00 80 01 00 01 80 02 00 06 Aug 26 13:08:28.021351: | 80 03 00 11 Aug 26 13:08:28.021356: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.021361: | **parse ISAKMP Message: Aug 26 13:08:28.021364: | initiator cookie: Aug 26 13:08:28.021367: | e4 08 ae 93 38 c4 5a 0d Aug 26 13:08:28.021369: | responder cookie: Aug 26 13:08:28.021371: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.021374: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.021376: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.021379: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.021381: | flags: none (0x0) Aug 26 13:08:28.021388: | Message ID: 0 (0x0) Aug 26 13:08:28.021391: | length: 68 (0x44) Aug 26 13:08:28.021394: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.021398: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.021401: | #null state always idle Aug 26 13:08:28.021405: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.021408: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.021410: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.021413: | length: 40 (0x28) Aug 26 13:08:28.021415: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.021418: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.021420: | in statetime_start() with no state Aug 26 13:08:28.021426: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.021431: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.021434: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.021438: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.021441: | find_next_host_connection returns test Aug 26 13:08:28.021443: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.021446: | find_next_host_connection returns empty Aug 26 13:08:28.021471: | creating state object #16 at 0x55ea70a5d220 Aug 26 13:08:28.021475: | State DB: adding IKEv1 state #16 in UNDEFINED Aug 26 13:08:28.021480: | pstats #16 ikev1.isakmp started Aug 26 13:08:28.021484: | #16 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.021491: | start processing: state #16 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.021495: | parent state #16: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.021499: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.021502: "test" #16: responding to Main Mode Aug 26 13:08:28.021507: | **emit ISAKMP Message: Aug 26 13:08:28.021510: | initiator cookie: Aug 26 13:08:28.021512: | e4 08 ae 93 38 c4 5a 0d Aug 26 13:08:28.021514: | responder cookie: Aug 26 13:08:28.021517: | 9c 78 b6 0c 84 79 e3 83 Aug 26 13:08:28.021519: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.021522: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.021525: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.021527: | flags: none (0x0) Aug 26 13:08:28.021530: | Message ID: 0 (0x0) Aug 26 13:08:28.021533: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.021536: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.021539: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.021542: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.021544: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.021547: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.021550: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.021552: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.021556: | ****parse IPsec DOI SIT: Aug 26 13:08:28.021559: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.021562: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.021564: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.021567: | length: 28 (0x1c) Aug 26 13:08:28.021569: | proposal number: 1 (0x1) Aug 26 13:08:28.021572: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.021575: | SPI size: 0 (0x0) Aug 26 13:08:28.021577: | number of transforms: 1 (0x1) Aug 26 13:08:28.021580: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.021585: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.021587: | length: 20 (0x14) Aug 26 13:08:28.021590: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.021593: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.021596: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.021599: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.021602: | length/value: 1 (0x1) Aug 26 13:08:28.021605: | [1 is OAKLEY_DES_CBC(UNUSED)] Aug 26 13:08:28.021609: "test" #16: OAKLEY_DES_CBC(UNUSED) is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:28.021612: "test" #16: no acceptable Oakley Transform Aug 26 13:08:28.021615: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.021620: | [RE]START processing: state #16 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.021623: | #16 is idle Aug 26 13:08:28.021882: "test" #16: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.021890: | **emit ISAKMP Message: Aug 26 13:08:28.021893: | initiator cookie: Aug 26 13:08:28.021896: | e4 08 ae 93 38 c4 5a 0d Aug 26 13:08:28.021898: | responder cookie: Aug 26 13:08:28.021900: | 9c 78 b6 0c 84 79 e3 83 Aug 26 13:08:28.021903: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.021906: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.021909: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.021912: | flags: none (0x0) Aug 26 13:08:28.021915: | Message ID: 0 (0x0) Aug 26 13:08:28.021918: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.021922: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.021925: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.021927: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.021930: | protocol ID: 1 (0x1) Aug 26 13:08:28.021934: | SPI size: 0 (0x0) Aug 26 13:08:28.021936: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.021940: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.021943: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.021947: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.021950: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.021957: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #16) Aug 26 13:08:28.021960: | e4 08 ae 93 38 c4 5a 0d 9c 78 b6 0c 84 79 e3 83 Aug 26 13:08:28.021963: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.021965: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.022001: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.022009: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.022015: | stop processing: state #16 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.022019: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.022025: | spent 0.49 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.050603: | spent 0.00411 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.050628: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.050631: | 38 fd 0e b8 1f a8 36 09 00 00 00 00 00 00 00 00 Aug 26 13:08:28.050633: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 13:08:28.050635: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 13:08:28.050636: | 00 00 00 18 01 01 00 00 80 01 00 05 80 02 00 05 Aug 26 13:08:28.050638: | 80 03 00 0d 80 04 00 0d Aug 26 13:08:28.050641: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.050647: | **parse ISAKMP Message: Aug 26 13:08:28.050649: | initiator cookie: Aug 26 13:08:28.050650: | 38 fd 0e b8 1f a8 36 09 Aug 26 13:08:28.050652: | responder cookie: Aug 26 13:08:28.050653: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.050656: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.050657: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.050659: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.050661: | flags: none (0x0) Aug 26 13:08:28.050663: | Message ID: 0 (0x0) Aug 26 13:08:28.050665: | length: 72 (0x48) Aug 26 13:08:28.050667: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.050670: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.050671: | #null state always idle Aug 26 13:08:28.050674: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.050676: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.050678: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.050680: | length: 44 (0x2c) Aug 26 13:08:28.050681: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.050683: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.050685: | in statetime_start() with no state Aug 26 13:08:28.050689: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.050692: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.050695: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.050697: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.050699: | find_next_host_connection returns test Aug 26 13:08:28.050701: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.050702: | find_next_host_connection returns empty Aug 26 13:08:28.050724: | creating state object #17 at 0x55ea70a5dce0 Aug 26 13:08:28.050727: | State DB: adding IKEv1 state #17 in UNDEFINED Aug 26 13:08:28.050731: | pstats #17 ikev1.isakmp started Aug 26 13:08:28.050734: | #17 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.050739: | start processing: state #17 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.050741: | parent state #17: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.050743: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.050745: "test" #17: responding to Main Mode Aug 26 13:08:28.050749: | **emit ISAKMP Message: Aug 26 13:08:28.050751: | initiator cookie: Aug 26 13:08:28.050753: | 38 fd 0e b8 1f a8 36 09 Aug 26 13:08:28.050754: | responder cookie: Aug 26 13:08:28.050756: | fc 9d 90 f7 71 74 25 ec Aug 26 13:08:28.050758: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.050759: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.050761: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.050763: | flags: none (0x0) Aug 26 13:08:28.050764: | Message ID: 0 (0x0) Aug 26 13:08:28.050766: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.050768: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.050770: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.050772: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.050774: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.050776: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.050778: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.050780: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.050782: | ****parse IPsec DOI SIT: Aug 26 13:08:28.050785: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.050787: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.050789: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.050791: | length: 32 (0x20) Aug 26 13:08:28.050792: | proposal number: 1 (0x1) Aug 26 13:08:28.050794: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.050796: | SPI size: 0 (0x0) Aug 26 13:08:28.050797: | number of transforms: 1 (0x1) Aug 26 13:08:28.050799: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.050801: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.050803: | length: 24 (0x18) Aug 26 13:08:28.050804: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.050806: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.050808: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.050810: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.050811: | length/value: 5 (0x5) Aug 26 13:08:28.050813: | [5 is OAKLEY_3DES_CBC] Aug 26 13:08:28.050816: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.050818: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:08:28.050819: | length/value: 5 (0x5) Aug 26 13:08:28.050821: | [5 is OAKLEY_SHA2_384] Aug 26 13:08:28.050823: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.050825: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:08:28.050826: | length/value: 13 (0xd) Aug 26 13:08:28.050829: "test" #17: Pluto does not support 13?? authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Aug 26 13:08:28.050831: "test" #17: no acceptable Oakley Transform Aug 26 13:08:28.050833: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.050836: | [RE]START processing: state #17 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.050838: | #17 is idle Aug 26 13:08:28.051035: "test" #17: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.051043: | **emit ISAKMP Message: Aug 26 13:08:28.051047: | initiator cookie: Aug 26 13:08:28.051050: | 38 fd 0e b8 1f a8 36 09 Aug 26 13:08:28.051053: | responder cookie: Aug 26 13:08:28.051056: | fc 9d 90 f7 71 74 25 ec Aug 26 13:08:28.051059: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.051062: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.051065: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.051068: | flags: none (0x0) Aug 26 13:08:28.051071: | Message ID: 0 (0x0) Aug 26 13:08:28.051075: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.051078: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.051081: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.051085: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.051087: | protocol ID: 1 (0x1) Aug 26 13:08:28.051090: | SPI size: 0 (0x0) Aug 26 13:08:28.051093: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.051097: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.051101: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.051104: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.051107: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.051115: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #17) Aug 26 13:08:28.051118: | 38 fd 0e b8 1f a8 36 09 fc 9d 90 f7 71 74 25 ec Aug 26 13:08:28.051120: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.051122: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.051153: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.051160: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.051166: | stop processing: state #17 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.051172: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.051178: | spent 0.428 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.081222: | spent 0.00325 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.081246: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.081249: | 79 10 69 a4 3c 5f e5 9d 00 00 00 00 00 00 00 00 Aug 26 13:08:28.081252: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.081255: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.081257: | 00 00 00 14 01 01 00 00 80 02 00 05 80 03 00 0d Aug 26 13:08:28.081259: | 80 04 00 0d Aug 26 13:08:28.081264: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.081269: | **parse ISAKMP Message: Aug 26 13:08:28.081272: | initiator cookie: Aug 26 13:08:28.081274: | 79 10 69 a4 3c 5f e5 9d Aug 26 13:08:28.081277: | responder cookie: Aug 26 13:08:28.081279: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.081282: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.081285: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.081292: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.081297: | flags: none (0x0) Aug 26 13:08:28.081300: | Message ID: 0 (0x0) Aug 26 13:08:28.081303: | length: 68 (0x44) Aug 26 13:08:28.081306: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.081310: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.081313: | #null state always idle Aug 26 13:08:28.081317: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.081320: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.081323: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.081325: | length: 40 (0x28) Aug 26 13:08:28.081328: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.081331: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.081333: | in statetime_start() with no state Aug 26 13:08:28.081339: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.081344: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.081347: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.081351: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.081354: | find_next_host_connection returns test Aug 26 13:08:28.081357: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.081359: | find_next_host_connection returns empty Aug 26 13:08:28.081386: | creating state object #18 at 0x55ea70a5e7a0 Aug 26 13:08:28.081389: | State DB: adding IKEv1 state #18 in UNDEFINED Aug 26 13:08:28.081394: | pstats #18 ikev1.isakmp started Aug 26 13:08:28.081398: | #18 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.081404: | start processing: state #18 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.081408: | parent state #18: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.081411: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.081414: "test" #18: responding to Main Mode Aug 26 13:08:28.081419: | **emit ISAKMP Message: Aug 26 13:08:28.081422: | initiator cookie: Aug 26 13:08:28.081424: | 79 10 69 a4 3c 5f e5 9d Aug 26 13:08:28.081427: | responder cookie: Aug 26 13:08:28.081429: | f7 90 e8 1c e8 d5 a2 f4 Aug 26 13:08:28.081432: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.081435: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.081437: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.081440: | flags: none (0x0) Aug 26 13:08:28.081442: | Message ID: 0 (0x0) Aug 26 13:08:28.081449: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.081452: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.081456: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.081458: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.081461: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.081464: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.081467: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.081471: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.081474: | ****parse IPsec DOI SIT: Aug 26 13:08:28.081476: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.081479: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.081482: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.081484: | length: 28 (0x1c) Aug 26 13:08:28.081487: | proposal number: 1 (0x1) Aug 26 13:08:28.081490: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.081492: | SPI size: 0 (0x0) Aug 26 13:08:28.081495: | number of transforms: 1 (0x1) Aug 26 13:08:28.081497: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.081500: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.081503: | length: 20 (0x14) Aug 26 13:08:28.081505: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.081508: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.081511: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.081514: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:08:28.081516: | length/value: 5 (0x5) Aug 26 13:08:28.081519: | [5 is OAKLEY_SHA2_384] Aug 26 13:08:28.081523: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.081526: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:08:28.081528: | length/value: 13 (0xd) Aug 26 13:08:28.081532: "test" #18: Pluto does not support 13?? authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Aug 26 13:08:28.081535: "test" #18: no acceptable Oakley Transform Aug 26 13:08:28.081538: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.081542: | [RE]START processing: state #18 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.081545: | #18 is idle Aug 26 13:08:28.082596: "test" #18: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.082612: | **emit ISAKMP Message: Aug 26 13:08:28.082617: | initiator cookie: Aug 26 13:08:28.082619: | 79 10 69 a4 3c 5f e5 9d Aug 26 13:08:28.082622: | responder cookie: Aug 26 13:08:28.082624: | f7 90 e8 1c e8 d5 a2 f4 Aug 26 13:08:28.082628: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.082632: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.082635: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.082638: | flags: none (0x0) Aug 26 13:08:28.082641: | Message ID: 0 (0x0) Aug 26 13:08:28.082645: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.082648: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.082652: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.082655: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.082658: | protocol ID: 1 (0x1) Aug 26 13:08:28.082661: | SPI size: 0 (0x0) Aug 26 13:08:28.082664: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.082667: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.082671: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.082675: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.082682: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.082690: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #18) Aug 26 13:08:28.082693: | 79 10 69 a4 3c 5f e5 9d f7 90 e8 1c e8 d5 a2 f4 Aug 26 13:08:28.082697: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.082699: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.082743: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.082752: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.082759: | stop processing: state #18 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.082763: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.082771: | spent 0.541 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.114229: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.114262: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.114266: | 83 45 3e c3 ea 0c 17 01 00 00 00 00 00 00 00 00 Aug 26 13:08:28.114269: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.114271: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.114274: | 00 00 00 14 01 01 00 00 80 01 00 05 80 03 00 0d Aug 26 13:08:28.114276: | 80 04 00 0d Aug 26 13:08:28.114281: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.114286: | **parse ISAKMP Message: Aug 26 13:08:28.114294: | initiator cookie: Aug 26 13:08:28.114298: | 83 45 3e c3 ea 0c 17 01 Aug 26 13:08:28.114301: | responder cookie: Aug 26 13:08:28.114303: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.114307: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.114310: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.114312: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.114315: | flags: none (0x0) Aug 26 13:08:28.114318: | Message ID: 0 (0x0) Aug 26 13:08:28.114321: | length: 68 (0x44) Aug 26 13:08:28.114324: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.114328: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.114331: | #null state always idle Aug 26 13:08:28.114334: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.114338: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.114340: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.114343: | length: 40 (0x28) Aug 26 13:08:28.114346: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.114348: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.114351: | in statetime_start() with no state Aug 26 13:08:28.114356: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.114361: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.114364: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.114368: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.114370: | find_next_host_connection returns test Aug 26 13:08:28.114373: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.114375: | find_next_host_connection returns empty Aug 26 13:08:28.114403: | creating state object #19 at 0x55ea70a5f260 Aug 26 13:08:28.114411: | State DB: adding IKEv1 state #19 in UNDEFINED Aug 26 13:08:28.114416: | pstats #19 ikev1.isakmp started Aug 26 13:08:28.114423: | #19 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.114430: | start processing: state #19 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.114434: | parent state #19: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.114443: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.114447: "test" #19: responding to Main Mode Aug 26 13:08:28.114453: | **emit ISAKMP Message: Aug 26 13:08:28.114456: | initiator cookie: Aug 26 13:08:28.114459: | 83 45 3e c3 ea 0c 17 01 Aug 26 13:08:28.114462: | responder cookie: Aug 26 13:08:28.114465: | 67 b2 a5 e5 71 70 40 2b Aug 26 13:08:28.114468: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.114471: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.114474: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.114477: | flags: none (0x0) Aug 26 13:08:28.114480: | Message ID: 0 (0x0) Aug 26 13:08:28.114483: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.114489: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.114495: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.114498: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.114501: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.114506: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.114510: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.114514: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.114518: | ****parse IPsec DOI SIT: Aug 26 13:08:28.114521: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.114525: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.114528: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.114532: | length: 28 (0x1c) Aug 26 13:08:28.114536: | proposal number: 1 (0x1) Aug 26 13:08:28.114541: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.114545: | SPI size: 0 (0x0) Aug 26 13:08:28.114547: | number of transforms: 1 (0x1) Aug 26 13:08:28.114551: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.114554: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.114556: | length: 20 (0x14) Aug 26 13:08:28.114559: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.114561: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.114564: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.114568: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.114570: | length/value: 5 (0x5) Aug 26 13:08:28.114573: | [5 is OAKLEY_3DES_CBC] Aug 26 13:08:28.114577: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.114580: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:08:28.114583: | length/value: 13 (0xd) Aug 26 13:08:28.114587: "test" #19: Pluto does not support 13?? authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Aug 26 13:08:28.114590: "test" #19: no acceptable Oakley Transform Aug 26 13:08:28.114594: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.114599: | [RE]START processing: state #19 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.114602: | #19 is idle Aug 26 13:08:28.114765: "test" #19: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.114775: | **emit ISAKMP Message: Aug 26 13:08:28.114779: | initiator cookie: Aug 26 13:08:28.114782: | 83 45 3e c3 ea 0c 17 01 Aug 26 13:08:28.114785: | responder cookie: Aug 26 13:08:28.114787: | 67 b2 a5 e5 71 70 40 2b Aug 26 13:08:28.114791: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.114794: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.114797: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.114799: | flags: none (0x0) Aug 26 13:08:28.114802: | Message ID: 0 (0x0) Aug 26 13:08:28.114806: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.114809: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.114815: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.114818: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.114821: | protocol ID: 1 (0x1) Aug 26 13:08:28.114824: | SPI size: 0 (0x0) Aug 26 13:08:28.114826: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.114830: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.114833: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.114837: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.114840: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.114847: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #19) Aug 26 13:08:28.114850: | 83 45 3e c3 ea 0c 17 01 67 b2 a5 e5 71 70 40 2b Aug 26 13:08:28.114853: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.114855: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.114884: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.114891: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.114897: | stop processing: state #19 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.114901: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.114907: | spent 0.547 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.148569: | spent 0.00441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.148596: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.148600: | d3 e6 2b a8 e1 d0 eb bd 00 00 00 00 00 00 00 00 Aug 26 13:08:28.148601: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.148603: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.148605: | 00 00 00 14 01 01 00 00 80 01 00 05 80 02 00 05 Aug 26 13:08:28.148606: | 80 04 00 0d Aug 26 13:08:28.148610: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.148613: | **parse ISAKMP Message: Aug 26 13:08:28.148615: | initiator cookie: Aug 26 13:08:28.148617: | d3 e6 2b a8 e1 d0 eb bd Aug 26 13:08:28.148618: | responder cookie: Aug 26 13:08:28.148620: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.148622: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.148624: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.148626: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.148627: | flags: none (0x0) Aug 26 13:08:28.148629: | Message ID: 0 (0x0) Aug 26 13:08:28.148631: | length: 68 (0x44) Aug 26 13:08:28.148633: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.148636: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.148638: | #null state always idle Aug 26 13:08:28.148640: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.148643: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.148644: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.148646: | length: 40 (0x28) Aug 26 13:08:28.148648: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.148650: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.148652: | in statetime_start() with no state Aug 26 13:08:28.148655: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.148659: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.148661: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.148664: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.148666: | find_next_host_connection returns test Aug 26 13:08:28.148671: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.148672: | find_next_host_connection returns empty Aug 26 13:08:28.148696: | creating state object #20 at 0x55ea70a5fd20 Aug 26 13:08:28.148699: | State DB: adding IKEv1 state #20 in UNDEFINED Aug 26 13:08:28.148702: | pstats #20 ikev1.isakmp started Aug 26 13:08:28.148706: | #20 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.148710: | start processing: state #20 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.148712: | parent state #20: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.148715: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.148717: "test" #20: responding to Main Mode Aug 26 13:08:28.148721: | **emit ISAKMP Message: Aug 26 13:08:28.148723: | initiator cookie: Aug 26 13:08:28.148724: | d3 e6 2b a8 e1 d0 eb bd Aug 26 13:08:28.148726: | responder cookie: Aug 26 13:08:28.148727: | 5f a9 8a 2b 99 08 8e 11 Aug 26 13:08:28.148729: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.148731: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.148733: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.148734: | flags: none (0x0) Aug 26 13:08:28.148736: | Message ID: 0 (0x0) Aug 26 13:08:28.148738: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.148740: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.148742: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.148744: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.148745: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.148747: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.148749: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.148751: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.148754: | ****parse IPsec DOI SIT: Aug 26 13:08:28.148757: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.148760: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.148763: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.148765: | length: 28 (0x1c) Aug 26 13:08:28.148768: | proposal number: 1 (0x1) Aug 26 13:08:28.148771: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.148774: | SPI size: 0 (0x0) Aug 26 13:08:28.148777: | number of transforms: 1 (0x1) Aug 26 13:08:28.148780: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.148783: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.148785: | length: 20 (0x14) Aug 26 13:08:28.148789: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.148791: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.148795: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.148798: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.148801: | length/value: 5 (0x5) Aug 26 13:08:28.148804: | [5 is OAKLEY_3DES_CBC] Aug 26 13:08:28.148807: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.148810: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:08:28.148812: | length/value: 5 (0x5) Aug 26 13:08:28.148815: | [5 is OAKLEY_SHA2_384] Aug 26 13:08:28.148818: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.148820: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) Aug 26 13:08:28.148823: | length/value: 13 (0xd) Aug 26 13:08:28.148825: | [13 is OAKLEY_GROUP_EC2N_2_8(UNUSED)] Aug 26 13:08:28.148830: "test" #20: OAKLEY_GROUP 13 not supported. Attribute OAKLEY_GROUP_DESCRIPTION Aug 26 13:08:28.148833: "test" #20: no acceptable Oakley Transform Aug 26 13:08:28.148836: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.148846: | [RE]START processing: state #20 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.148849: | #20 is idle Aug 26 13:08:28.149118: "test" #20: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.149129: | **emit ISAKMP Message: Aug 26 13:08:28.149133: | initiator cookie: Aug 26 13:08:28.149136: | d3 e6 2b a8 e1 d0 eb bd Aug 26 13:08:28.149139: | responder cookie: Aug 26 13:08:28.149141: | 5f a9 8a 2b 99 08 8e 11 Aug 26 13:08:28.149144: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.149148: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.149151: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.149154: | flags: none (0x0) Aug 26 13:08:28.149156: | Message ID: 0 (0x0) Aug 26 13:08:28.149160: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.149163: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.149167: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.149170: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.149173: | protocol ID: 1 (0x1) Aug 26 13:08:28.149175: | SPI size: 0 (0x0) Aug 26 13:08:28.149178: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.149182: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.149185: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.149189: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.149192: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.149200: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #20) Aug 26 13:08:28.149203: | d3 e6 2b a8 e1 d0 eb bd 5f a9 8a 2b 99 08 8e 11 Aug 26 13:08:28.149206: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.149209: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.149245: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.149253: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.149260: | stop processing: state #20 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.149264: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.149271: | spent 0.487 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.181602: | spent 0.00325 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.181627: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.181631: | 20 c6 c3 bd d6 41 3b c5 00 00 00 00 00 00 00 00 Aug 26 13:08:28.181634: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.181637: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.181639: | 00 00 00 14 01 01 00 00 80 01 00 05 80 02 00 05 Aug 26 13:08:28.181641: | 80 03 00 0d Aug 26 13:08:28.181647: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.181651: | **parse ISAKMP Message: Aug 26 13:08:28.181654: | initiator cookie: Aug 26 13:08:28.181657: | 20 c6 c3 bd d6 41 3b c5 Aug 26 13:08:28.181660: | responder cookie: Aug 26 13:08:28.181662: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.181665: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.181668: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.181671: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.181674: | flags: none (0x0) Aug 26 13:08:28.181676: | Message ID: 0 (0x0) Aug 26 13:08:28.181679: | length: 68 (0x44) Aug 26 13:08:28.181682: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.181686: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.181689: | #null state always idle Aug 26 13:08:28.181696: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.181700: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.181702: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.181705: | length: 40 (0x28) Aug 26 13:08:28.181708: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.181711: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.181713: | in statetime_start() with no state Aug 26 13:08:28.181720: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.181725: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.181729: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.181732: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.181735: | find_next_host_connection returns test Aug 26 13:08:28.181738: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.181740: | find_next_host_connection returns empty Aug 26 13:08:28.181767: | creating state object #21 at 0x55ea70a607e0 Aug 26 13:08:28.181771: | State DB: adding IKEv1 state #21 in UNDEFINED Aug 26 13:08:28.181776: | pstats #21 ikev1.isakmp started Aug 26 13:08:28.181780: | #21 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.181787: | start processing: state #21 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.181790: | parent state #21: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.181794: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.181797: "test" #21: responding to Main Mode Aug 26 13:08:28.181802: | **emit ISAKMP Message: Aug 26 13:08:28.181805: | initiator cookie: Aug 26 13:08:28.181807: | 20 c6 c3 bd d6 41 3b c5 Aug 26 13:08:28.181810: | responder cookie: Aug 26 13:08:28.181812: | dc 85 d3 06 d3 0d 39 1b Aug 26 13:08:28.181815: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.181818: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.181821: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.181823: | flags: none (0x0) Aug 26 13:08:28.181826: | Message ID: 0 (0x0) Aug 26 13:08:28.181829: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.181833: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.181836: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.181838: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.181841: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.181844: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.181847: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.181850: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.181854: | ****parse IPsec DOI SIT: Aug 26 13:08:28.181856: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.181859: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.181862: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.181865: | length: 28 (0x1c) Aug 26 13:08:28.181867: | proposal number: 1 (0x1) Aug 26 13:08:28.181870: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.181873: | SPI size: 0 (0x0) Aug 26 13:08:28.181875: | number of transforms: 1 (0x1) Aug 26 13:08:28.181878: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.181881: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.181883: | length: 20 (0x14) Aug 26 13:08:28.181886: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.181888: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.181892: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.181896: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.181899: | length/value: 5 (0x5) Aug 26 13:08:28.181902: | [5 is OAKLEY_3DES_CBC] Aug 26 13:08:28.181905: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.181908: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:08:28.181911: | length/value: 5 (0x5) Aug 26 13:08:28.181913: | [5 is OAKLEY_SHA2_384] Aug 26 13:08:28.181916: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.181919: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:08:28.181921: | length/value: 13 (0xd) Aug 26 13:08:28.181925: "test" #21: Pluto does not support 13?? authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Aug 26 13:08:28.181928: "test" #21: no acceptable Oakley Transform Aug 26 13:08:28.181931: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.181937: | [RE]START processing: state #21 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.181939: | #21 is idle Aug 26 13:08:28.182019: "test" #21: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.182028: | **emit ISAKMP Message: Aug 26 13:08:28.182032: | initiator cookie: Aug 26 13:08:28.182034: | 20 c6 c3 bd d6 41 3b c5 Aug 26 13:08:28.182037: | responder cookie: Aug 26 13:08:28.182040: | dc 85 d3 06 d3 0d 39 1b Aug 26 13:08:28.182043: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.182046: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.182048: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.182051: | flags: none (0x0) Aug 26 13:08:28.182054: | Message ID: 0 (0x0) Aug 26 13:08:28.182057: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.182060: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.182063: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.182066: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.182069: | protocol ID: 1 (0x1) Aug 26 13:08:28.182071: | SPI size: 0 (0x0) Aug 26 13:08:28.182074: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.182077: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.182081: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.182084: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.182087: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.182094: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #21) Aug 26 13:08:28.182097: | 20 c6 c3 bd d6 41 3b c5 dc 85 d3 06 d3 0d 39 1b Aug 26 13:08:28.182100: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.182102: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.182133: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.182140: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.182145: | stop processing: state #21 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.182149: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.182155: | spent 0.511 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.217784: | spent 0.00327 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.217808: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.217811: | 91 b3 02 20 d6 15 26 e3 00 00 00 00 00 00 00 00 Aug 26 13:08:28.217813: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 13:08:28.217815: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 13:08:28.217816: | 00 00 00 18 01 01 00 00 80 01 00 1c 80 02 00 03 Aug 26 13:08:28.217818: | 80 03 00 02 80 04 00 06 Aug 26 13:08:28.217840: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.217843: | **parse ISAKMP Message: Aug 26 13:08:28.217845: | initiator cookie: Aug 26 13:08:28.217847: | 91 b3 02 20 d6 15 26 e3 Aug 26 13:08:28.217849: | responder cookie: Aug 26 13:08:28.217850: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.217852: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.217854: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.217856: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.217867: | flags: none (0x0) Aug 26 13:08:28.217869: | Message ID: 0 (0x0) Aug 26 13:08:28.217871: | length: 72 (0x48) Aug 26 13:08:28.217873: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.217876: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.217877: | #null state always idle Aug 26 13:08:28.217880: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.217882: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.217884: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.217886: | length: 44 (0x2c) Aug 26 13:08:28.217888: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.217898: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.217909: | in statetime_start() with no state Aug 26 13:08:28.217914: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.217920: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.217924: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.217927: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.217930: | find_next_host_connection returns test Aug 26 13:08:28.217933: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.217936: | find_next_host_connection returns empty Aug 26 13:08:28.217961: | creating state object #22 at 0x55ea70a612a0 Aug 26 13:08:28.217965: | State DB: adding IKEv1 state #22 in UNDEFINED Aug 26 13:08:28.217969: | pstats #22 ikev1.isakmp started Aug 26 13:08:28.217974: | #22 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.217980: | start processing: state #22 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.217984: | parent state #22: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.217988: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.217991: "test" #22: responding to Main Mode Aug 26 13:08:28.217996: | **emit ISAKMP Message: Aug 26 13:08:28.217999: | initiator cookie: Aug 26 13:08:28.218001: | 91 b3 02 20 d6 15 26 e3 Aug 26 13:08:28.218004: | responder cookie: Aug 26 13:08:28.218006: | e5 d8 02 c9 6e 9c cf bc Aug 26 13:08:28.218009: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.218012: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.218015: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.218017: | flags: none (0x0) Aug 26 13:08:28.218020: | Message ID: 0 (0x0) Aug 26 13:08:28.218022: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.218043: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.218046: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.218047: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.218049: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.218051: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.218053: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.218055: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.218068: | ****parse IPsec DOI SIT: Aug 26 13:08:28.218070: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.218072: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.218074: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.218076: | length: 32 (0x20) Aug 26 13:08:28.218077: | proposal number: 1 (0x1) Aug 26 13:08:28.218079: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.218081: | SPI size: 0 (0x0) Aug 26 13:08:28.218082: | number of transforms: 1 (0x1) Aug 26 13:08:28.218084: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.218086: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.218088: | length: 24 (0x18) Aug 26 13:08:28.218089: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.218091: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.218093: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.218095: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.218096: | length/value: 28 (0x1c) Aug 26 13:08:28.218100: "test" #22: 28?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:28.218102: "test" #22: no acceptable Oakley Transform Aug 26 13:08:28.218104: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.218107: | [RE]START processing: state #22 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.218109: | #22 is idle Aug 26 13:08:28.218241: "test" #22: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.218248: | **emit ISAKMP Message: Aug 26 13:08:28.218250: | initiator cookie: Aug 26 13:08:28.218252: | 91 b3 02 20 d6 15 26 e3 Aug 26 13:08:28.218254: | responder cookie: Aug 26 13:08:28.218255: | e5 d8 02 c9 6e 9c cf bc Aug 26 13:08:28.218257: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.218259: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.218260: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.218262: | flags: none (0x0) Aug 26 13:08:28.218264: | Message ID: 0 (0x0) Aug 26 13:08:28.218266: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.218268: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.218269: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.218271: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.218273: | protocol ID: 1 (0x1) Aug 26 13:08:28.218274: | SPI size: 0 (0x0) Aug 26 13:08:28.218276: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.218278: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.218280: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.218282: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.218284: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.218298: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #22) Aug 26 13:08:28.218304: | 91 b3 02 20 d6 15 26 e3 e5 d8 02 c9 6e 9c cf bc Aug 26 13:08:28.218307: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.218309: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.218339: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.218348: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.218355: | stop processing: state #22 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.218359: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.218365: | spent 0.431 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.252668: | spent 0.00411 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.252706: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.252710: | f9 5e 09 88 fe 18 11 36 00 00 00 00 00 00 00 00 Aug 26 13:08:28.252713: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.252715: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.252718: | 00 00 00 14 01 01 00 00 80 02 00 03 80 03 00 02 Aug 26 13:08:28.252720: | 80 04 00 06 Aug 26 13:08:28.252726: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.252730: | **parse ISAKMP Message: Aug 26 13:08:28.252733: | initiator cookie: Aug 26 13:08:28.252735: | f9 5e 09 88 fe 18 11 36 Aug 26 13:08:28.252738: | responder cookie: Aug 26 13:08:28.252740: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.252744: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.252746: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.252749: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.252752: | flags: none (0x0) Aug 26 13:08:28.252755: | Message ID: 0 (0x0) Aug 26 13:08:28.252758: | length: 68 (0x44) Aug 26 13:08:28.252761: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.252765: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.252767: | #null state always idle Aug 26 13:08:28.252771: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.252774: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.252777: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.252780: | length: 40 (0x28) Aug 26 13:08:28.252783: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.252785: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.252788: | in statetime_start() with no state Aug 26 13:08:28.252794: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.252800: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.252803: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.252807: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.252810: | find_next_host_connection returns test Aug 26 13:08:28.252813: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.252816: | find_next_host_connection returns empty Aug 26 13:08:28.252840: | creating state object #23 at 0x55ea70a61d60 Aug 26 13:08:28.252844: | State DB: adding IKEv1 state #23 in UNDEFINED Aug 26 13:08:28.252848: | pstats #23 ikev1.isakmp started Aug 26 13:08:28.252853: | #23 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.252859: | start processing: state #23 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.252863: | parent state #23: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.252867: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.252870: "test" #23: responding to Main Mode Aug 26 13:08:28.252875: | **emit ISAKMP Message: Aug 26 13:08:28.252878: | initiator cookie: Aug 26 13:08:28.252880: | f9 5e 09 88 fe 18 11 36 Aug 26 13:08:28.252883: | responder cookie: Aug 26 13:08:28.252885: | 66 fa 16 d4 9f 82 b2 ad Aug 26 13:08:28.252888: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.252891: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.252894: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.252896: | flags: none (0x0) Aug 26 13:08:28.252899: | Message ID: 0 (0x0) Aug 26 13:08:28.252902: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.252905: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.252908: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.252911: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.252915: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.252918: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.252922: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.252925: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.252928: | ****parse IPsec DOI SIT: Aug 26 13:08:28.252931: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.252934: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.252937: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.252940: | length: 28 (0x1c) Aug 26 13:08:28.252942: | proposal number: 1 (0x1) Aug 26 13:08:28.252945: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.252947: | SPI size: 0 (0x0) Aug 26 13:08:28.252950: | number of transforms: 1 (0x1) Aug 26 13:08:28.252953: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.252956: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.252958: | length: 20 (0x14) Aug 26 13:08:28.252961: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.252964: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.252967: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.252970: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:08:28.252972: | length/value: 3 (0x3) Aug 26 13:08:28.252975: | [3 is OAKLEY_TIGER(UNUSED)] Aug 26 13:08:28.252979: "test" #23: OAKLEY_TIGER(UNUSED) is not supported. Attribute OAKLEY_HASH_ALGORITHM Aug 26 13:08:28.252982: "test" #23: no acceptable Oakley Transform Aug 26 13:08:28.252985: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.252990: | [RE]START processing: state #23 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.252993: | #23 is idle Aug 26 13:08:28.253090: "test" #23: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.253100: | **emit ISAKMP Message: Aug 26 13:08:28.253103: | initiator cookie: Aug 26 13:08:28.253106: | f9 5e 09 88 fe 18 11 36 Aug 26 13:08:28.253109: | responder cookie: Aug 26 13:08:28.253111: | 66 fa 16 d4 9f 82 b2 ad Aug 26 13:08:28.253114: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.253117: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.253120: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.253123: | flags: none (0x0) Aug 26 13:08:28.253125: | Message ID: 0 (0x0) Aug 26 13:08:28.253128: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.253131: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.253134: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.253137: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.253140: | protocol ID: 1 (0x1) Aug 26 13:08:28.253142: | SPI size: 0 (0x0) Aug 26 13:08:28.253145: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.253148: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.253151: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.253154: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.253157: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.253164: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #23) Aug 26 13:08:28.253167: | f9 5e 09 88 fe 18 11 36 66 fa 16 d4 9f 82 b2 ad Aug 26 13:08:28.253170: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.253172: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.253196: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.253203: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.253211: | stop processing: state #23 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.253214: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.253220: | spent 0.503 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.282109: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.282145: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.282150: | 43 58 b9 43 63 a8 4d 74 00 00 00 00 00 00 00 00 Aug 26 13:08:28.282153: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.282156: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.282158: | 00 00 00 14 01 01 00 00 80 01 00 1c 80 03 00 02 Aug 26 13:08:28.282161: | 80 04 00 06 Aug 26 13:08:28.282167: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.282173: | **parse ISAKMP Message: Aug 26 13:08:28.282176: | initiator cookie: Aug 26 13:08:28.282179: | 43 58 b9 43 63 a8 4d 74 Aug 26 13:08:28.282181: | responder cookie: Aug 26 13:08:28.282184: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.282188: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.282191: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.282194: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.282197: | flags: none (0x0) Aug 26 13:08:28.282200: | Message ID: 0 (0x0) Aug 26 13:08:28.282203: | length: 68 (0x44) Aug 26 13:08:28.282207: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.282212: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.282215: | #null state always idle Aug 26 13:08:28.282220: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.282224: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.282227: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.282230: | length: 40 (0x28) Aug 26 13:08:28.282233: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.282237: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.282240: | in statetime_start() with no state Aug 26 13:08:28.282246: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.282252: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.282255: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.282260: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.282262: | find_next_host_connection returns test Aug 26 13:08:28.282265: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.282267: | find_next_host_connection returns empty Aug 26 13:08:28.282302: | creating state object #24 at 0x55ea70a62820 Aug 26 13:08:28.282308: | State DB: adding IKEv1 state #24 in UNDEFINED Aug 26 13:08:28.282315: | pstats #24 ikev1.isakmp started Aug 26 13:08:28.282319: | #24 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.282326: | start processing: state #24 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.282330: | parent state #24: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.282334: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.282337: "test" #24: responding to Main Mode Aug 26 13:08:28.282342: | **emit ISAKMP Message: Aug 26 13:08:28.282345: | initiator cookie: Aug 26 13:08:28.282348: | 43 58 b9 43 63 a8 4d 74 Aug 26 13:08:28.282351: | responder cookie: Aug 26 13:08:28.282353: | 3f b4 6c 7f bf 2d af 09 Aug 26 13:08:28.282356: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.282358: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.282361: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.282368: | flags: none (0x0) Aug 26 13:08:28.282371: | Message ID: 0 (0x0) Aug 26 13:08:28.282374: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.282377: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.282380: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.282383: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.282386: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.282389: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.282393: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.282396: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.282399: | ****parse IPsec DOI SIT: Aug 26 13:08:28.282402: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.282405: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.282408: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.282410: | length: 28 (0x1c) Aug 26 13:08:28.282413: | proposal number: 1 (0x1) Aug 26 13:08:28.282416: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.282418: | SPI size: 0 (0x0) Aug 26 13:08:28.282421: | number of transforms: 1 (0x1) Aug 26 13:08:28.282424: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.282427: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.282430: | length: 20 (0x14) Aug 26 13:08:28.282432: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.282435: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.282438: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.282441: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.282444: | length/value: 28 (0x1c) Aug 26 13:08:28.282449: "test" #24: 28?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:28.282452: "test" #24: no acceptable Oakley Transform Aug 26 13:08:28.282455: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.282461: | [RE]START processing: state #24 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.282463: | #24 is idle Aug 26 13:08:28.282545: "test" #24: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.282550: | **emit ISAKMP Message: Aug 26 13:08:28.282553: | initiator cookie: Aug 26 13:08:28.282555: | 43 58 b9 43 63 a8 4d 74 Aug 26 13:08:28.282558: | responder cookie: Aug 26 13:08:28.282561: | 3f b4 6c 7f bf 2d af 09 Aug 26 13:08:28.282563: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.282566: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.282569: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.282572: | flags: none (0x0) Aug 26 13:08:28.282575: | Message ID: 0 (0x0) Aug 26 13:08:28.282578: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.282581: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.282584: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.282587: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.282589: | protocol ID: 1 (0x1) Aug 26 13:08:28.282592: | SPI size: 0 (0x0) Aug 26 13:08:28.282595: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.282598: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.282601: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.282605: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.282607: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.282614: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #24) Aug 26 13:08:28.282619: | 43 58 b9 43 63 a8 4d 74 3f b4 6c 7f bf 2d af 09 Aug 26 13:08:28.282622: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.282624: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.282649: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.282656: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.282661: | stop processing: state #24 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.282665: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.282670: | spent 0.524 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.316438: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.316467: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.316471: | de 8b 1f 68 ae 95 26 95 00 00 00 00 00 00 00 00 Aug 26 13:08:28.316474: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.316477: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.316479: | 00 00 00 14 01 01 00 00 80 01 00 1c 80 02 00 03 Aug 26 13:08:28.316481: | 80 04 00 06 Aug 26 13:08:28.316487: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.316491: | **parse ISAKMP Message: Aug 26 13:08:28.316494: | initiator cookie: Aug 26 13:08:28.316497: | de 8b 1f 68 ae 95 26 95 Aug 26 13:08:28.316499: | responder cookie: Aug 26 13:08:28.316501: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.316505: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.316508: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.316510: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.316513: | flags: none (0x0) Aug 26 13:08:28.316516: | Message ID: 0 (0x0) Aug 26 13:08:28.316519: | length: 68 (0x44) Aug 26 13:08:28.316522: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.316526: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.316529: | #null state always idle Aug 26 13:08:28.316532: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.316535: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.316539: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.316541: | length: 40 (0x28) Aug 26 13:08:28.316544: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.316547: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.316550: | in statetime_start() with no state Aug 26 13:08:28.316555: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.316561: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.316564: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.316568: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.316571: | find_next_host_connection returns test Aug 26 13:08:28.316573: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.316576: | find_next_host_connection returns empty Aug 26 13:08:28.316600: | creating state object #25 at 0x55ea70a632e0 Aug 26 13:08:28.316603: | State DB: adding IKEv1 state #25 in UNDEFINED Aug 26 13:08:28.316607: | pstats #25 ikev1.isakmp started Aug 26 13:08:28.316612: | #25 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.316618: | start processing: state #25 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.316622: | parent state #25: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.316625: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.316628: "test" #25: responding to Main Mode Aug 26 13:08:28.316633: | **emit ISAKMP Message: Aug 26 13:08:28.316640: | initiator cookie: Aug 26 13:08:28.316643: | de 8b 1f 68 ae 95 26 95 Aug 26 13:08:28.316645: | responder cookie: Aug 26 13:08:28.316648: | 83 fd fa 7d 3c c1 85 ca Aug 26 13:08:28.316651: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.316653: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.316656: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.316659: | flags: none (0x0) Aug 26 13:08:28.316661: | Message ID: 0 (0x0) Aug 26 13:08:28.316664: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.316667: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.316670: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.316673: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.316676: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.316679: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.316682: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.316685: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.316688: | ****parse IPsec DOI SIT: Aug 26 13:08:28.316691: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.316695: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.316697: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.316700: | length: 28 (0x1c) Aug 26 13:08:28.316703: | proposal number: 1 (0x1) Aug 26 13:08:28.316706: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.316708: | SPI size: 0 (0x0) Aug 26 13:08:28.316711: | number of transforms: 1 (0x1) Aug 26 13:08:28.316714: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.316716: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.316719: | length: 20 (0x14) Aug 26 13:08:28.316721: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.316724: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.316727: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.316730: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.316733: | length/value: 28 (0x1c) Aug 26 13:08:28.316737: "test" #25: 28?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:28.316740: "test" #25: no acceptable Oakley Transform Aug 26 13:08:28.316743: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.316748: | [RE]START processing: state #25 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.316751: | #25 is idle Aug 26 13:08:28.317130: "test" #25: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.317140: | **emit ISAKMP Message: Aug 26 13:08:28.317145: | initiator cookie: Aug 26 13:08:28.317148: | de 8b 1f 68 ae 95 26 95 Aug 26 13:08:28.317151: | responder cookie: Aug 26 13:08:28.317153: | 83 fd fa 7d 3c c1 85 ca Aug 26 13:08:28.317157: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.317160: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.317163: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.317166: | flags: none (0x0) Aug 26 13:08:28.317169: | Message ID: 0 (0x0) Aug 26 13:08:28.317172: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.317175: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.317179: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.317182: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.317185: | protocol ID: 1 (0x1) Aug 26 13:08:28.317187: | SPI size: 0 (0x0) Aug 26 13:08:28.317190: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.317194: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.317201: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.317205: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.317208: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.317216: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #25) Aug 26 13:08:28.317219: | de 8b 1f 68 ae 95 26 95 83 fd fa 7d 3c c1 85 ca Aug 26 13:08:28.317222: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.317225: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.317256: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.317265: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.317272: | stop processing: state #25 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.317276: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.317283: | spent 0.797 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.350046: | spent 0.00334 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.350076: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.350082: | 2c 14 19 36 e8 74 c0 46 00 00 00 00 00 00 00 00 Aug 26 13:08:28.350085: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.350089: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.350091: | 00 00 00 14 01 01 00 00 80 01 00 1c 80 02 00 03 Aug 26 13:08:28.350094: | 80 03 00 02 Aug 26 13:08:28.350100: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.350105: | **parse ISAKMP Message: Aug 26 13:08:28.350108: | initiator cookie: Aug 26 13:08:28.350111: | 2c 14 19 36 e8 74 c0 46 Aug 26 13:08:28.350114: | responder cookie: Aug 26 13:08:28.350117: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.350121: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.350124: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.350127: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.350130: | flags: none (0x0) Aug 26 13:08:28.350133: | Message ID: 0 (0x0) Aug 26 13:08:28.350136: | length: 68 (0x44) Aug 26 13:08:28.350140: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.350144: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.350148: | #null state always idle Aug 26 13:08:28.350152: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.350155: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.350159: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.350162: | length: 40 (0x28) Aug 26 13:08:28.350165: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.350168: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.350171: | in statetime_start() with no state Aug 26 13:08:28.350178: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.350184: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.350188: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.350192: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.350196: | find_next_host_connection returns test Aug 26 13:08:28.350199: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.350201: | find_next_host_connection returns empty Aug 26 13:08:28.350229: | creating state object #26 at 0x55ea70a63da0 Aug 26 13:08:28.350233: | State DB: adding IKEv1 state #26 in UNDEFINED Aug 26 13:08:28.350238: | pstats #26 ikev1.isakmp started Aug 26 13:08:28.350242: | #26 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.350254: | start processing: state #26 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.350259: | parent state #26: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.350262: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.350266: "test" #26: responding to Main Mode Aug 26 13:08:28.350271: | **emit ISAKMP Message: Aug 26 13:08:28.350275: | initiator cookie: Aug 26 13:08:28.350277: | 2c 14 19 36 e8 74 c0 46 Aug 26 13:08:28.350280: | responder cookie: Aug 26 13:08:28.350282: | f9 66 d0 bf a7 96 80 50 Aug 26 13:08:28.350285: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.350292: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.350298: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.350301: | flags: none (0x0) Aug 26 13:08:28.350303: | Message ID: 0 (0x0) Aug 26 13:08:28.350306: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.350310: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.350313: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.350315: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.350318: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.350321: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.350325: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.350328: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.350331: | ****parse IPsec DOI SIT: Aug 26 13:08:28.350334: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.350337: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.350340: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.350342: | length: 28 (0x1c) Aug 26 13:08:28.350345: | proposal number: 1 (0x1) Aug 26 13:08:28.350348: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.350350: | SPI size: 0 (0x0) Aug 26 13:08:28.350353: | number of transforms: 1 (0x1) Aug 26 13:08:28.350356: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.350359: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.350361: | length: 20 (0x14) Aug 26 13:08:28.350364: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.350367: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.350370: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.350373: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.350375: | length/value: 28 (0x1c) Aug 26 13:08:28.350380: "test" #26: 28?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:28.350383: "test" #26: no acceptable Oakley Transform Aug 26 13:08:28.350386: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.350391: | [RE]START processing: state #26 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.350394: | #26 is idle Aug 26 13:08:28.350464: "test" #26: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.350468: | **emit ISAKMP Message: Aug 26 13:08:28.350471: | initiator cookie: Aug 26 13:08:28.350474: | 2c 14 19 36 e8 74 c0 46 Aug 26 13:08:28.350476: | responder cookie: Aug 26 13:08:28.350479: | f9 66 d0 bf a7 96 80 50 Aug 26 13:08:28.350481: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.350484: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.350487: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.350490: | flags: none (0x0) Aug 26 13:08:28.350492: | Message ID: 0 (0x0) Aug 26 13:08:28.350495: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.350498: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.350504: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.350507: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.350509: | protocol ID: 1 (0x1) Aug 26 13:08:28.350512: | SPI size: 0 (0x0) Aug 26 13:08:28.350515: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.350518: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.350521: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.350524: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.350527: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.350533: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #26) Aug 26 13:08:28.350536: | 2c 14 19 36 e8 74 c0 46 f9 66 d0 bf a7 96 80 50 Aug 26 13:08:28.350539: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.350541: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.350573: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.350580: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.350585: | stop processing: state #26 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.350588: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.350594: | spent 0.509 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.383590: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.383625: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.383629: | 77 41 73 f0 4a 92 9e 36 00 00 00 00 00 00 00 00 Aug 26 13:08:28.383632: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 13:08:28.383635: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 13:08:28.383637: | 00 00 00 18 01 01 00 00 80 01 00 1e 80 02 00 01 Aug 26 13:08:28.383640: | 80 03 00 18 80 04 00 16 Aug 26 13:08:28.383645: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.383649: | **parse ISAKMP Message: Aug 26 13:08:28.383653: | initiator cookie: Aug 26 13:08:28.383655: | 77 41 73 f0 4a 92 9e 36 Aug 26 13:08:28.383658: | responder cookie: Aug 26 13:08:28.383660: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.383663: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.383666: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.383669: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.383672: | flags: none (0x0) Aug 26 13:08:28.383675: | Message ID: 0 (0x0) Aug 26 13:08:28.383677: | length: 72 (0x48) Aug 26 13:08:28.383681: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.383685: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.383688: | #null state always idle Aug 26 13:08:28.383692: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.383695: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.383698: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.383701: | length: 44 (0x2c) Aug 26 13:08:28.383703: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.383706: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.383709: | in statetime_start() with no state Aug 26 13:08:28.383715: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.383721: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.383724: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.383728: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.383730: | find_next_host_connection returns test Aug 26 13:08:28.383739: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.383743: | find_next_host_connection returns empty Aug 26 13:08:28.383770: | creating state object #27 at 0x55ea70a64860 Aug 26 13:08:28.383774: | State DB: adding IKEv1 state #27 in UNDEFINED Aug 26 13:08:28.383779: | pstats #27 ikev1.isakmp started Aug 26 13:08:28.383784: | #27 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.383790: | start processing: state #27 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.383795: | parent state #27: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.383799: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.383802: "test" #27: responding to Main Mode Aug 26 13:08:28.383807: | **emit ISAKMP Message: Aug 26 13:08:28.383810: | initiator cookie: Aug 26 13:08:28.383813: | 77 41 73 f0 4a 92 9e 36 Aug 26 13:08:28.383815: | responder cookie: Aug 26 13:08:28.383818: | 78 07 a9 1f 90 7a 19 8f Aug 26 13:08:28.383820: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.383823: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.383826: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.383829: | flags: none (0x0) Aug 26 13:08:28.383831: | Message ID: 0 (0x0) Aug 26 13:08:28.383835: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.383838: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.383841: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.383844: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.383846: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.383850: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.383853: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.383857: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.383860: | ****parse IPsec DOI SIT: Aug 26 13:08:28.383863: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.383866: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.383869: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.383871: | length: 32 (0x20) Aug 26 13:08:28.383874: | proposal number: 1 (0x1) Aug 26 13:08:28.383877: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.383879: | SPI size: 0 (0x0) Aug 26 13:08:28.383882: | number of transforms: 1 (0x1) Aug 26 13:08:28.383885: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.383888: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.383890: | length: 24 (0x18) Aug 26 13:08:28.383893: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.383896: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.383899: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.383902: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.383905: | length/value: 30 (0x1e) Aug 26 13:08:28.383909: "test" #27: 30?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:28.383912: "test" #27: no acceptable Oakley Transform Aug 26 13:08:28.383916: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.383921: | [RE]START processing: state #27 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.383924: | #27 is idle Aug 26 13:08:28.384011: "test" #27: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.384021: | **emit ISAKMP Message: Aug 26 13:08:28.384025: | initiator cookie: Aug 26 13:08:28.384028: | 77 41 73 f0 4a 92 9e 36 Aug 26 13:08:28.384031: | responder cookie: Aug 26 13:08:28.384033: | 78 07 a9 1f 90 7a 19 8f Aug 26 13:08:28.384036: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.384042: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.384045: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.384048: | flags: none (0x0) Aug 26 13:08:28.384051: | Message ID: 0 (0x0) Aug 26 13:08:28.384054: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.384057: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.384060: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.384063: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.384066: | protocol ID: 1 (0x1) Aug 26 13:08:28.384069: | SPI size: 0 (0x0) Aug 26 13:08:28.384071: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.384075: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.384078: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.384082: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.384084: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.384091: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #27) Aug 26 13:08:28.384094: | 77 41 73 f0 4a 92 9e 36 78 07 a9 1f 90 7a 19 8f Aug 26 13:08:28.384097: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.384100: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.384131: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.384138: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.384144: | stop processing: state #27 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.384148: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.384154: | spent 0.512 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.420658: | spent 0.00355 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.420692: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.420697: | 42 c6 c9 3f 7c cd 82 93 00 00 00 00 00 00 00 00 Aug 26 13:08:28.420700: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.420703: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.420706: | 00 00 00 14 01 01 00 00 80 02 00 01 80 03 00 18 Aug 26 13:08:28.420709: | 80 04 00 16 Aug 26 13:08:28.420715: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.420720: | **parse ISAKMP Message: Aug 26 13:08:28.420723: | initiator cookie: Aug 26 13:08:28.420726: | 42 c6 c9 3f 7c cd 82 93 Aug 26 13:08:28.420729: | responder cookie: Aug 26 13:08:28.420732: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.420736: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.420739: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.420743: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.420746: | flags: none (0x0) Aug 26 13:08:28.420749: | Message ID: 0 (0x0) Aug 26 13:08:28.420752: | length: 68 (0x44) Aug 26 13:08:28.420756: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.420761: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.420764: | #null state always idle Aug 26 13:08:28.420768: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.420772: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.420775: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.420778: | length: 40 (0x28) Aug 26 13:08:28.420781: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.420785: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.420788: | in statetime_start() with no state Aug 26 13:08:28.420795: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.420805: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.420809: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.420814: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.420817: | find_next_host_connection returns test Aug 26 13:08:28.420821: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.420824: | find_next_host_connection returns empty Aug 26 13:08:28.420848: | creating state object #28 at 0x55ea70a65320 Aug 26 13:08:28.420852: | State DB: adding IKEv1 state #28 in UNDEFINED Aug 26 13:08:28.420857: | pstats #28 ikev1.isakmp started Aug 26 13:08:28.420863: | #28 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.420871: | start processing: state #28 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.420875: | parent state #28: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.420880: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.420883: "test" #28: responding to Main Mode Aug 26 13:08:28.420889: | **emit ISAKMP Message: Aug 26 13:08:28.420892: | initiator cookie: Aug 26 13:08:28.420895: | 42 c6 c9 3f 7c cd 82 93 Aug 26 13:08:28.420898: | responder cookie: Aug 26 13:08:28.420901: | c0 ba cb c1 0c 79 c8 5d Aug 26 13:08:28.420904: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.420908: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.420911: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.420914: | flags: none (0x0) Aug 26 13:08:28.420917: | Message ID: 0 (0x0) Aug 26 13:08:28.420920: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.420924: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.420928: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.420931: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.420935: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.420939: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.420944: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.420948: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.420951: | ****parse IPsec DOI SIT: Aug 26 13:08:28.420955: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.420958: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.420962: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.420965: | length: 28 (0x1c) Aug 26 13:08:28.420968: | proposal number: 1 (0x1) Aug 26 13:08:28.420971: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.420974: | SPI size: 0 (0x0) Aug 26 13:08:28.420977: | number of transforms: 1 (0x1) Aug 26 13:08:28.420981: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.420984: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.420987: | length: 20 (0x14) Aug 26 13:08:28.420990: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.420993: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.420997: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.421000: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:08:28.421003: | length/value: 1 (0x1) Aug 26 13:08:28.421007: | [1 is OAKLEY_MD5] Aug 26 13:08:28.421011: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.421014: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:08:28.421017: | length/value: 24 (0x18) Aug 26 13:08:28.421021: "test" #28: Pluto does not support 24?? authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Aug 26 13:08:28.421025: "test" #28: no acceptable Oakley Transform Aug 26 13:08:28.421030: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.421037: | [RE]START processing: state #28 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.421040: | #28 is idle Aug 26 13:08:28.422071: "test" #28: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.422082: | **emit ISAKMP Message: Aug 26 13:08:28.422086: | initiator cookie: Aug 26 13:08:28.422089: | 42 c6 c9 3f 7c cd 82 93 Aug 26 13:08:28.422092: | responder cookie: Aug 26 13:08:28.422095: | c0 ba cb c1 0c 79 c8 5d Aug 26 13:08:28.422098: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.422102: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.422105: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.422108: | flags: none (0x0) Aug 26 13:08:28.422111: | Message ID: 0 (0x0) Aug 26 13:08:28.422115: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.422119: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.422122: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.422125: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.422128: | protocol ID: 1 (0x1) Aug 26 13:08:28.422131: | SPI size: 0 (0x0) Aug 26 13:08:28.422135: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.422139: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.422143: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.422147: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.422150: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.422158: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #28) Aug 26 13:08:28.422162: | 42 c6 c9 3f 7c cd 82 93 c0 ba cb c1 0c 79 c8 5d Aug 26 13:08:28.422165: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.422168: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.422203: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.422211: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.422217: | stop processing: state #28 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.422221: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.422228: | spent 0.588 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.458929: | spent 0.00377 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.458956: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.458961: | c0 2a 56 13 cd 2d 12 b0 00 00 00 00 00 00 00 00 Aug 26 13:08:28.458965: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.458968: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.458971: | 00 00 00 14 01 01 00 00 80 01 00 1e 80 03 00 18 Aug 26 13:08:28.458974: | 80 04 00 16 Aug 26 13:08:28.458979: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.458984: | **parse ISAKMP Message: Aug 26 13:08:28.458988: | initiator cookie: Aug 26 13:08:28.458991: | c0 2a 56 13 cd 2d 12 b0 Aug 26 13:08:28.458994: | responder cookie: Aug 26 13:08:28.458997: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.459000: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.459003: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.459006: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.459009: | flags: none (0x0) Aug 26 13:08:28.459012: | Message ID: 0 (0x0) Aug 26 13:08:28.459015: | length: 68 (0x44) Aug 26 13:08:28.459019: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.459028: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.459032: | #null state always idle Aug 26 13:08:28.459035: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.459039: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.459042: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.459045: | length: 40 (0x28) Aug 26 13:08:28.459048: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.459051: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.459054: | in statetime_start() with no state Aug 26 13:08:28.459061: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.459067: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.459070: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.459075: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.459078: | find_next_host_connection returns test Aug 26 13:08:28.459081: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.459083: | find_next_host_connection returns empty Aug 26 13:08:28.459110: | creating state object #29 at 0x55ea70a65de0 Aug 26 13:08:28.459114: | State DB: adding IKEv1 state #29 in UNDEFINED Aug 26 13:08:28.459120: | pstats #29 ikev1.isakmp started Aug 26 13:08:28.459125: | #29 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.459132: | start processing: state #29 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.459136: | parent state #29: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.459140: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.459143: "test" #29: responding to Main Mode Aug 26 13:08:28.459148: | **emit ISAKMP Message: Aug 26 13:08:28.459151: | initiator cookie: Aug 26 13:08:28.459153: | c0 2a 56 13 cd 2d 12 b0 Aug 26 13:08:28.459156: | responder cookie: Aug 26 13:08:28.459159: | 3d 8c f7 40 d8 c1 33 7a Aug 26 13:08:28.459161: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.459164: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.459167: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.459170: | flags: none (0x0) Aug 26 13:08:28.459172: | Message ID: 0 (0x0) Aug 26 13:08:28.459176: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.459179: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.459182: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.459185: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.459188: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.459191: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.459194: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.459197: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.459200: | ****parse IPsec DOI SIT: Aug 26 13:08:28.459203: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.459207: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.459210: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.459213: | length: 28 (0x1c) Aug 26 13:08:28.459216: | proposal number: 1 (0x1) Aug 26 13:08:28.459219: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.459221: | SPI size: 0 (0x0) Aug 26 13:08:28.459224: | number of transforms: 1 (0x1) Aug 26 13:08:28.459226: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.459229: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.459232: | length: 20 (0x14) Aug 26 13:08:28.459237: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.459240: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.459242: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.459245: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.459248: | length/value: 30 (0x1e) Aug 26 13:08:28.459253: "test" #29: 30?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:28.459256: "test" #29: no acceptable Oakley Transform Aug 26 13:08:28.459259: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.459264: | [RE]START processing: state #29 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.459267: | #29 is idle Aug 26 13:08:28.459367: "test" #29: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.459374: | **emit ISAKMP Message: Aug 26 13:08:28.459378: | initiator cookie: Aug 26 13:08:28.459381: | c0 2a 56 13 cd 2d 12 b0 Aug 26 13:08:28.459384: | responder cookie: Aug 26 13:08:28.459387: | 3d 8c f7 40 d8 c1 33 7a Aug 26 13:08:28.459390: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.459393: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.459396: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.459399: | flags: none (0x0) Aug 26 13:08:28.459402: | Message ID: 0 (0x0) Aug 26 13:08:28.459405: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.459409: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.459412: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.459415: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.459418: | protocol ID: 1 (0x1) Aug 26 13:08:28.459421: | SPI size: 0 (0x0) Aug 26 13:08:28.459424: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.459427: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.459430: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.459433: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.459436: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.459443: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #29) Aug 26 13:08:28.459447: | c0 2a 56 13 cd 2d 12 b0 3d 8c f7 40 d8 c1 33 7a Aug 26 13:08:28.459450: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.459452: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.459483: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.459490: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.459496: | stop processing: state #29 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.459500: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.459506: | spent 0.517 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.493174: | spent 0.00361 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.493196: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.493199: | da af a3 b8 ef 91 15 f6 00 00 00 00 00 00 00 00 Aug 26 13:08:28.493201: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.493203: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.493204: | 00 00 00 14 01 01 00 00 80 01 00 1e 80 02 00 01 Aug 26 13:08:28.493206: | 80 04 00 16 Aug 26 13:08:28.493209: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.493212: | **parse ISAKMP Message: Aug 26 13:08:28.493214: | initiator cookie: Aug 26 13:08:28.493216: | da af a3 b8 ef 91 15 f6 Aug 26 13:08:28.493218: | responder cookie: Aug 26 13:08:28.493221: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.493223: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.493230: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.493233: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.493236: | flags: none (0x0) Aug 26 13:08:28.493239: | Message ID: 0 (0x0) Aug 26 13:08:28.493241: | length: 68 (0x44) Aug 26 13:08:28.493245: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.493249: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.493252: | #null state always idle Aug 26 13:08:28.493256: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.493259: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.493262: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.493265: | length: 40 (0x28) Aug 26 13:08:28.493267: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.493270: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.493273: | in statetime_start() with no state Aug 26 13:08:28.493279: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.493285: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.493293: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.493299: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.493302: | find_next_host_connection returns test Aug 26 13:08:28.493304: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.493307: | find_next_host_connection returns empty Aug 26 13:08:28.493336: | creating state object #30 at 0x55ea70a668a0 Aug 26 13:08:28.493340: | State DB: adding IKEv1 state #30 in UNDEFINED Aug 26 13:08:28.493345: | pstats #30 ikev1.isakmp started Aug 26 13:08:28.493350: | #30 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.493357: | start processing: state #30 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.493361: | parent state #30: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.493365: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.493369: "test" #30: responding to Main Mode Aug 26 13:08:28.493374: | **emit ISAKMP Message: Aug 26 13:08:28.493378: | initiator cookie: Aug 26 13:08:28.493380: | da af a3 b8 ef 91 15 f6 Aug 26 13:08:28.493382: | responder cookie: Aug 26 13:08:28.493385: | 08 c6 b4 7c c2 a6 a4 1b Aug 26 13:08:28.493388: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.493390: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.493393: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.493396: | flags: none (0x0) Aug 26 13:08:28.493398: | Message ID: 0 (0x0) Aug 26 13:08:28.493401: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.493405: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.493407: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.493410: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.493412: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.493415: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.493418: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.493421: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.493424: | ****parse IPsec DOI SIT: Aug 26 13:08:28.493427: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.493430: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.493433: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.493435: | length: 28 (0x1c) Aug 26 13:08:28.493440: | proposal number: 1 (0x1) Aug 26 13:08:28.493442: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.493445: | SPI size: 0 (0x0) Aug 26 13:08:28.493447: | number of transforms: 1 (0x1) Aug 26 13:08:28.493450: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.493453: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.493455: | length: 20 (0x14) Aug 26 13:08:28.493457: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.493460: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.493463: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.493466: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.493468: | length/value: 30 (0x1e) Aug 26 13:08:28.493473: "test" #30: 30?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:28.493476: "test" #30: no acceptable Oakley Transform Aug 26 13:08:28.493479: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.493484: | [RE]START processing: state #30 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.493487: | #30 is idle Aug 26 13:08:28.494005: "test" #30: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.494018: | **emit ISAKMP Message: Aug 26 13:08:28.494023: | initiator cookie: Aug 26 13:08:28.494026: | da af a3 b8 ef 91 15 f6 Aug 26 13:08:28.494028: | responder cookie: Aug 26 13:08:28.494031: | 08 c6 b4 7c c2 a6 a4 1b Aug 26 13:08:28.494034: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.494037: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.494040: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.494043: | flags: none (0x0) Aug 26 13:08:28.494046: | Message ID: 0 (0x0) Aug 26 13:08:28.494049: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.494053: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.494055: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.494058: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.494061: | protocol ID: 1 (0x1) Aug 26 13:08:28.494064: | SPI size: 0 (0x0) Aug 26 13:08:28.494067: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.494071: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.494074: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.494078: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.494081: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.494087: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #30) Aug 26 13:08:28.494090: | da af a3 b8 ef 91 15 f6 08 c6 b4 7c c2 a6 a4 1b Aug 26 13:08:28.494093: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.494095: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.494129: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.494136: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.494142: | stop processing: state #30 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.494145: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.494152: | spent 0.495 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.525048: | spent 0.00353 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.525083: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.525089: | bb 2c 7f bb ec 49 ff 82 00 00 00 00 00 00 00 00 Aug 26 13:08:28.525092: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.525095: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.525097: | 00 00 00 14 01 01 00 00 80 01 00 1e 80 02 00 01 Aug 26 13:08:28.525105: | 80 03 00 18 Aug 26 13:08:28.525111: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.525116: | **parse ISAKMP Message: Aug 26 13:08:28.525120: | initiator cookie: Aug 26 13:08:28.525122: | bb 2c 7f bb ec 49 ff 82 Aug 26 13:08:28.525125: | responder cookie: Aug 26 13:08:28.525128: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.525131: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.525134: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.525137: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.525140: | flags: none (0x0) Aug 26 13:08:28.525143: | Message ID: 0 (0x0) Aug 26 13:08:28.525146: | length: 68 (0x44) Aug 26 13:08:28.525150: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.525154: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.525158: | #null state always idle Aug 26 13:08:28.525162: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.525166: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.525169: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.525172: | length: 40 (0x28) Aug 26 13:08:28.525174: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.525178: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.525181: | in statetime_start() with no state Aug 26 13:08:28.525187: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.525194: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.525197: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.525202: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.525205: | find_next_host_connection returns test Aug 26 13:08:28.525208: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.525211: | find_next_host_connection returns empty Aug 26 13:08:28.525238: | creating state object #31 at 0x55ea70a67360 Aug 26 13:08:28.525242: | State DB: adding IKEv1 state #31 in UNDEFINED Aug 26 13:08:28.525247: | pstats #31 ikev1.isakmp started Aug 26 13:08:28.525251: | #31 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.525258: | start processing: state #31 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.525262: | parent state #31: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.525266: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.525269: "test" #31: responding to Main Mode Aug 26 13:08:28.525274: | **emit ISAKMP Message: Aug 26 13:08:28.525277: | initiator cookie: Aug 26 13:08:28.525280: | bb 2c 7f bb ec 49 ff 82 Aug 26 13:08:28.525282: | responder cookie: Aug 26 13:08:28.525285: | 89 8a be be e0 45 41 1b Aug 26 13:08:28.525328: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.525344: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.525353: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.525361: | flags: none (0x0) Aug 26 13:08:28.525364: | Message ID: 0 (0x0) Aug 26 13:08:28.525368: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.525371: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.525374: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.525376: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.525379: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.525382: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.525385: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.525391: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.525395: | ****parse IPsec DOI SIT: Aug 26 13:08:28.525398: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.525401: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.525403: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.525406: | length: 28 (0x1c) Aug 26 13:08:28.525408: | proposal number: 1 (0x1) Aug 26 13:08:28.525411: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.525414: | SPI size: 0 (0x0) Aug 26 13:08:28.525416: | number of transforms: 1 (0x1) Aug 26 13:08:28.525420: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.525423: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.525425: | length: 20 (0x14) Aug 26 13:08:28.525428: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.525430: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.525433: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.525436: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.525439: | length/value: 30 (0x1e) Aug 26 13:08:28.525445: "test" #31: 30?? is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:28.525448: "test" #31: no acceptable Oakley Transform Aug 26 13:08:28.525451: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.525455: | [RE]START processing: state #31 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.525457: | #31 is idle Aug 26 13:08:28.525838: "test" #31: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.525846: | **emit ISAKMP Message: Aug 26 13:08:28.525850: | initiator cookie: Aug 26 13:08:28.525852: | bb 2c 7f bb ec 49 ff 82 Aug 26 13:08:28.525854: | responder cookie: Aug 26 13:08:28.525856: | 89 8a be be e0 45 41 1b Aug 26 13:08:28.525859: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.525862: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.525864: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.525867: | flags: none (0x0) Aug 26 13:08:28.525869: | Message ID: 0 (0x0) Aug 26 13:08:28.525872: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.525876: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.525879: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.525881: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.525884: | protocol ID: 1 (0x1) Aug 26 13:08:28.525886: | SPI size: 0 (0x0) Aug 26 13:08:28.525888: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.525891: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.525894: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.525896: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.525899: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.525904: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #31) Aug 26 13:08:28.525907: | bb 2c 7f bb ec 49 ff 82 89 8a be be e0 45 41 1b Aug 26 13:08:28.525909: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.525911: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.525948: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.525954: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.525960: | stop processing: state #31 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.525964: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.525971: | spent 0.538 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.562095: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.562127: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.562131: | 7f ad 00 c6 21 5b 20 08 00 00 00 00 00 00 00 00 Aug 26 13:08:28.562134: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 13:08:28.562137: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 13:08:28.562139: | 00 00 00 18 01 01 00 00 80 01 00 0d 80 02 00 1e Aug 26 13:08:28.562142: | 80 03 00 10 80 04 00 1d Aug 26 13:08:28.562147: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.562152: | **parse ISAKMP Message: Aug 26 13:08:28.562155: | initiator cookie: Aug 26 13:08:28.562158: | 7f ad 00 c6 21 5b 20 08 Aug 26 13:08:28.562160: | responder cookie: Aug 26 13:08:28.562163: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.562166: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.562169: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.562172: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.562175: | flags: none (0x0) Aug 26 13:08:28.562177: | Message ID: 0 (0x0) Aug 26 13:08:28.562180: | length: 72 (0x48) Aug 26 13:08:28.562183: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.562187: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.562190: | #null state always idle Aug 26 13:08:28.562194: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.562197: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.562200: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.562202: | length: 44 (0x2c) Aug 26 13:08:28.562205: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.562208: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.562211: | in statetime_start() with no state Aug 26 13:08:28.562217: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.562222: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.562225: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.562230: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.562233: | find_next_host_connection returns test Aug 26 13:08:28.562236: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.562239: | find_next_host_connection returns empty Aug 26 13:08:28.562264: | creating state object #32 at 0x55ea70a67e20 Aug 26 13:08:28.562268: | State DB: adding IKEv1 state #32 in UNDEFINED Aug 26 13:08:28.562272: | pstats #32 ikev1.isakmp started Aug 26 13:08:28.562277: | #32 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.562283: | start processing: state #32 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.562291: | parent state #32: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.562297: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.562301: "test" #32: responding to Main Mode Aug 26 13:08:28.562306: | **emit ISAKMP Message: Aug 26 13:08:28.562309: | initiator cookie: Aug 26 13:08:28.562312: | 7f ad 00 c6 21 5b 20 08 Aug 26 13:08:28.562314: | responder cookie: Aug 26 13:08:28.562317: | 17 8b 96 12 79 e4 52 b4 Aug 26 13:08:28.562319: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.562322: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.562326: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.562328: | flags: none (0x0) Aug 26 13:08:28.562331: | Message ID: 0 (0x0) Aug 26 13:08:28.562335: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.562338: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.562341: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.562344: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.562348: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.562352: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.562355: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.562359: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.562362: | ****parse IPsec DOI SIT: Aug 26 13:08:28.562365: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.562368: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.562371: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.562374: | length: 32 (0x20) Aug 26 13:08:28.562376: | proposal number: 1 (0x1) Aug 26 13:08:28.562379: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.562381: | SPI size: 0 (0x0) Aug 26 13:08:28.562384: | number of transforms: 1 (0x1) Aug 26 13:08:28.562387: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.562390: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.562392: | length: 24 (0x18) Aug 26 13:08:28.562394: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.562397: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.562401: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.562404: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.562407: | length/value: 13 (0xd) Aug 26 13:08:28.562410: | [13 is OAKLEY_AES_CTR] Aug 26 13:08:28.562413: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.562416: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:08:28.562419: | length/value: 30 (0x1e) Aug 26 13:08:28.562424: "test" #32: 30?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Aug 26 13:08:28.562427: "test" #32: no acceptable Oakley Transform Aug 26 13:08:28.562431: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.562437: | [RE]START processing: state #32 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.562441: | #32 is idle Aug 26 13:08:28.562507: "test" #32: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.562513: | **emit ISAKMP Message: Aug 26 13:08:28.562516: | initiator cookie: Aug 26 13:08:28.562518: | 7f ad 00 c6 21 5b 20 08 Aug 26 13:08:28.562521: | responder cookie: Aug 26 13:08:28.562524: | 17 8b 96 12 79 e4 52 b4 Aug 26 13:08:28.562527: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.562529: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.562532: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.562535: | flags: none (0x0) Aug 26 13:08:28.562538: | Message ID: 0 (0x0) Aug 26 13:08:28.562541: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.562544: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.562547: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.562549: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.562552: | protocol ID: 1 (0x1) Aug 26 13:08:28.562555: | SPI size: 0 (0x0) Aug 26 13:08:28.562557: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.562561: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.562564: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.562567: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.562570: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.562576: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #32) Aug 26 13:08:28.562579: | 7f ad 00 c6 21 5b 20 08 17 8b 96 12 79 e4 52 b4 Aug 26 13:08:28.562582: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.562587: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.562612: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.562618: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.562624: | stop processing: state #32 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.562628: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.562634: | spent 0.503 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.599887: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.599919: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.599923: | 42 4f 38 3a 85 7d c9 d9 00 00 00 00 00 00 00 00 Aug 26 13:08:28.599926: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.599928: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.599931: | 00 00 00 14 01 01 00 00 80 02 00 1e 80 03 00 10 Aug 26 13:08:28.599933: | 80 04 00 1d Aug 26 13:08:28.599939: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.599943: | **parse ISAKMP Message: Aug 26 13:08:28.599946: | initiator cookie: Aug 26 13:08:28.599949: | 42 4f 38 3a 85 7d c9 d9 Aug 26 13:08:28.599951: | responder cookie: Aug 26 13:08:28.599954: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.599957: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.599960: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.599963: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.599966: | flags: none (0x0) Aug 26 13:08:28.599968: | Message ID: 0 (0x0) Aug 26 13:08:28.599971: | length: 68 (0x44) Aug 26 13:08:28.599974: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.599979: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.599982: | #null state always idle Aug 26 13:08:28.599986: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.599989: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.599992: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.599995: | length: 40 (0x28) Aug 26 13:08:28.599997: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.600000: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.600003: | in statetime_start() with no state Aug 26 13:08:28.600009: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.600015: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.600018: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.600022: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.600025: | find_next_host_connection returns test Aug 26 13:08:28.600028: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.600031: | find_next_host_connection returns empty Aug 26 13:08:28.600055: | creating state object #33 at 0x55ea70a688e0 Aug 26 13:08:28.600058: | State DB: adding IKEv1 state #33 in UNDEFINED Aug 26 13:08:28.600063: | pstats #33 ikev1.isakmp started Aug 26 13:08:28.600068: | #33 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.600074: | start processing: state #33 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.600078: | parent state #33: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.600081: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.600085: "test" #33: responding to Main Mode Aug 26 13:08:28.600090: | **emit ISAKMP Message: Aug 26 13:08:28.600093: | initiator cookie: Aug 26 13:08:28.600095: | 42 4f 38 3a 85 7d c9 d9 Aug 26 13:08:28.600098: | responder cookie: Aug 26 13:08:28.600100: | b5 8b b6 41 5d 28 ea f8 Aug 26 13:08:28.600107: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.600110: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.600113: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.600115: | flags: none (0x0) Aug 26 13:08:28.600118: | Message ID: 0 (0x0) Aug 26 13:08:28.600121: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.600125: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.600128: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.600131: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.600133: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.600137: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.600140: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.600143: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.600147: | ****parse IPsec DOI SIT: Aug 26 13:08:28.600150: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.600153: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.600155: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.600158: | length: 28 (0x1c) Aug 26 13:08:28.600161: | proposal number: 1 (0x1) Aug 26 13:08:28.600163: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.600166: | SPI size: 0 (0x0) Aug 26 13:08:28.600169: | number of transforms: 1 (0x1) Aug 26 13:08:28.600172: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.600174: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.600177: | length: 20 (0x14) Aug 26 13:08:28.600180: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.600182: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.600185: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.600188: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:08:28.600191: | length/value: 30 (0x1e) Aug 26 13:08:28.600196: "test" #33: 30?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Aug 26 13:08:28.600199: "test" #33: no acceptable Oakley Transform Aug 26 13:08:28.600202: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.600207: | [RE]START processing: state #33 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.600210: | #33 is idle Aug 26 13:08:28.600304: "test" #33: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.600317: | **emit ISAKMP Message: Aug 26 13:08:28.600320: | initiator cookie: Aug 26 13:08:28.600323: | 42 4f 38 3a 85 7d c9 d9 Aug 26 13:08:28.600326: | responder cookie: Aug 26 13:08:28.600328: | b5 8b b6 41 5d 28 ea f8 Aug 26 13:08:28.600331: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.600334: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.600337: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.600340: | flags: none (0x0) Aug 26 13:08:28.600342: | Message ID: 0 (0x0) Aug 26 13:08:28.600346: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.600349: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.600352: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.600354: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.600357: | protocol ID: 1 (0x1) Aug 26 13:08:28.600360: | SPI size: 0 (0x0) Aug 26 13:08:28.600362: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.600366: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.600369: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.600375: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.600377: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.600384: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #33) Aug 26 13:08:28.600387: | 42 4f 38 3a 85 7d c9 d9 b5 8b b6 41 5d 28 ea f8 Aug 26 13:08:28.600390: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.600392: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.600422: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.600428: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.600434: | stop processing: state #33 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.600437: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.600443: | spent 0.495 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.638240: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.638268: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.638272: | a6 54 ad 3e f4 0c 6d fd 00 00 00 00 00 00 00 00 Aug 26 13:08:28.638275: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.638278: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.638280: | 00 00 00 14 01 01 00 00 80 01 00 0d 80 03 00 10 Aug 26 13:08:28.638283: | 80 04 00 1d Aug 26 13:08:28.638292: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.638298: | **parse ISAKMP Message: Aug 26 13:08:28.638301: | initiator cookie: Aug 26 13:08:28.638304: | a6 54 ad 3e f4 0c 6d fd Aug 26 13:08:28.638306: | responder cookie: Aug 26 13:08:28.638309: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.638312: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.638315: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.638318: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.638321: | flags: none (0x0) Aug 26 13:08:28.638324: | Message ID: 0 (0x0) Aug 26 13:08:28.638326: | length: 68 (0x44) Aug 26 13:08:28.638329: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.638334: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.638337: | #null state always idle Aug 26 13:08:28.638340: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.638344: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.638346: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.638349: | length: 40 (0x28) Aug 26 13:08:28.638352: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.638355: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.638358: | in statetime_start() with no state Aug 26 13:08:28.638363: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.638369: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.638372: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.638376: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.638379: | find_next_host_connection returns test Aug 26 13:08:28.638381: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.638384: | find_next_host_connection returns empty Aug 26 13:08:28.638404: | creating state object #34 at 0x55ea70a693a0 Aug 26 13:08:28.638407: | State DB: adding IKEv1 state #34 in UNDEFINED Aug 26 13:08:28.638412: | pstats #34 ikev1.isakmp started Aug 26 13:08:28.638417: | #34 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.638423: | start processing: state #34 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.638427: | parent state #34: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.638433: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.638436: "test" #34: responding to Main Mode Aug 26 13:08:28.638441: | **emit ISAKMP Message: Aug 26 13:08:28.638444: | initiator cookie: Aug 26 13:08:28.638446: | a6 54 ad 3e f4 0c 6d fd Aug 26 13:08:28.638449: | responder cookie: Aug 26 13:08:28.638452: | ae e0 88 82 65 2c 61 47 Aug 26 13:08:28.638454: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.638457: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.638460: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.638463: | flags: none (0x0) Aug 26 13:08:28.638465: | Message ID: 0 (0x0) Aug 26 13:08:28.638468: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.638471: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.638474: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.638477: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.638480: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.638483: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.638487: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.638490: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.638493: | ****parse IPsec DOI SIT: Aug 26 13:08:28.638496: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.638499: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.638502: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.638505: | length: 28 (0x1c) Aug 26 13:08:28.638507: | proposal number: 1 (0x1) Aug 26 13:08:28.638510: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.638513: | SPI size: 0 (0x0) Aug 26 13:08:28.638515: | number of transforms: 1 (0x1) Aug 26 13:08:28.638518: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.638521: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.638524: | length: 20 (0x14) Aug 26 13:08:28.638526: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.638529: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.638532: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.638535: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.638537: | length/value: 13 (0xd) Aug 26 13:08:28.638541: | [13 is OAKLEY_AES_CTR] Aug 26 13:08:28.638544: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.638547: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:08:28.638550: | length/value: 16 (0x10) Aug 26 13:08:28.638554: "test" #34: Pluto does not support 16?? authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Aug 26 13:08:28.638557: "test" #34: no acceptable Oakley Transform Aug 26 13:08:28.638560: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.638565: | [RE]START processing: state #34 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.638568: | #34 is idle Aug 26 13:08:28.638645: "test" #34: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.638650: | **emit ISAKMP Message: Aug 26 13:08:28.638653: | initiator cookie: Aug 26 13:08:28.638655: | a6 54 ad 3e f4 0c 6d fd Aug 26 13:08:28.638658: | responder cookie: Aug 26 13:08:28.638660: | ae e0 88 82 65 2c 61 47 Aug 26 13:08:28.638663: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.638666: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.638669: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.638671: | flags: none (0x0) Aug 26 13:08:28.638674: | Message ID: 0 (0x0) Aug 26 13:08:28.638677: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.638682: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.638685: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.638687: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.638690: | protocol ID: 1 (0x1) Aug 26 13:08:28.638693: | SPI size: 0 (0x0) Aug 26 13:08:28.638695: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.638699: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.638702: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.638705: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.638708: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.638715: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #34) Aug 26 13:08:28.638718: | a6 54 ad 3e f4 0c 6d fd ae e0 88 82 65 2c 61 47 Aug 26 13:08:28.638720: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.638723: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.638745: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.638751: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.638756: | stop processing: state #34 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.638759: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.638765: | spent 0.495 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.667866: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.667899: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.667903: | 3a d8 82 8d c6 f7 09 a9 00 00 00 00 00 00 00 00 Aug 26 13:08:28.667906: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.667908: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.667910: | 00 00 00 14 01 01 00 00 80 01 00 0d 80 02 00 1e Aug 26 13:08:28.667912: | 80 04 00 1d Aug 26 13:08:28.667916: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.667920: | **parse ISAKMP Message: Aug 26 13:08:28.667923: | initiator cookie: Aug 26 13:08:28.667925: | 3a d8 82 8d c6 f7 09 a9 Aug 26 13:08:28.667927: | responder cookie: Aug 26 13:08:28.667929: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.667932: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.667935: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.667937: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.667939: | flags: none (0x0) Aug 26 13:08:28.667941: | Message ID: 0 (0x0) Aug 26 13:08:28.667944: | length: 68 (0x44) Aug 26 13:08:28.667947: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.667950: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.667953: | #null state always idle Aug 26 13:08:28.667956: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.667959: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.667961: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.667963: | length: 40 (0x28) Aug 26 13:08:28.667966: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.667968: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.667970: | in statetime_start() with no state Aug 26 13:08:28.667975: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.667980: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.667983: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.667986: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.667989: | find_next_host_connection returns test Aug 26 13:08:28.667995: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.667997: | find_next_host_connection returns empty Aug 26 13:08:28.668025: | creating state object #35 at 0x55ea70a69e60 Aug 26 13:08:28.668028: | State DB: adding IKEv1 state #35 in UNDEFINED Aug 26 13:08:28.668032: | pstats #35 ikev1.isakmp started Aug 26 13:08:28.668037: | #35 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.668042: | start processing: state #35 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.668046: | parent state #35: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.668049: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.668052: "test" #35: responding to Main Mode Aug 26 13:08:28.668057: | **emit ISAKMP Message: Aug 26 13:08:28.668059: | initiator cookie: Aug 26 13:08:28.668061: | 3a d8 82 8d c6 f7 09 a9 Aug 26 13:08:28.668063: | responder cookie: Aug 26 13:08:28.668065: | 0a 33 7f dc 2a 83 24 d6 Aug 26 13:08:28.668068: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.668070: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.668072: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.668074: | flags: none (0x0) Aug 26 13:08:28.668076: | Message ID: 0 (0x0) Aug 26 13:08:28.668079: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.668081: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.668084: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.668086: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.668088: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.668091: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.668093: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.668096: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.668099: | ****parse IPsec DOI SIT: Aug 26 13:08:28.668102: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.668104: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.668107: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.668109: | length: 28 (0x1c) Aug 26 13:08:28.668111: | proposal number: 1 (0x1) Aug 26 13:08:28.668113: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.668115: | SPI size: 0 (0x0) Aug 26 13:08:28.668117: | number of transforms: 1 (0x1) Aug 26 13:08:28.668120: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.668122: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.668124: | length: 20 (0x14) Aug 26 13:08:28.668126: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.668128: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.668131: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.668133: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.668136: | length/value: 13 (0xd) Aug 26 13:08:28.668138: | [13 is OAKLEY_AES_CTR] Aug 26 13:08:28.668142: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.668144: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:08:28.668146: | length/value: 30 (0x1e) Aug 26 13:08:28.668150: "test" #35: 30?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Aug 26 13:08:28.668152: "test" #35: no acceptable Oakley Transform Aug 26 13:08:28.668155: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.668159: | [RE]START processing: state #35 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.668161: | #35 is idle Aug 26 13:08:28.668684: "test" #35: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.668703: | **emit ISAKMP Message: Aug 26 13:08:28.668707: | initiator cookie: Aug 26 13:08:28.668710: | 3a d8 82 8d c6 f7 09 a9 Aug 26 13:08:28.668713: | responder cookie: Aug 26 13:08:28.668715: | 0a 33 7f dc 2a 83 24 d6 Aug 26 13:08:28.668718: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.668721: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.668724: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.668727: | flags: none (0x0) Aug 26 13:08:28.668730: | Message ID: 0 (0x0) Aug 26 13:08:28.668733: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.668736: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.668739: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.668742: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.668745: | protocol ID: 1 (0x1) Aug 26 13:08:28.668747: | SPI size: 0 (0x0) Aug 26 13:08:28.668750: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.668754: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.668757: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.668760: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.668763: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.668770: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #35) Aug 26 13:08:28.668773: | 3a d8 82 8d c6 f7 09 a9 0a 33 7f dc 2a 83 24 d6 Aug 26 13:08:28.668776: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.668779: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.668813: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.668820: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.668826: | stop processing: state #35 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.668829: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.668836: | spent 0.802 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.702159: | spent 0.00314 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.702188: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.702193: | f9 2a a2 49 76 10 0b 65 00 00 00 00 00 00 00 00 Aug 26 13:08:28.702196: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.702199: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.702202: | 00 00 00 14 01 01 00 00 80 01 00 0d 80 02 00 1e Aug 26 13:08:28.702205: | 80 03 00 10 Aug 26 13:08:28.702210: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.702214: | **parse ISAKMP Message: Aug 26 13:08:28.702218: | initiator cookie: Aug 26 13:08:28.702221: | f9 2a a2 49 76 10 0b 65 Aug 26 13:08:28.702224: | responder cookie: Aug 26 13:08:28.702226: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.702229: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.702233: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.702236: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.702239: | flags: none (0x0) Aug 26 13:08:28.702242: | Message ID: 0 (0x0) Aug 26 13:08:28.702245: | length: 68 (0x44) Aug 26 13:08:28.702248: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.702252: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.702256: | #null state always idle Aug 26 13:08:28.702259: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.702263: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.702266: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.702269: | length: 40 (0x28) Aug 26 13:08:28.702274: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.702278: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.702281: | in statetime_start() with no state Aug 26 13:08:28.702295: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.702303: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.702307: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.702312: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.702314: | find_next_host_connection returns test Aug 26 13:08:28.702317: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.702320: | find_next_host_connection returns empty Aug 26 13:08:28.702340: | creating state object #36 at 0x55ea70a6a920 Aug 26 13:08:28.702345: | State DB: adding IKEv1 state #36 in UNDEFINED Aug 26 13:08:28.702349: | pstats #36 ikev1.isakmp started Aug 26 13:08:28.702354: | #36 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.702361: | start processing: state #36 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.702364: | parent state #36: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.702368: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.702371: "test" #36: responding to Main Mode Aug 26 13:08:28.702377: | **emit ISAKMP Message: Aug 26 13:08:28.702379: | initiator cookie: Aug 26 13:08:28.702382: | f9 2a a2 49 76 10 0b 65 Aug 26 13:08:28.702385: | responder cookie: Aug 26 13:08:28.702387: | e1 54 00 96 9d c0 b5 37 Aug 26 13:08:28.702390: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.702393: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.702396: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.702399: | flags: none (0x0) Aug 26 13:08:28.702401: | Message ID: 0 (0x0) Aug 26 13:08:28.702405: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.702408: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.702411: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.702414: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.702417: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.702420: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.702424: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.702427: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.702431: | ****parse IPsec DOI SIT: Aug 26 13:08:28.702434: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.702437: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.702440: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.702442: | length: 28 (0x1c) Aug 26 13:08:28.702445: | proposal number: 1 (0x1) Aug 26 13:08:28.702448: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.702450: | SPI size: 0 (0x0) Aug 26 13:08:28.702452: | number of transforms: 1 (0x1) Aug 26 13:08:28.702456: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.702459: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.702463: | length: 20 (0x14) Aug 26 13:08:28.702466: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.702468: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.702472: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.702475: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.702477: | length/value: 13 (0xd) Aug 26 13:08:28.702480: | [13 is OAKLEY_AES_CTR] Aug 26 13:08:28.702483: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.702490: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:08:28.702493: | length/value: 30 (0x1e) Aug 26 13:08:28.702497: "test" #36: 30?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Aug 26 13:08:28.702500: "test" #36: no acceptable Oakley Transform Aug 26 13:08:28.702503: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.702508: | [RE]START processing: state #36 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.702511: | #36 is idle Aug 26 13:08:28.702709: "test" #36: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.702717: | **emit ISAKMP Message: Aug 26 13:08:28.702721: | initiator cookie: Aug 26 13:08:28.702724: | f9 2a a2 49 76 10 0b 65 Aug 26 13:08:28.702727: | responder cookie: Aug 26 13:08:28.702730: | e1 54 00 96 9d c0 b5 37 Aug 26 13:08:28.702733: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.702735: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.702738: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.702740: | flags: none (0x0) Aug 26 13:08:28.702742: | Message ID: 0 (0x0) Aug 26 13:08:28.702745: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.702747: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.702750: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.702752: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.702754: | protocol ID: 1 (0x1) Aug 26 13:08:28.702757: | SPI size: 0 (0x0) Aug 26 13:08:28.702759: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.702762: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.702764: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.702767: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.702769: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.702775: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #36) Aug 26 13:08:28.702778: | f9 2a a2 49 76 10 0b 65 e1 54 00 96 9d c0 b5 37 Aug 26 13:08:28.702780: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.702782: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.702809: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.702817: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.702823: | stop processing: state #36 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.702827: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.702833: | spent 0.511 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.737436: | spent 0.00434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.737473: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.737479: | 40 ed b4 fb c2 1f 7e 64 00 00 00 00 00 00 00 00 Aug 26 13:08:28.737482: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 13:08:28.737485: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 13:08:28.737488: | 00 00 00 18 01 01 00 00 80 01 00 19 80 02 00 07 Aug 26 13:08:28.737491: | 80 03 00 17 80 04 00 18 Aug 26 13:08:28.737497: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.737501: | **parse ISAKMP Message: Aug 26 13:08:28.737504: | initiator cookie: Aug 26 13:08:28.737507: | 40 ed b4 fb c2 1f 7e 64 Aug 26 13:08:28.737510: | responder cookie: Aug 26 13:08:28.737512: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.737515: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.737519: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.737522: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.737531: | flags: none (0x0) Aug 26 13:08:28.737534: | Message ID: 0 (0x0) Aug 26 13:08:28.737537: | length: 72 (0x48) Aug 26 13:08:28.737540: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.737544: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.737547: | #null state always idle Aug 26 13:08:28.737550: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.737554: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.737556: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.737559: | length: 44 (0x2c) Aug 26 13:08:28.737562: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.737565: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.737567: | in statetime_start() with no state Aug 26 13:08:28.737573: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.737578: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.737582: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.737586: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.737589: | find_next_host_connection returns test Aug 26 13:08:28.737592: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.737594: | find_next_host_connection returns empty Aug 26 13:08:28.737622: | creating state object #37 at 0x55ea70a6b3e0 Aug 26 13:08:28.737627: | State DB: adding IKEv1 state #37 in UNDEFINED Aug 26 13:08:28.737631: | pstats #37 ikev1.isakmp started Aug 26 13:08:28.737637: | #37 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.737644: | start processing: state #37 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.737648: | parent state #37: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.737652: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.737655: "test" #37: responding to Main Mode Aug 26 13:08:28.737661: | **emit ISAKMP Message: Aug 26 13:08:28.737664: | initiator cookie: Aug 26 13:08:28.737667: | 40 ed b4 fb c2 1f 7e 64 Aug 26 13:08:28.737669: | responder cookie: Aug 26 13:08:28.737671: | ac 05 32 1a 11 3c 96 e5 Aug 26 13:08:28.737674: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.737677: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.737680: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.737682: | flags: none (0x0) Aug 26 13:08:28.737685: | Message ID: 0 (0x0) Aug 26 13:08:28.737688: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.737692: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.737695: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.737698: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.737700: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.737704: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.737707: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.737710: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.737714: | ****parse IPsec DOI SIT: Aug 26 13:08:28.737717: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.737720: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.737723: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.737725: | length: 32 (0x20) Aug 26 13:08:28.737728: | proposal number: 1 (0x1) Aug 26 13:08:28.737731: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.737733: | SPI size: 0 (0x0) Aug 26 13:08:28.737739: | number of transforms: 1 (0x1) Aug 26 13:08:28.737742: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.737746: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.737748: | length: 24 (0x18) Aug 26 13:08:28.737751: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.737753: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.737756: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.737759: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.737762: | length/value: 25 (0x19) Aug 26 13:08:28.737765: | [25 is OAKLEY_CAMELLIA_CCM_A] Aug 26 13:08:28.737769: "test" #37: OAKLEY_CAMELLIA_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:28.737771: "test" #37: no acceptable Oakley Transform Aug 26 13:08:28.737774: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.737779: | [RE]START processing: state #37 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.737782: | #37 is idle Aug 26 13:08:28.737888: "test" #37: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.737898: | **emit ISAKMP Message: Aug 26 13:08:28.737902: | initiator cookie: Aug 26 13:08:28.737905: | 40 ed b4 fb c2 1f 7e 64 Aug 26 13:08:28.737908: | responder cookie: Aug 26 13:08:28.737910: | ac 05 32 1a 11 3c 96 e5 Aug 26 13:08:28.737913: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.737916: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.737919: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.737922: | flags: none (0x0) Aug 26 13:08:28.737924: | Message ID: 0 (0x0) Aug 26 13:08:28.737926: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.737928: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.737930: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.737932: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.737933: | protocol ID: 1 (0x1) Aug 26 13:08:28.737935: | SPI size: 0 (0x0) Aug 26 13:08:28.737937: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.737939: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.737941: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.737943: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.737945: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.737950: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #37) Aug 26 13:08:28.737951: | 40 ed b4 fb c2 1f 7e 64 ac 05 32 1a 11 3c 96 e5 Aug 26 13:08:28.737953: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.737955: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.737986: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.737993: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.737998: | stop processing: state #37 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.738002: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.738008: | spent 0.519 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.771585: | spent 0.00375 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.771621: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.771625: | 50 ce 53 e2 73 04 ac f4 00 00 00 00 00 00 00 00 Aug 26 13:08:28.771628: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.771630: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.771633: | 00 00 00 14 01 01 00 00 80 02 00 07 80 03 00 17 Aug 26 13:08:28.771635: | 80 04 00 18 Aug 26 13:08:28.771641: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.771649: | **parse ISAKMP Message: Aug 26 13:08:28.771653: | initiator cookie: Aug 26 13:08:28.771656: | 50 ce 53 e2 73 04 ac f4 Aug 26 13:08:28.771658: | responder cookie: Aug 26 13:08:28.771660: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.771662: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.771664: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.771666: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.771668: | flags: none (0x0) Aug 26 13:08:28.771670: | Message ID: 0 (0x0) Aug 26 13:08:28.771671: | length: 68 (0x44) Aug 26 13:08:28.771673: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.771676: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.771678: | #null state always idle Aug 26 13:08:28.771681: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.771683: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.771685: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.771687: | length: 40 (0x28) Aug 26 13:08:28.771688: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.771690: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.771692: | in statetime_start() with no state Aug 26 13:08:28.771696: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.771700: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.771702: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.771704: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.771706: | find_next_host_connection returns test Aug 26 13:08:28.771708: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.771710: | find_next_host_connection returns empty Aug 26 13:08:28.771731: | creating state object #38 at 0x55ea70a6bea0 Aug 26 13:08:28.771734: | State DB: adding IKEv1 state #38 in UNDEFINED Aug 26 13:08:28.771737: | pstats #38 ikev1.isakmp started Aug 26 13:08:28.771740: | #38 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.771744: | start processing: state #38 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.771747: | parent state #38: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.771749: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.771751: "test" #38: responding to Main Mode Aug 26 13:08:28.771755: | **emit ISAKMP Message: Aug 26 13:08:28.771757: | initiator cookie: Aug 26 13:08:28.771759: | 50 ce 53 e2 73 04 ac f4 Aug 26 13:08:28.771761: | responder cookie: Aug 26 13:08:28.771762: | d7 22 89 76 a2 b6 90 09 Aug 26 13:08:28.771764: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.771766: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.771767: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.771769: | flags: none (0x0) Aug 26 13:08:28.771771: | Message ID: 0 (0x0) Aug 26 13:08:28.771773: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.771775: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.771777: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.771780: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.771782: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.771786: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.771789: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.771792: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.771797: | ****parse IPsec DOI SIT: Aug 26 13:08:28.771800: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.771803: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.771805: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.771808: | length: 28 (0x1c) Aug 26 13:08:28.771810: | proposal number: 1 (0x1) Aug 26 13:08:28.771813: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.771816: | SPI size: 0 (0x0) Aug 26 13:08:28.771818: | number of transforms: 1 (0x1) Aug 26 13:08:28.771821: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.771824: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.771826: | length: 20 (0x14) Aug 26 13:08:28.771829: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.771831: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.771834: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.771838: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:08:28.771840: | length/value: 7 (0x7) Aug 26 13:08:28.771844: "test" #38: 7?? is not supported. Attribute OAKLEY_HASH_ALGORITHM Aug 26 13:08:28.771847: "test" #38: no acceptable Oakley Transform Aug 26 13:08:28.771849: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.771854: | [RE]START processing: state #38 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.771857: | #38 is idle Aug 26 13:08:28.771926: "test" #38: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.771931: | **emit ISAKMP Message: Aug 26 13:08:28.771935: | initiator cookie: Aug 26 13:08:28.771937: | 50 ce 53 e2 73 04 ac f4 Aug 26 13:08:28.771940: | responder cookie: Aug 26 13:08:28.771942: | d7 22 89 76 a2 b6 90 09 Aug 26 13:08:28.771945: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.771948: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.771950: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.771953: | flags: none (0x0) Aug 26 13:08:28.771956: | Message ID: 0 (0x0) Aug 26 13:08:28.771959: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.771962: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.771965: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.771967: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.771970: | protocol ID: 1 (0x1) Aug 26 13:08:28.771973: | SPI size: 0 (0x0) Aug 26 13:08:28.771976: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.771980: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.771983: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.771986: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.771989: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.771995: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #38) Aug 26 13:08:28.771999: | 50 ce 53 e2 73 04 ac f4 d7 22 89 76 a2 b6 90 09 Aug 26 13:08:28.772001: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.772004: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.772035: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.772042: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.772048: | stop processing: state #38 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.772052: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.772058: | spent 0.433 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.807545: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.807569: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.807576: | 19 e9 1b dc 20 6c 49 d7 00 00 00 00 00 00 00 00 Aug 26 13:08:28.807579: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.807582: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.807585: | 00 00 00 14 01 01 00 00 80 01 00 19 80 03 00 17 Aug 26 13:08:28.807587: | 80 04 00 18 Aug 26 13:08:28.807593: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.807596: | **parse ISAKMP Message: Aug 26 13:08:28.807599: | initiator cookie: Aug 26 13:08:28.807601: | 19 e9 1b dc 20 6c 49 d7 Aug 26 13:08:28.807604: | responder cookie: Aug 26 13:08:28.807606: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.807609: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.807612: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.807614: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.807617: | flags: none (0x0) Aug 26 13:08:28.807620: | Message ID: 0 (0x0) Aug 26 13:08:28.807622: | length: 68 (0x44) Aug 26 13:08:28.807626: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.807630: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.807632: | #null state always idle Aug 26 13:08:28.807636: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.807639: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.807643: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.807645: | length: 40 (0x28) Aug 26 13:08:28.807648: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.807651: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.807654: | in statetime_start() with no state Aug 26 13:08:28.807660: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.807667: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.807670: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.807674: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.807677: | find_next_host_connection returns test Aug 26 13:08:28.807680: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.807683: | find_next_host_connection returns empty Aug 26 13:08:28.807706: | creating state object #39 at 0x55ea70a6c960 Aug 26 13:08:28.807710: | State DB: adding IKEv1 state #39 in UNDEFINED Aug 26 13:08:28.807714: | pstats #39 ikev1.isakmp started Aug 26 13:08:28.807719: | #39 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.807725: | start processing: state #39 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.807729: | parent state #39: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.807733: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.807736: "test" #39: responding to Main Mode Aug 26 13:08:28.807742: | **emit ISAKMP Message: Aug 26 13:08:28.807745: | initiator cookie: Aug 26 13:08:28.807748: | 19 e9 1b dc 20 6c 49 d7 Aug 26 13:08:28.807750: | responder cookie: Aug 26 13:08:28.807753: | 5d 59 88 cb 92 97 f7 5a Aug 26 13:08:28.807755: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.807758: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.807761: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.807764: | flags: none (0x0) Aug 26 13:08:28.807767: | Message ID: 0 (0x0) Aug 26 13:08:28.807770: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.807773: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.807776: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.807779: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.807782: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.807787: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.807790: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.807793: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.807797: | ****parse IPsec DOI SIT: Aug 26 13:08:28.807800: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.807803: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.807806: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.807809: | length: 28 (0x1c) Aug 26 13:08:28.807811: | proposal number: 1 (0x1) Aug 26 13:08:28.807814: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.807816: | SPI size: 0 (0x0) Aug 26 13:08:28.807819: | number of transforms: 1 (0x1) Aug 26 13:08:28.807822: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.807825: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.807827: | length: 20 (0x14) Aug 26 13:08:28.807830: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.807833: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.807836: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.807839: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.807841: | length/value: 25 (0x19) Aug 26 13:08:28.807844: | [25 is OAKLEY_CAMELLIA_CCM_A] Aug 26 13:08:28.807848: "test" #39: OAKLEY_CAMELLIA_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:28.807851: "test" #39: no acceptable Oakley Transform Aug 26 13:08:28.807855: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.807860: | [RE]START processing: state #39 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.807862: | #39 is idle Aug 26 13:08:28.807970: "test" #39: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.807981: | **emit ISAKMP Message: Aug 26 13:08:28.807985: | initiator cookie: Aug 26 13:08:28.807988: | 19 e9 1b dc 20 6c 49 d7 Aug 26 13:08:28.807991: | responder cookie: Aug 26 13:08:28.807994: | 5d 59 88 cb 92 97 f7 5a Aug 26 13:08:28.807997: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.808000: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.808003: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.808006: | flags: none (0x0) Aug 26 13:08:28.808009: | Message ID: 0 (0x0) Aug 26 13:08:28.808012: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.808016: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.808019: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.808022: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.808024: | protocol ID: 1 (0x1) Aug 26 13:08:28.808027: | SPI size: 0 (0x0) Aug 26 13:08:28.808030: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.808033: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.808037: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.808040: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.808043: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.808050: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #39) Aug 26 13:08:28.808053: | 19 e9 1b dc 20 6c 49 d7 5d 59 88 cb 92 97 f7 5a Aug 26 13:08:28.808056: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.808058: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.808090: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.808097: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.808105: | stop processing: state #39 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.808109: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.808115: | spent 0.527 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.833221: | spent 0.00332 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.833253: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.833258: | a2 b3 7b b2 98 7f 08 57 00 00 00 00 00 00 00 00 Aug 26 13:08:28.833261: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.833264: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.833266: | 00 00 00 14 01 01 00 00 80 01 00 19 80 02 00 07 Aug 26 13:08:28.833268: | 80 04 00 18 Aug 26 13:08:28.833274: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.833279: | **parse ISAKMP Message: Aug 26 13:08:28.833283: | initiator cookie: Aug 26 13:08:28.833285: | a2 b3 7b b2 98 7f 08 57 Aug 26 13:08:28.833307: | responder cookie: Aug 26 13:08:28.833313: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.833317: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.833320: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.833323: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.833326: | flags: none (0x0) Aug 26 13:08:28.833328: | Message ID: 0 (0x0) Aug 26 13:08:28.833331: | length: 68 (0x44) Aug 26 13:08:28.833335: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.833339: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.833342: | #null state always idle Aug 26 13:08:28.833346: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.833350: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.833352: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.833355: | length: 40 (0x28) Aug 26 13:08:28.833358: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.833361: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.833364: | in statetime_start() with no state Aug 26 13:08:28.833370: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.833376: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.833379: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.833383: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.833386: | find_next_host_connection returns test Aug 26 13:08:28.833389: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.833391: | find_next_host_connection returns empty Aug 26 13:08:28.833417: | creating state object #40 at 0x55ea70a6d420 Aug 26 13:08:28.833420: | State DB: adding IKEv1 state #40 in UNDEFINED Aug 26 13:08:28.833425: | pstats #40 ikev1.isakmp started Aug 26 13:08:28.833430: | #40 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.833437: | start processing: state #40 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.833441: | parent state #40: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.833445: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.833448: "test" #40: responding to Main Mode Aug 26 13:08:28.833453: | **emit ISAKMP Message: Aug 26 13:08:28.833456: | initiator cookie: Aug 26 13:08:28.833459: | a2 b3 7b b2 98 7f 08 57 Aug 26 13:08:28.833461: | responder cookie: Aug 26 13:08:28.833464: | f0 e3 00 98 7e 5c ce 8b Aug 26 13:08:28.833467: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.833469: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.833472: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.833475: | flags: none (0x0) Aug 26 13:08:28.833482: | Message ID: 0 (0x0) Aug 26 13:08:28.833485: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.833488: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.833492: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.833495: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.833497: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.833500: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.833504: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.833507: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.833510: | ****parse IPsec DOI SIT: Aug 26 13:08:28.833513: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.833517: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.833519: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.833522: | length: 28 (0x1c) Aug 26 13:08:28.833525: | proposal number: 1 (0x1) Aug 26 13:08:28.833528: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.833530: | SPI size: 0 (0x0) Aug 26 13:08:28.833533: | number of transforms: 1 (0x1) Aug 26 13:08:28.833536: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.833539: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.833541: | length: 20 (0x14) Aug 26 13:08:28.833544: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.833547: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.833550: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.833553: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.833556: | length/value: 25 (0x19) Aug 26 13:08:28.833559: | [25 is OAKLEY_CAMELLIA_CCM_A] Aug 26 13:08:28.833563: "test" #40: OAKLEY_CAMELLIA_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:28.833566: "test" #40: no acceptable Oakley Transform Aug 26 13:08:28.833569: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.833574: | [RE]START processing: state #40 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.833577: | #40 is idle Aug 26 13:08:28.833660: "test" #40: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.833670: | **emit ISAKMP Message: Aug 26 13:08:28.833674: | initiator cookie: Aug 26 13:08:28.833677: | a2 b3 7b b2 98 7f 08 57 Aug 26 13:08:28.833680: | responder cookie: Aug 26 13:08:28.833682: | f0 e3 00 98 7e 5c ce 8b Aug 26 13:08:28.833685: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.833688: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.833691: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.833694: | flags: none (0x0) Aug 26 13:08:28.833696: | Message ID: 0 (0x0) Aug 26 13:08:28.833699: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.833703: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.833706: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.833709: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.833711: | protocol ID: 1 (0x1) Aug 26 13:08:28.833714: | SPI size: 0 (0x0) Aug 26 13:08:28.833716: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.833720: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.833723: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.833727: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.833730: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.833737: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #40) Aug 26 13:08:28.833742: | a2 b3 7b b2 98 7f 08 57 f0 e3 00 98 7e 5c ce 8b Aug 26 13:08:28.833745: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.833748: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.833778: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.833786: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.833791: | stop processing: state #40 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.833795: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.833801: | spent 0.513 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.865372: | spent 0.00303 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.865403: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.865409: | db 0e ac 99 c3 09 ae e7 00 00 00 00 00 00 00 00 Aug 26 13:08:28.865412: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.865414: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.865417: | 00 00 00 14 01 01 00 00 80 01 00 19 80 02 00 07 Aug 26 13:08:28.865419: | 80 03 00 17 Aug 26 13:08:28.865425: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.865429: | **parse ISAKMP Message: Aug 26 13:08:28.865432: | initiator cookie: Aug 26 13:08:28.865435: | db 0e ac 99 c3 09 ae e7 Aug 26 13:08:28.865437: | responder cookie: Aug 26 13:08:28.865439: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.865443: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.865445: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.865448: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.865451: | flags: none (0x0) Aug 26 13:08:28.865454: | Message ID: 0 (0x0) Aug 26 13:08:28.865456: | length: 68 (0x44) Aug 26 13:08:28.865459: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.865464: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.865467: | #null state always idle Aug 26 13:08:28.865470: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.865474: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.865477: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.865479: | length: 40 (0x28) Aug 26 13:08:28.865482: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.865485: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.865488: | in statetime_start() with no state Aug 26 13:08:28.865493: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.865499: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.865502: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.865506: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.865509: | find_next_host_connection returns test Aug 26 13:08:28.865512: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.865514: | find_next_host_connection returns empty Aug 26 13:08:28.865540: | creating state object #41 at 0x55ea70a6dee0 Aug 26 13:08:28.865544: | State DB: adding IKEv1 state #41 in UNDEFINED Aug 26 13:08:28.865548: | pstats #41 ikev1.isakmp started Aug 26 13:08:28.865553: | #41 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.865559: | start processing: state #41 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.865563: | parent state #41: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.865567: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.865570: "test" #41: responding to Main Mode Aug 26 13:08:28.865578: | **emit ISAKMP Message: Aug 26 13:08:28.865581: | initiator cookie: Aug 26 13:08:28.865584: | db 0e ac 99 c3 09 ae e7 Aug 26 13:08:28.865586: | responder cookie: Aug 26 13:08:28.865589: | 3c 9a 6a 67 3d bb 25 5c Aug 26 13:08:28.865591: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.865594: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.865597: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.865599: | flags: none (0x0) Aug 26 13:08:28.865602: | Message ID: 0 (0x0) Aug 26 13:08:28.865605: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.865608: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.865611: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.865614: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.865616: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.865619: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.865623: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.865626: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.865629: | ****parse IPsec DOI SIT: Aug 26 13:08:28.865632: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.865635: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.865638: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.865640: | length: 28 (0x1c) Aug 26 13:08:28.865643: | proposal number: 1 (0x1) Aug 26 13:08:28.865646: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.865648: | SPI size: 0 (0x0) Aug 26 13:08:28.865651: | number of transforms: 1 (0x1) Aug 26 13:08:28.865654: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.865657: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.865659: | length: 20 (0x14) Aug 26 13:08:28.865662: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.865665: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.865668: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.865671: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.865673: | length/value: 25 (0x19) Aug 26 13:08:28.865677: | [25 is OAKLEY_CAMELLIA_CCM_A] Aug 26 13:08:28.865681: "test" #41: OAKLEY_CAMELLIA_CCM_A is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:28.865684: "test" #41: no acceptable Oakley Transform Aug 26 13:08:28.865688: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.865693: | [RE]START processing: state #41 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.865696: | #41 is idle Aug 26 13:08:28.865772: "test" #41: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.865777: | **emit ISAKMP Message: Aug 26 13:08:28.865781: | initiator cookie: Aug 26 13:08:28.865783: | db 0e ac 99 c3 09 ae e7 Aug 26 13:08:28.865786: | responder cookie: Aug 26 13:08:28.865788: | 3c 9a 6a 67 3d bb 25 5c Aug 26 13:08:28.865791: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.865794: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.865797: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.865800: | flags: none (0x0) Aug 26 13:08:28.865802: | Message ID: 0 (0x0) Aug 26 13:08:28.865805: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.865808: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.865811: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.865814: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.865816: | protocol ID: 1 (0x1) Aug 26 13:08:28.865818: | SPI size: 0 (0x0) Aug 26 13:08:28.865821: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.865826: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.865829: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.865832: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.865835: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.865842: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #41) Aug 26 13:08:28.865845: | db 0e ac 99 c3 09 ae e7 3c 9a 6a 67 3d bb 25 5c Aug 26 13:08:28.865847: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.865850: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.865882: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.865890: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.865895: | stop processing: state #41 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.865899: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.865905: | spent 0.496 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.894171: | spent 0.00353 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.894200: | *received 72 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.894206: | 42 4f 79 40 92 f3 eb e9 00 00 00 00 00 00 00 00 Aug 26 13:08:28.894208: | 01 10 02 00 00 00 00 00 00 00 00 48 00 00 00 2c Aug 26 13:08:28.894211: | 00 00 00 01 00 00 00 01 00 00 00 20 01 01 00 01 Aug 26 13:08:28.894213: | 00 00 00 18 01 01 00 00 80 01 00 18 80 02 00 06 Aug 26 13:08:28.894215: | 80 03 00 0e 80 04 00 03 Aug 26 13:08:28.894221: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.894225: | **parse ISAKMP Message: Aug 26 13:08:28.894229: | initiator cookie: Aug 26 13:08:28.894231: | 42 4f 79 40 92 f3 eb e9 Aug 26 13:08:28.894234: | responder cookie: Aug 26 13:08:28.894236: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.894240: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.894243: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.894246: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.894249: | flags: none (0x0) Aug 26 13:08:28.894251: | Message ID: 0 (0x0) Aug 26 13:08:28.894254: | length: 72 (0x48) Aug 26 13:08:28.894257: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.894261: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.894264: | #null state always idle Aug 26 13:08:28.894268: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.894272: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.894274: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.894277: | length: 44 (0x2c) Aug 26 13:08:28.894280: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.894283: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.894286: | in statetime_start() with no state Aug 26 13:08:28.894295: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.894303: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.894306: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.894309: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.894312: | find_next_host_connection returns test Aug 26 13:08:28.894314: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.894317: | find_next_host_connection returns empty Aug 26 13:08:28.894340: | creating state object #42 at 0x55ea70a6e9a0 Aug 26 13:08:28.894344: | State DB: adding IKEv1 state #42 in UNDEFINED Aug 26 13:08:28.894349: | pstats #42 ikev1.isakmp started Aug 26 13:08:28.894357: | #42 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.894364: | start processing: state #42 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.894368: | parent state #42: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.894371: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.894375: "test" #42: responding to Main Mode Aug 26 13:08:28.894380: | **emit ISAKMP Message: Aug 26 13:08:28.894383: | initiator cookie: Aug 26 13:08:28.894385: | 42 4f 79 40 92 f3 eb e9 Aug 26 13:08:28.894387: | responder cookie: Aug 26 13:08:28.894390: | 2d b2 01 95 e1 6c e5 35 Aug 26 13:08:28.894392: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.894395: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.894398: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.894400: | flags: none (0x0) Aug 26 13:08:28.894403: | Message ID: 0 (0x0) Aug 26 13:08:28.894406: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.894408: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.894411: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.894413: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.894416: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.894419: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.894422: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.894425: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.894428: | ****parse IPsec DOI SIT: Aug 26 13:08:28.894431: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.894434: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.894436: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.894439: | length: 32 (0x20) Aug 26 13:08:28.894441: | proposal number: 1 (0x1) Aug 26 13:08:28.894444: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.894446: | SPI size: 0 (0x0) Aug 26 13:08:28.894449: | number of transforms: 1 (0x1) Aug 26 13:08:28.894452: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.894455: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.894457: | length: 24 (0x18) Aug 26 13:08:28.894460: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.894462: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.894466: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.894469: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.894472: | length/value: 24 (0x18) Aug 26 13:08:28.894475: | [24 is OAKLEY_CAMELLIA_CTR] Aug 26 13:08:28.894478: "test" #42: OAKLEY_CAMELLIA_CTR is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:28.894481: "test" #42: no acceptable Oakley Transform Aug 26 13:08:28.894485: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.894490: | [RE]START processing: state #42 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.894494: | #42 is idle Aug 26 13:08:28.894582: "test" #42: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.894591: | **emit ISAKMP Message: Aug 26 13:08:28.894595: | initiator cookie: Aug 26 13:08:28.894598: | 42 4f 79 40 92 f3 eb e9 Aug 26 13:08:28.894600: | responder cookie: Aug 26 13:08:28.894603: | 2d b2 01 95 e1 6c e5 35 Aug 26 13:08:28.894606: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.894608: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.894611: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.894614: | flags: none (0x0) Aug 26 13:08:28.894619: | Message ID: 0 (0x0) Aug 26 13:08:28.894622: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.894625: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.894628: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.894631: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.894633: | protocol ID: 1 (0x1) Aug 26 13:08:28.894636: | SPI size: 0 (0x0) Aug 26 13:08:28.894639: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.894642: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.894645: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.894648: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.894651: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.894658: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #42) Aug 26 13:08:28.894661: | 42 4f 79 40 92 f3 eb e9 2d b2 01 95 e1 6c e5 35 Aug 26 13:08:28.894663: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.894666: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.894694: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.894700: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.894705: | stop processing: state #42 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.894709: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.894714: | spent 0.499 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.936828: | spent 0.00334 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.936855: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.936860: | f4 de 07 72 8f 5c df 2e 00 00 00 00 00 00 00 00 Aug 26 13:08:28.936863: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.936865: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.936868: | 00 00 00 14 01 01 00 00 80 02 00 06 80 03 00 0e Aug 26 13:08:28.936870: | 80 04 00 03 Aug 26 13:08:28.936875: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.936880: | **parse ISAKMP Message: Aug 26 13:08:28.936883: | initiator cookie: Aug 26 13:08:28.936885: | f4 de 07 72 8f 5c df 2e Aug 26 13:08:28.936888: | responder cookie: Aug 26 13:08:28.936890: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.936893: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.936896: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.936899: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.936902: | flags: none (0x0) Aug 26 13:08:28.936904: | Message ID: 0 (0x0) Aug 26 13:08:28.936907: | length: 68 (0x44) Aug 26 13:08:28.936910: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.936914: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.936917: | #null state always idle Aug 26 13:08:28.936921: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.936924: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.936927: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.936929: | length: 40 (0x28) Aug 26 13:08:28.936932: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.936935: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.936938: | in statetime_start() with no state Aug 26 13:08:28.936944: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.936949: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.936953: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.936960: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.936963: | find_next_host_connection returns test Aug 26 13:08:28.936966: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.936968: | find_next_host_connection returns empty Aug 26 13:08:28.936992: | creating state object #43 at 0x55ea70a6f460 Aug 26 13:08:28.936995: | State DB: adding IKEv1 state #43 in UNDEFINED Aug 26 13:08:28.937000: | pstats #43 ikev1.isakmp started Aug 26 13:08:28.937005: | #43 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.937011: | start processing: state #43 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.937015: | parent state #43: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.937018: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.937021: "test" #43: responding to Main Mode Aug 26 13:08:28.937026: | **emit ISAKMP Message: Aug 26 13:08:28.937029: | initiator cookie: Aug 26 13:08:28.937031: | f4 de 07 72 8f 5c df 2e Aug 26 13:08:28.937034: | responder cookie: Aug 26 13:08:28.937036: | 91 8f 86 8f fc 4b 4f ec Aug 26 13:08:28.937039: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.937042: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.937045: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.937047: | flags: none (0x0) Aug 26 13:08:28.937050: | Message ID: 0 (0x0) Aug 26 13:08:28.937053: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.937056: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.937059: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.937062: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.937065: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.937068: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.937072: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.937075: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.937078: | ****parse IPsec DOI SIT: Aug 26 13:08:28.937081: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.937084: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.937087: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.937089: | length: 28 (0x1c) Aug 26 13:08:28.937092: | proposal number: 1 (0x1) Aug 26 13:08:28.937094: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.937097: | SPI size: 0 (0x0) Aug 26 13:08:28.937100: | number of transforms: 1 (0x1) Aug 26 13:08:28.937103: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.937105: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.937108: | length: 20 (0x14) Aug 26 13:08:28.937110: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.937113: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.937116: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.937119: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) Aug 26 13:08:28.937122: | length/value: 6 (0x6) Aug 26 13:08:28.937125: | [6 is OAKLEY_SHA2_512] Aug 26 13:08:28.937128: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.937131: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) Aug 26 13:08:28.937134: | length/value: 14 (0xe) Aug 26 13:08:28.937138: "test" #43: Pluto does not support 14?? authentication. Attribute OAKLEY_AUTHENTICATION_METHOD Aug 26 13:08:28.937141: "test" #43: no acceptable Oakley Transform Aug 26 13:08:28.937144: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.937149: | [RE]START processing: state #43 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.937153: | #43 is idle Aug 26 13:08:28.937469: "test" #43: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.937478: | **emit ISAKMP Message: Aug 26 13:08:28.937482: | initiator cookie: Aug 26 13:08:28.937484: | f4 de 07 72 8f 5c df 2e Aug 26 13:08:28.937487: | responder cookie: Aug 26 13:08:28.937489: | 91 8f 86 8f fc 4b 4f ec Aug 26 13:08:28.937492: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.937495: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.937497: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.937500: | flags: none (0x0) Aug 26 13:08:28.937503: | Message ID: 0 (0x0) Aug 26 13:08:28.937506: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.937510: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.937512: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.937515: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.937517: | protocol ID: 1 (0x1) Aug 26 13:08:28.937520: | SPI size: 0 (0x0) Aug 26 13:08:28.937523: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.937526: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.937529: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.937532: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.937535: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.937542: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #43) Aug 26 13:08:28.937544: | f4 de 07 72 8f 5c df 2e 91 8f 86 8f fc 4b 4f ec Aug 26 13:08:28.937547: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.937550: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.937578: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.937585: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.937590: | stop processing: state #43 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.937593: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.937599: | spent 0.489 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:28.970204: | spent 0 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:28.970237: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:28.970242: | c4 68 d9 6d 63 32 99 95 00 00 00 00 00 00 00 00 Aug 26 13:08:28.970245: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:28.970247: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:28.970249: | 00 00 00 14 01 01 00 00 80 01 00 18 80 03 00 0e Aug 26 13:08:28.970252: | 80 04 00 03 Aug 26 13:08:28.970258: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:28.970263: | **parse ISAKMP Message: Aug 26 13:08:28.970266: | initiator cookie: Aug 26 13:08:28.970268: | c4 68 d9 6d 63 32 99 95 Aug 26 13:08:28.970271: | responder cookie: Aug 26 13:08:28.970273: | 00 00 00 00 00 00 00 00 Aug 26 13:08:28.970276: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.970279: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.970282: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.970285: | flags: none (0x0) Aug 26 13:08:28.970293: | Message ID: 0 (0x0) Aug 26 13:08:28.970298: | length: 68 (0x44) Aug 26 13:08:28.970301: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:28.970305: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:28.970308: | #null state always idle Aug 26 13:08:28.970312: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:28.970320: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:28.970323: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.970326: | length: 40 (0x28) Aug 26 13:08:28.970329: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.970332: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:28.970335: | in statetime_start() with no state Aug 26 13:08:28.970341: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:28.970346: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:28.970350: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.970354: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:28.970356: | find_next_host_connection returns test Aug 26 13:08:28.970359: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:28.970362: | find_next_host_connection returns empty Aug 26 13:08:28.970396: | creating state object #44 at 0x55ea70a6ff20 Aug 26 13:08:28.970400: | State DB: adding IKEv1 state #44 in UNDEFINED Aug 26 13:08:28.970406: | pstats #44 ikev1.isakmp started Aug 26 13:08:28.970411: | #44 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:28.970418: | start processing: state #44 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:28.970422: | parent state #44: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:28.970426: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:28.970430: "test" #44: responding to Main Mode Aug 26 13:08:28.970435: | **emit ISAKMP Message: Aug 26 13:08:28.970438: | initiator cookie: Aug 26 13:08:28.970440: | c4 68 d9 6d 63 32 99 95 Aug 26 13:08:28.970443: | responder cookie: Aug 26 13:08:28.970445: | 36 7c 57 c0 1d 05 f1 0f Aug 26 13:08:28.970448: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:28.970451: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.970454: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:28.970456: | flags: none (0x0) Aug 26 13:08:28.970459: | Message ID: 0 (0x0) Aug 26 13:08:28.970462: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.970465: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:28.970468: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:28.970471: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:28.970474: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.970477: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:28.970481: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:28.970484: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:28.970487: | ****parse IPsec DOI SIT: Aug 26 13:08:28.970490: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:28.970493: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:28.970496: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.970499: | length: 28 (0x1c) Aug 26 13:08:28.970501: | proposal number: 1 (0x1) Aug 26 13:08:28.970504: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:28.970507: | SPI size: 0 (0x0) Aug 26 13:08:28.970509: | number of transforms: 1 (0x1) Aug 26 13:08:28.970512: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:28.970515: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.970518: | length: 20 (0x14) Aug 26 13:08:28.970520: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:28.970523: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:28.970526: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:28.970529: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:28.970534: | length/value: 24 (0x18) Aug 26 13:08:28.970537: | [24 is OAKLEY_CAMELLIA_CTR] Aug 26 13:08:28.970541: "test" #44: OAKLEY_CAMELLIA_CTR is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:28.970545: "test" #44: no acceptable Oakley Transform Aug 26 13:08:28.970549: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:28.970555: | [RE]START processing: state #44 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:28.970558: | #44 is idle Aug 26 13:08:28.970630: "test" #44: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:28.970635: | **emit ISAKMP Message: Aug 26 13:08:28.970638: | initiator cookie: Aug 26 13:08:28.970640: | c4 68 d9 6d 63 32 99 95 Aug 26 13:08:28.970643: | responder cookie: Aug 26 13:08:28.970646: | 36 7c 57 c0 1d 05 f1 0f Aug 26 13:08:28.970648: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.970651: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:28.970654: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:28.970657: | flags: none (0x0) Aug 26 13:08:28.970659: | Message ID: 0 (0x0) Aug 26 13:08:28.970662: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:28.970666: | ***emit ISAKMP Notification Payload: Aug 26 13:08:28.970668: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:28.970671: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:28.970674: | protocol ID: 1 (0x1) Aug 26 13:08:28.970676: | SPI size: 0 (0x0) Aug 26 13:08:28.970679: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:28.970683: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:28.970686: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:28.970689: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:28.970691: | emitting length of ISAKMP Message: 40 Aug 26 13:08:28.970699: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #44) Aug 26 13:08:28.970702: | c4 68 d9 6d 63 32 99 95 36 7c 57 c0 1d 05 f1 0f Aug 26 13:08:28.970704: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:28.970707: | 00 00 00 01 01 00 00 0e Aug 26 13:08:28.970736: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:28.970742: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:28.970747: | stop processing: state #44 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:28.970750: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:28.970756: | spent 0.512 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:29.003655: | spent 0.00358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:29.003682: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:29.003687: | ae f6 6a 11 24 32 53 43 00 00 00 00 00 00 00 00 Aug 26 13:08:29.003690: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:29.003693: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:29.003695: | 00 00 00 14 01 01 00 00 80 01 00 18 80 02 00 06 Aug 26 13:08:29.003698: | 80 04 00 03 Aug 26 13:08:29.003703: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:29.003708: | **parse ISAKMP Message: Aug 26 13:08:29.003711: | initiator cookie: Aug 26 13:08:29.003713: | ae f6 6a 11 24 32 53 43 Aug 26 13:08:29.003716: | responder cookie: Aug 26 13:08:29.003719: | 00 00 00 00 00 00 00 00 Aug 26 13:08:29.003722: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:29.003725: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:29.003728: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:29.003734: | flags: none (0x0) Aug 26 13:08:29.003737: | Message ID: 0 (0x0) Aug 26 13:08:29.003740: | length: 68 (0x44) Aug 26 13:08:29.003743: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:29.003748: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:29.003750: | #null state always idle Aug 26 13:08:29.003754: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:29.003757: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:29.003760: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:29.003763: | length: 40 (0x28) Aug 26 13:08:29.003766: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:29.003769: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:29.003772: | in statetime_start() with no state Aug 26 13:08:29.003778: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:29.003783: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:29.003787: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:29.003791: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:29.003794: | find_next_host_connection returns test Aug 26 13:08:29.003797: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:29.003799: | find_next_host_connection returns empty Aug 26 13:08:29.003827: | creating state object #45 at 0x55ea70a709e0 Aug 26 13:08:29.003831: | State DB: adding IKEv1 state #45 in UNDEFINED Aug 26 13:08:29.003835: | pstats #45 ikev1.isakmp started Aug 26 13:08:29.003840: | #45 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:29.003847: | start processing: state #45 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:29.003850: | parent state #45: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:29.003854: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:29.003857: "test" #45: responding to Main Mode Aug 26 13:08:29.003862: | **emit ISAKMP Message: Aug 26 13:08:29.003865: | initiator cookie: Aug 26 13:08:29.003867: | ae f6 6a 11 24 32 53 43 Aug 26 13:08:29.003870: | responder cookie: Aug 26 13:08:29.003872: | 75 f1 42 2b 9f b7 05 25 Aug 26 13:08:29.003875: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:29.003878: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:29.003880: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:29.003883: | flags: none (0x0) Aug 26 13:08:29.003886: | Message ID: 0 (0x0) Aug 26 13:08:29.003889: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:29.003892: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:29.003895: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:29.003898: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:29.003901: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:29.003904: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:29.003907: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:29.003910: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:29.003914: | ****parse IPsec DOI SIT: Aug 26 13:08:29.003917: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:29.003920: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:29.003922: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:29.003925: | length: 28 (0x1c) Aug 26 13:08:29.003928: | proposal number: 1 (0x1) Aug 26 13:08:29.003930: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:29.003933: | SPI size: 0 (0x0) Aug 26 13:08:29.003937: | number of transforms: 1 (0x1) Aug 26 13:08:29.003940: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:29.003943: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:29.003946: | length: 20 (0x14) Aug 26 13:08:29.003948: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:29.003951: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:29.003954: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:29.003957: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:29.003960: | length/value: 24 (0x18) Aug 26 13:08:29.003963: | [24 is OAKLEY_CAMELLIA_CTR] Aug 26 13:08:29.003967: "test" #45: OAKLEY_CAMELLIA_CTR is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:29.003970: "test" #45: no acceptable Oakley Transform Aug 26 13:08:29.003973: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:29.003978: | [RE]START processing: state #45 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:29.003980: | #45 is idle Aug 26 13:08:29.004058: "test" #45: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:29.004062: | **emit ISAKMP Message: Aug 26 13:08:29.004065: | initiator cookie: Aug 26 13:08:29.004068: | ae f6 6a 11 24 32 53 43 Aug 26 13:08:29.004070: | responder cookie: Aug 26 13:08:29.004073: | 75 f1 42 2b 9f b7 05 25 Aug 26 13:08:29.004076: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:29.004078: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:29.004081: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:29.004084: | flags: none (0x0) Aug 26 13:08:29.004086: | Message ID: 0 (0x0) Aug 26 13:08:29.004089: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:29.004092: | ***emit ISAKMP Notification Payload: Aug 26 13:08:29.004095: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:29.004098: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:29.004100: | protocol ID: 1 (0x1) Aug 26 13:08:29.004103: | SPI size: 0 (0x0) Aug 26 13:08:29.004106: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:29.004109: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:29.004112: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:29.004115: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:29.004118: | emitting length of ISAKMP Message: 40 Aug 26 13:08:29.004124: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #45) Aug 26 13:08:29.004127: | ae f6 6a 11 24 32 53 43 75 f1 42 2b 9f b7 05 25 Aug 26 13:08:29.004129: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:29.004132: | 00 00 00 01 01 00 00 0e Aug 26 13:08:29.004168: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:29.004174: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:29.004179: | stop processing: state #45 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:29.004183: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:29.004188: | spent 0.498 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:29.038187: | spent 0.00363 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:08:29.038217: | *received 68 bytes from 192.1.2.45:500 on eth1 (192.1.2.23:500) Aug 26 13:08:29.038223: | de 9c 75 a1 ea f1 8f 8a 00 00 00 00 00 00 00 00 Aug 26 13:08:29.038226: | 01 10 02 00 00 00 00 00 00 00 00 44 00 00 00 28 Aug 26 13:08:29.038228: | 00 00 00 01 00 00 00 01 00 00 00 1c 01 01 00 01 Aug 26 13:08:29.038231: | 00 00 00 14 01 01 00 00 80 01 00 18 80 02 00 06 Aug 26 13:08:29.038233: | 80 03 00 0e Aug 26 13:08:29.038239: | start processing: from 192.1.2.45:500 (in process_md() at demux.c:378) Aug 26 13:08:29.038246: | **parse ISAKMP Message: Aug 26 13:08:29.038250: | initiator cookie: Aug 26 13:08:29.038252: | de 9c 75 a1 ea f1 8f 8a Aug 26 13:08:29.038255: | responder cookie: Aug 26 13:08:29.038258: | 00 00 00 00 00 00 00 00 Aug 26 13:08:29.038261: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:29.038264: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:29.038267: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:29.038270: | flags: none (0x0) Aug 26 13:08:29.038273: | Message ID: 0 (0x0) Aug 26 13:08:29.038276: | length: 68 (0x44) Aug 26 13:08:29.038280: | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) Aug 26 13:08:29.038284: | State DB: IKEv1 state not found (find_state_ikev1_init) Aug 26 13:08:29.038287: | #null state always idle Aug 26 13:08:29.038297: | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 Aug 26 13:08:29.038301: | ***parse ISAKMP Security Association Payload: Aug 26 13:08:29.038304: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:29.038307: | length: 40 (0x28) Aug 26 13:08:29.038310: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:29.038313: | message 'main_inI1_outR1' HASH payload not checked early Aug 26 13:08:29.038316: | in statetime_start() with no state Aug 26 13:08:29.038323: | find_host_connection local=192.1.2.23:500 remote=192.1.2.45:500 policy=IKEV1_ALLOW but ignoring ports Aug 26 13:08:29.038329: | find_host_pair: comparing 192.1.2.23:500 to 192.1.2.45:500 but ignoring ports Aug 26 13:08:29.038332: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:29.038337: | found policy = PSK+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (test) Aug 26 13:08:29.038340: | find_next_host_connection returns test Aug 26 13:08:29.038343: | find_next_host_connection policy=IKEV1_ALLOW Aug 26 13:08:29.038346: | find_next_host_connection returns empty Aug 26 13:08:29.038367: | creating state object #46 at 0x55ea70a714a0 Aug 26 13:08:29.038371: | State DB: adding IKEv1 state #46 in UNDEFINED Aug 26 13:08:29.038377: | pstats #46 ikev1.isakmp started Aug 26 13:08:29.038382: | #46 updating local interface from to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:08:29.038389: | start processing: state #46 connection "test" from 192.1.2.45:500 (in main_inI1_outR1() at ikev1_main.c:667) Aug 26 13:08:29.038393: | parent state #46: UNDEFINED(ignore) => MAIN_R0(half-open IKE SA) Aug 26 13:08:29.038397: | sender checking NAT-T: enabled; VID 0 Aug 26 13:08:29.038401: "test" #46: responding to Main Mode Aug 26 13:08:29.038406: | **emit ISAKMP Message: Aug 26 13:08:29.038409: | initiator cookie: Aug 26 13:08:29.038412: | de 9c 75 a1 ea f1 8f 8a Aug 26 13:08:29.038415: | responder cookie: Aug 26 13:08:29.038417: | 24 48 32 5b a9 fd 77 e4 Aug 26 13:08:29.038420: | next payload type: ISAKMP_NEXT_SA (0x1) Aug 26 13:08:29.038423: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:29.038426: | exchange type: ISAKMP_XCHG_IDPROT (0x2) Aug 26 13:08:29.038429: | flags: none (0x0) Aug 26 13:08:29.038432: | Message ID: 0 (0x0) Aug 26 13:08:29.038435: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:29.038438: | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA Aug 26 13:08:29.038442: | ***emit ISAKMP Security Association Payload: Aug 26 13:08:29.038445: | next payload type: ISAKMP_NEXT_VID (0xd) Aug 26 13:08:29.038447: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:29.038451: | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID Aug 26 13:08:29.038454: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) Aug 26 13:08:29.038457: | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:08:29.038463: | ****parse IPsec DOI SIT: Aug 26 13:08:29.038466: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) Aug 26 13:08:29.038470: | ****parse ISAKMP Proposal Payload: Aug 26 13:08:29.038473: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:29.038477: | length: 28 (0x1c) Aug 26 13:08:29.038479: | proposal number: 1 (0x1) Aug 26 13:08:29.038483: | protocol ID: PROTO_ISAKMP (0x1) Aug 26 13:08:29.038485: | SPI size: 0 (0x0) Aug 26 13:08:29.038488: | number of transforms: 1 (0x1) Aug 26 13:08:29.038492: | *****parse ISAKMP Transform Payload (ISAKMP): Aug 26 13:08:29.038494: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:29.038497: | length: 20 (0x14) Aug 26 13:08:29.038500: | ISAKMP transform number: 1 (0x1) Aug 26 13:08:29.038503: | ISAKMP transform ID: KEY_IKE (0x1) Aug 26 13:08:29.038506: | ******parse ISAKMP Oakley attribute: Aug 26 13:08:29.038509: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) Aug 26 13:08:29.038511: | length/value: 24 (0x18) Aug 26 13:08:29.038514: | [24 is OAKLEY_CAMELLIA_CTR] Aug 26 13:08:29.038519: "test" #46: OAKLEY_CAMELLIA_CTR is not supported. Attribute OAKLEY_ENCRYPTION_ALGORITHM Aug 26 13:08:29.038522: "test" #46: no acceptable Oakley Transform Aug 26 13:08:29.038525: | complete v1 state transition with NO_PROPOSAL_CHOSEN Aug 26 13:08:29.038531: | [RE]START processing: state #46 connection "test" from 192.1.2.45:500 (in complete_v1_state_transition() at ikev1.c:2673) Aug 26 13:08:29.038534: | #46 is idle Aug 26 13:08:29.038607: "test" #46: sending notification NO_PROPOSAL_CHOSEN to 192.1.2.45:500 Aug 26 13:08:29.038613: | **emit ISAKMP Message: Aug 26 13:08:29.038616: | initiator cookie: Aug 26 13:08:29.038619: | de 9c 75 a1 ea f1 8f 8a Aug 26 13:08:29.038621: | responder cookie: Aug 26 13:08:29.038623: | 24 48 32 5b a9 fd 77 e4 Aug 26 13:08:29.038626: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:29.038629: | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) Aug 26 13:08:29.038632: | exchange type: ISAKMP_XCHG_INFO (0x5) Aug 26 13:08:29.038635: | flags: none (0x0) Aug 26 13:08:29.038638: | Message ID: 0 (0x0) Aug 26 13:08:29.038641: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:08:29.038644: | ***emit ISAKMP Notification Payload: Aug 26 13:08:29.038647: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:08:29.038649: | DOI: ISAKMP_DOI_IPSEC (0x1) Aug 26 13:08:29.038652: | protocol ID: 1 (0x1) Aug 26 13:08:29.038654: | SPI size: 0 (0x0) Aug 26 13:08:29.038657: | Notify Message Type: NO_PROPOSAL_CHOSEN (0xe) Aug 26 13:08:29.038661: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Notification Payload (11:ISAKMP_NEXT_N) Aug 26 13:08:29.038664: | next payload chain: saving location 'ISAKMP Notification Payload'.'next payload type' in 'notification msg' Aug 26 13:08:29.038667: | emitting length of ISAKMP Notification Payload: 12 Aug 26 13:08:29.038671: | emitting length of ISAKMP Message: 40 Aug 26 13:08:29.038678: | sending 40 bytes for notification packet through eth1 from 192.1.2.23:500 to 192.1.2.45:500 (using #46) Aug 26 13:08:29.038681: | de 9c 75 a1 ea f1 8f 8a 24 48 32 5b a9 fd 77 e4 Aug 26 13:08:29.038684: | 0b 10 05 00 00 00 00 00 00 00 00 28 00 00 00 0c Aug 26 13:08:29.038687: | 00 00 00 01 01 00 00 0e Aug 26 13:08:29.038717: | state transition function for STATE_MAIN_R0 failed: NO_PROPOSAL_CHOSEN Aug 26 13:08:29.038723: | stop processing: from 192.1.2.45:500 (BACKGROUND) (in process_md() at demux.c:380) Aug 26 13:08:29.038728: | stop processing: state #46 connection "test" from 192.1.2.45:500 (in process_md() at demux.c:382) Aug 26 13:08:29.038731: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:08:29.038736: | spent 0.511 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:08:29.214336: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:08:29.214361: shutting down Aug 26 13:08:29.214373: | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825) Aug 26 13:08:29.214378: | certs and keys locked by 'free_preshared_secrets' Aug 26 13:08:29.214380: forgetting secrets Aug 26 13:08:29.214385: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 13:08:29.214391: | start processing: connection "test" (in delete_connection() at connections.c:189) Aug 26 13:08:29.214395: | Deleting states for connection - including all other IPsec SA's of this IKE SA Aug 26 13:08:29.214398: | pass 0 Aug 26 13:08:29.214401: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 13:08:29.214405: | state #46 Aug 26 13:08:29.214410: | suspend processing: connection "test" (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.214417: | start processing: state #46 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.214421: | pstats #46 ikev1.isakmp deleted other Aug 26 13:08:29.214426: | [RE]START processing: state #46 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.214431: "test" #46: deleting state (STATE_MAIN_R0) aged 0.176s and NOT sending notification Aug 26 13:08:29.214435: | parent state #46: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.214499: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.214508: | stop processing: connection "test" (BACKGROUND) (in update_state_connection() at connections.c:4076) Aug 26 13:08:29.214512: | start processing: connection NULL (in update_state_connection() at connections.c:4077) Aug 26 13:08:29.214515: | in connection_discard for connection test Aug 26 13:08:29.214519: | State DB: deleting IKEv1 state #46 in MAIN_R0 Aug 26 13:08:29.214523: | parent state #46: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.214530: | stop processing: state #46 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.214535: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.214539: | state #45 Aug 26 13:08:29.214544: | start processing: state #45 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.214548: | pstats #45 ikev1.isakmp deleted other Aug 26 13:08:29.214553: | [RE]START processing: state #45 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.214557: "test" #45: deleting state (STATE_MAIN_R0) aged 0.210s and NOT sending notification Aug 26 13:08:29.214560: | parent state #45: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.214601: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.214606: | in connection_discard for connection test Aug 26 13:08:29.214609: | State DB: deleting IKEv1 state #45 in MAIN_R0 Aug 26 13:08:29.214613: | parent state #45: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.214619: | stop processing: state #45 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.214630: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.214633: | state #44 Aug 26 13:08:29.214639: | start processing: state #44 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.214642: | pstats #44 ikev1.isakmp deleted other Aug 26 13:08:29.214648: | [RE]START processing: state #44 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.214651: "test" #44: deleting state (STATE_MAIN_R0) aged 0.244s and NOT sending notification Aug 26 13:08:29.214655: | parent state #44: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.214695: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.214699: | in connection_discard for connection test Aug 26 13:08:29.214703: | State DB: deleting IKEv1 state #44 in MAIN_R0 Aug 26 13:08:29.214709: | parent state #44: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.214715: | stop processing: state #44 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.214723: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.214726: | state #43 Aug 26 13:08:29.214732: | start processing: state #43 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.214736: | pstats #43 ikev1.isakmp deleted other Aug 26 13:08:29.214741: | [RE]START processing: state #43 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.214745: "test" #43: deleting state (STATE_MAIN_R0) aged 0.277s and NOT sending notification Aug 26 13:08:29.214748: | parent state #43: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.214786: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.214791: | in connection_discard for connection test Aug 26 13:08:29.214794: | State DB: deleting IKEv1 state #43 in MAIN_R0 Aug 26 13:08:29.214798: | parent state #43: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.214804: | stop processing: state #43 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.214808: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.214811: | state #42 Aug 26 13:08:29.214817: | start processing: state #42 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.214820: | pstats #42 ikev1.isakmp deleted other Aug 26 13:08:29.214825: | [RE]START processing: state #42 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.214829: "test" #42: deleting state (STATE_MAIN_R0) aged 0.320s and NOT sending notification Aug 26 13:08:29.214832: | parent state #42: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.214869: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.214873: | in connection_discard for connection test Aug 26 13:08:29.214877: | State DB: deleting IKEv1 state #42 in MAIN_R0 Aug 26 13:08:29.214881: | parent state #42: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.214886: | stop processing: state #42 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.214894: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.214897: | state #41 Aug 26 13:08:29.214903: | start processing: state #41 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.214906: | pstats #41 ikev1.isakmp deleted other Aug 26 13:08:29.214911: | [RE]START processing: state #41 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.214915: "test" #41: deleting state (STATE_MAIN_R0) aged 0.349s and NOT sending notification Aug 26 13:08:29.214918: | parent state #41: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.214957: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.214961: | in connection_discard for connection test Aug 26 13:08:29.214965: | State DB: deleting IKEv1 state #41 in MAIN_R0 Aug 26 13:08:29.214969: | parent state #41: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.214974: | stop processing: state #41 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.214981: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.214985: | state #40 Aug 26 13:08:29.214990: | start processing: state #40 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.214994: | pstats #40 ikev1.isakmp deleted other Aug 26 13:08:29.214999: | [RE]START processing: state #40 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.215002: "test" #40: deleting state (STATE_MAIN_R0) aged 0.381s and NOT sending notification Aug 26 13:08:29.215008: | parent state #40: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.215046: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.215050: | in connection_discard for connection test Aug 26 13:08:29.215054: | State DB: deleting IKEv1 state #40 in MAIN_R0 Aug 26 13:08:29.215058: | parent state #40: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.215064: | stop processing: state #40 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.215068: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.215071: | state #39 Aug 26 13:08:29.215077: | start processing: state #39 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.215080: | pstats #39 ikev1.isakmp deleted other Aug 26 13:08:29.215085: | [RE]START processing: state #39 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.215089: "test" #39: deleting state (STATE_MAIN_R0) aged 0.407s and NOT sending notification Aug 26 13:08:29.215092: | parent state #39: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.215129: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.215133: | in connection_discard for connection test Aug 26 13:08:29.215137: | State DB: deleting IKEv1 state #39 in MAIN_R0 Aug 26 13:08:29.215141: | parent state #39: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.215146: | stop processing: state #39 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.215154: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.215157: | state #38 Aug 26 13:08:29.215163: | start processing: state #38 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.215166: | pstats #38 ikev1.isakmp deleted other Aug 26 13:08:29.215171: | [RE]START processing: state #38 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.215175: "test" #38: deleting state (STATE_MAIN_R0) aged 0.443s and NOT sending notification Aug 26 13:08:29.215178: | parent state #38: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.215216: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.215221: | in connection_discard for connection test Aug 26 13:08:29.215224: | State DB: deleting IKEv1 state #38 in MAIN_R0 Aug 26 13:08:29.215228: | parent state #38: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.215234: | stop processing: state #38 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.215241: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.215245: | state #37 Aug 26 13:08:29.215250: | start processing: state #37 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.215254: | pstats #37 ikev1.isakmp deleted other Aug 26 13:08:29.215259: | [RE]START processing: state #37 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.215263: "test" #37: deleting state (STATE_MAIN_R0) aged 0.477s and NOT sending notification Aug 26 13:08:29.215266: | parent state #37: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.215308: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.215315: | in connection_discard for connection test Aug 26 13:08:29.215319: | State DB: deleting IKEv1 state #37 in MAIN_R0 Aug 26 13:08:29.215323: | parent state #37: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.215328: | stop processing: state #37 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.215333: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.215336: | state #36 Aug 26 13:08:29.215341: | start processing: state #36 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.215346: | pstats #36 ikev1.isakmp deleted other Aug 26 13:08:29.215352: | [RE]START processing: state #36 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.215355: "test" #36: deleting state (STATE_MAIN_R0) aged 0.513s and NOT sending notification Aug 26 13:08:29.215359: | parent state #36: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.215397: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.215402: | in connection_discard for connection test Aug 26 13:08:29.215405: | State DB: deleting IKEv1 state #36 in MAIN_R0 Aug 26 13:08:29.215410: | parent state #36: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.215415: | stop processing: state #36 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.215423: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.215426: | state #35 Aug 26 13:08:29.215432: | start processing: state #35 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.215435: | pstats #35 ikev1.isakmp deleted other Aug 26 13:08:29.215440: | [RE]START processing: state #35 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.215444: "test" #35: deleting state (STATE_MAIN_R0) aged 0.547s and NOT sending notification Aug 26 13:08:29.215447: | parent state #35: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.215485: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.215489: | in connection_discard for connection test Aug 26 13:08:29.215493: | State DB: deleting IKEv1 state #35 in MAIN_R0 Aug 26 13:08:29.215497: | parent state #35: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.215502: | stop processing: state #35 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.215509: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.215513: | state #34 Aug 26 13:08:29.215519: | start processing: state #34 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.215522: | pstats #34 ikev1.isakmp deleted other Aug 26 13:08:29.215528: | [RE]START processing: state #34 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.215531: "test" #34: deleting state (STATE_MAIN_R0) aged 0.577s and NOT sending notification Aug 26 13:08:29.215535: | parent state #34: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.215572: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.215577: | in connection_discard for connection test Aug 26 13:08:29.215580: | State DB: deleting IKEv1 state #34 in MAIN_R0 Aug 26 13:08:29.215584: | parent state #34: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.215590: | stop processing: state #34 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.215594: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.215597: | state #33 Aug 26 13:08:29.215603: | start processing: state #33 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.215606: | pstats #33 ikev1.isakmp deleted other Aug 26 13:08:29.215611: | [RE]START processing: state #33 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.215615: "test" #33: deleting state (STATE_MAIN_R0) aged 0.615s and NOT sending notification Aug 26 13:08:29.215618: | parent state #33: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.215656: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.215660: | in connection_discard for connection test Aug 26 13:08:29.215663: | State DB: deleting IKEv1 state #33 in MAIN_R0 Aug 26 13:08:29.215671: | parent state #33: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.215676: | stop processing: state #33 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.215684: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.215687: | state #32 Aug 26 13:08:29.215693: | start processing: state #32 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.215696: | pstats #32 ikev1.isakmp deleted other Aug 26 13:08:29.215702: | [RE]START processing: state #32 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.215705: "test" #32: deleting state (STATE_MAIN_R0) aged 0.653s and NOT sending notification Aug 26 13:08:29.215709: | parent state #32: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.215746: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.215751: | in connection_discard for connection test Aug 26 13:08:29.215754: | State DB: deleting IKEv1 state #32 in MAIN_R0 Aug 26 13:08:29.215758: | parent state #32: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.215763: | stop processing: state #32 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.215771: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.215774: | state #31 Aug 26 13:08:29.215779: | start processing: state #31 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.215783: | pstats #31 ikev1.isakmp deleted other Aug 26 13:08:29.215789: | [RE]START processing: state #31 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.215792: "test" #31: deleting state (STATE_MAIN_R0) aged 0.690s and NOT sending notification Aug 26 13:08:29.215796: | parent state #31: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.215835: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.215839: | in connection_discard for connection test Aug 26 13:08:29.215843: | State DB: deleting IKEv1 state #31 in MAIN_R0 Aug 26 13:08:29.215847: | parent state #31: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.215852: | stop processing: state #31 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.215856: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.215859: | state #30 Aug 26 13:08:29.215865: | start processing: state #30 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.215868: | pstats #30 ikev1.isakmp deleted other Aug 26 13:08:29.215874: | [RE]START processing: state #30 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.215877: "test" #30: deleting state (STATE_MAIN_R0) aged 0.722s and NOT sending notification Aug 26 13:08:29.215881: | parent state #30: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.215918: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.215922: | in connection_discard for connection test Aug 26 13:08:29.215925: | State DB: deleting IKEv1 state #30 in MAIN_R0 Aug 26 13:08:29.215929: | parent state #30: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.215935: | stop processing: state #30 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.215942: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.215945: | state #29 Aug 26 13:08:29.215951: | start processing: state #29 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.215954: | pstats #29 ikev1.isakmp deleted other Aug 26 13:08:29.215959: | [RE]START processing: state #29 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.215963: "test" #29: deleting state (STATE_MAIN_R0) aged 0.756s and NOT sending notification Aug 26 13:08:29.215968: | parent state #29: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.216006: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.216011: | in connection_discard for connection test Aug 26 13:08:29.216014: | State DB: deleting IKEv1 state #29 in MAIN_R0 Aug 26 13:08:29.216018: | parent state #29: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.216024: | stop processing: state #29 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.216031: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.216034: | state #28 Aug 26 13:08:29.216040: | start processing: state #28 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.216043: | pstats #28 ikev1.isakmp deleted other Aug 26 13:08:29.216049: | [RE]START processing: state #28 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.216052: "test" #28: deleting state (STATE_MAIN_R0) aged 0.795s and NOT sending notification Aug 26 13:08:29.216056: | parent state #28: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.216095: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.216099: | in connection_discard for connection test Aug 26 13:08:29.216103: | State DB: deleting IKEv1 state #28 in MAIN_R0 Aug 26 13:08:29.216107: | parent state #28: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.216112: | stop processing: state #28 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.216116: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.216119: | state #27 Aug 26 13:08:29.216125: | start processing: state #27 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.216128: | pstats #27 ikev1.isakmp deleted other Aug 26 13:08:29.216134: | [RE]START processing: state #27 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.216137: "test" #27: deleting state (STATE_MAIN_R0) aged 0.832s and NOT sending notification Aug 26 13:08:29.216140: | parent state #27: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.216177: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.216182: | in connection_discard for connection test Aug 26 13:08:29.216185: | State DB: deleting IKEv1 state #27 in MAIN_R0 Aug 26 13:08:29.216189: | parent state #27: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.216195: | stop processing: state #27 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.216202: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.216205: | state #26 Aug 26 13:08:29.216211: | start processing: state #26 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.216214: | pstats #26 ikev1.isakmp deleted other Aug 26 13:08:29.216219: | [RE]START processing: state #26 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.216223: "test" #26: deleting state (STATE_MAIN_R0) aged 0.865s and NOT sending notification Aug 26 13:08:29.216226: | parent state #26: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.216264: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.216268: | in connection_discard for connection test Aug 26 13:08:29.216271: | State DB: deleting IKEv1 state #26 in MAIN_R0 Aug 26 13:08:29.216275: | parent state #26: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.216281: | stop processing: state #26 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.216292: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.216297: | state #25 Aug 26 13:08:29.216303: | start processing: state #25 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.216309: | pstats #25 ikev1.isakmp deleted other Aug 26 13:08:29.216314: | [RE]START processing: state #25 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.216318: "test" #25: deleting state (STATE_MAIN_R0) aged 0.899s and NOT sending notification Aug 26 13:08:29.216321: | parent state #25: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.216362: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.216367: | in connection_discard for connection test Aug 26 13:08:29.216370: | State DB: deleting IKEv1 state #25 in MAIN_R0 Aug 26 13:08:29.216374: | parent state #25: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.216380: | stop processing: state #25 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.216384: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.216387: | state #24 Aug 26 13:08:29.216393: | start processing: state #24 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.216396: | pstats #24 ikev1.isakmp deleted other Aug 26 13:08:29.216401: | [RE]START processing: state #24 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.216405: "test" #24: deleting state (STATE_MAIN_R0) aged 0.934s and NOT sending notification Aug 26 13:08:29.216408: | parent state #24: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.216446: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.216450: | in connection_discard for connection test Aug 26 13:08:29.216454: | State DB: deleting IKEv1 state #24 in MAIN_R0 Aug 26 13:08:29.216458: | parent state #24: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.216463: | stop processing: state #24 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.216471: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.216474: | state #23 Aug 26 13:08:29.216480: | start processing: state #23 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.216483: | pstats #23 ikev1.isakmp deleted other Aug 26 13:08:29.216488: | [RE]START processing: state #23 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.216492: "test" #23: deleting state (STATE_MAIN_R0) aged 0.963s and NOT sending notification Aug 26 13:08:29.216495: | parent state #23: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.216532: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.216537: | in connection_discard for connection test Aug 26 13:08:29.216540: | State DB: deleting IKEv1 state #23 in MAIN_R0 Aug 26 13:08:29.216544: | parent state #23: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.216550: | stop processing: state #23 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.216557: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.216560: | state #22 Aug 26 13:08:29.216566: | start processing: state #22 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.216569: | pstats #22 ikev1.isakmp deleted other Aug 26 13:08:29.216574: | [RE]START processing: state #22 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.216578: "test" #22: deleting state (STATE_MAIN_R0) aged 0.998s and NOT sending notification Aug 26 13:08:29.216581: | parent state #22: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.216619: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.216623: | in connection_discard for connection test Aug 26 13:08:29.216627: | State DB: deleting IKEv1 state #22 in MAIN_R0 Aug 26 13:08:29.216631: | parent state #22: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.216638: | stop processing: state #22 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.216643: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.216645: | state #21 Aug 26 13:08:29.216651: | start processing: state #21 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.216655: | pstats #21 ikev1.isakmp deleted other Aug 26 13:08:29.216660: | [RE]START processing: state #21 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.216664: "test" #21: deleting state (STATE_MAIN_R0) aged 1.034s and NOT sending notification Aug 26 13:08:29.216668: | parent state #21: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.216705: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.216709: | in connection_discard for connection test Aug 26 13:08:29.216713: | State DB: deleting IKEv1 state #21 in MAIN_R0 Aug 26 13:08:29.216717: | parent state #21: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.216722: | stop processing: state #21 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.216730: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.216733: | state #20 Aug 26 13:08:29.216738: | start processing: state #20 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.216742: | pstats #20 ikev1.isakmp deleted other Aug 26 13:08:29.216747: | [RE]START processing: state #20 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.216751: "test" #20: deleting state (STATE_MAIN_R0) aged 1.068s and NOT sending notification Aug 26 13:08:29.216754: | parent state #20: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.216792: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.216797: | in connection_discard for connection test Aug 26 13:08:29.216800: | State DB: deleting IKEv1 state #20 in MAIN_R0 Aug 26 13:08:29.216804: | parent state #20: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.216809: | stop processing: state #20 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.216817: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.216820: | state #19 Aug 26 13:08:29.216826: | start processing: state #19 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.216829: | pstats #19 ikev1.isakmp deleted other Aug 26 13:08:29.216835: | [RE]START processing: state #19 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.216838: "test" #19: deleting state (STATE_MAIN_R0) aged 1.102s and NOT sending notification Aug 26 13:08:29.216842: | parent state #19: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.216879: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.216884: | in connection_discard for connection test Aug 26 13:08:29.216888: | State DB: deleting IKEv1 state #19 in MAIN_R0 Aug 26 13:08:29.216892: | parent state #19: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.216897: | stop processing: state #19 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.216901: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.216904: | state #18 Aug 26 13:08:29.216910: | start processing: state #18 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.216913: | pstats #18 ikev1.isakmp deleted other Aug 26 13:08:29.216919: | [RE]START processing: state #18 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.216922: "test" #18: deleting state (STATE_MAIN_R0) aged 1.135s and NOT sending notification Aug 26 13:08:29.216928: | parent state #18: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.216965: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.216969: | in connection_discard for connection test Aug 26 13:08:29.216973: | State DB: deleting IKEv1 state #18 in MAIN_R0 Aug 26 13:08:29.216977: | parent state #18: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.216982: | stop processing: state #18 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.216990: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.216993: | state #17 Aug 26 13:08:29.216999: | start processing: state #17 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.217003: | pstats #17 ikev1.isakmp deleted other Aug 26 13:08:29.217008: | [RE]START processing: state #17 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.217011: "test" #17: deleting state (STATE_MAIN_R0) aged 1.166s and NOT sending notification Aug 26 13:08:29.217015: | parent state #17: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.217053: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.217057: | in connection_discard for connection test Aug 26 13:08:29.217060: | State DB: deleting IKEv1 state #17 in MAIN_R0 Aug 26 13:08:29.217064: | parent state #17: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.217070: | stop processing: state #17 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.217077: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.217080: | state #16 Aug 26 13:08:29.217086: | start processing: state #16 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.217089: | pstats #16 ikev1.isakmp deleted other Aug 26 13:08:29.217095: | [RE]START processing: state #16 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.217098: "test" #16: deleting state (STATE_MAIN_R0) aged 1.195s and NOT sending notification Aug 26 13:08:29.217102: | parent state #16: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.217139: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.217143: | in connection_discard for connection test Aug 26 13:08:29.217147: | State DB: deleting IKEv1 state #16 in MAIN_R0 Aug 26 13:08:29.217151: | parent state #16: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.217156: | stop processing: state #16 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.217161: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.217164: | state #15 Aug 26 13:08:29.217170: | start processing: state #15 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.217174: | pstats #15 ikev1.isakmp deleted other Aug 26 13:08:29.217179: | [RE]START processing: state #15 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.217183: "test" #15: deleting state (STATE_MAIN_R0) aged 1.230s and NOT sending notification Aug 26 13:08:29.217186: | parent state #15: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.217224: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.217228: | in connection_discard for connection test Aug 26 13:08:29.217232: | State DB: deleting IKEv1 state #15 in MAIN_R0 Aug 26 13:08:29.217236: | parent state #15: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.217241: | stop processing: state #15 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.217248: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.217251: | state #14 Aug 26 13:08:29.217257: | start processing: state #14 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.217262: | pstats #14 ikev1.isakmp deleted other Aug 26 13:08:29.217268: | [RE]START processing: state #14 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.217271: "test" #14: deleting state (STATE_MAIN_R0) aged 1.273s and NOT sending notification Aug 26 13:08:29.217275: | parent state #14: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.217317: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.217324: | in connection_discard for connection test Aug 26 13:08:29.217328: | State DB: deleting IKEv1 state #14 in MAIN_R0 Aug 26 13:08:29.217332: | parent state #14: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.217337: | stop processing: state #14 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.217345: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.217348: | state #13 Aug 26 13:08:29.217354: | start processing: state #13 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.217357: | pstats #13 ikev1.isakmp deleted other Aug 26 13:08:29.217362: | [RE]START processing: state #13 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.217366: "test" #13: deleting state (STATE_MAIN_R0) aged 1.316s and NOT sending notification Aug 26 13:08:29.217370: | parent state #13: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.217408: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.217413: | in connection_discard for connection test Aug 26 13:08:29.217417: | State DB: deleting IKEv1 state #13 in MAIN_R0 Aug 26 13:08:29.217421: | parent state #13: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.217426: | stop processing: state #13 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.217431: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.217434: | state #12 Aug 26 13:08:29.217440: | start processing: state #12 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.217444: | pstats #12 ikev1.isakmp deleted other Aug 26 13:08:29.217449: | [RE]START processing: state #12 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.217452: "test" #12: deleting state (STATE_MAIN_R0) aged 1.350s and NOT sending notification Aug 26 13:08:29.217456: | parent state #12: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.217493: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.217498: | in connection_discard for connection test Aug 26 13:08:29.217501: | State DB: deleting IKEv1 state #12 in MAIN_R0 Aug 26 13:08:29.217505: | parent state #12: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.217510: | stop processing: state #12 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.217518: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.217521: | state #11 Aug 26 13:08:29.217527: | start processing: state #11 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.217530: | pstats #11 ikev1.isakmp deleted other Aug 26 13:08:29.217535: | [RE]START processing: state #11 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.217539: "test" #11: deleting state (STATE_MAIN_R0) aged 1.386s and NOT sending notification Aug 26 13:08:29.217542: | parent state #11: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.217579: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.217583: | in connection_discard for connection test Aug 26 13:08:29.217587: | State DB: deleting IKEv1 state #11 in MAIN_R0 Aug 26 13:08:29.217591: | parent state #11: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.217598: | stop processing: state #11 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.217606: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.217609: | state #10 Aug 26 13:08:29.217615: | start processing: state #10 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.217618: | pstats #10 ikev1.isakmp deleted other Aug 26 13:08:29.217624: | [RE]START processing: state #10 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.217627: "test" #10: deleting state (STATE_MAIN_R0) aged 1.419s and NOT sending notification Aug 26 13:08:29.217631: | parent state #10: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.217668: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.217672: | in connection_discard for connection test Aug 26 13:08:29.217676: | State DB: deleting IKEv1 state #10 in MAIN_R0 Aug 26 13:08:29.217680: | parent state #10: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.217685: | stop processing: state #10 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.217689: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.217692: | state #9 Aug 26 13:08:29.217699: | start processing: state #9 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.217702: | pstats #9 ikev1.isakmp deleted other Aug 26 13:08:29.217707: | [RE]START processing: state #9 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.217712: "test" #9: deleting state (STATE_MAIN_R0) aged 1.453s and NOT sending notification Aug 26 13:08:29.217715: | parent state #9: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.217753: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.217758: | in connection_discard for connection test Aug 26 13:08:29.217761: | State DB: deleting IKEv1 state #9 in MAIN_R0 Aug 26 13:08:29.217765: | parent state #9: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.217771: | stop processing: state #9 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.217778: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.217781: | state #8 Aug 26 13:08:29.217787: | start processing: state #8 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.217790: | pstats #8 ikev1.isakmp deleted other Aug 26 13:08:29.217796: | [RE]START processing: state #8 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.217800: "test" #8: deleting state (STATE_MAIN_R0) aged 1.488s and NOT sending notification Aug 26 13:08:29.217803: | parent state #8: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.217840: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.217844: | in connection_discard for connection test Aug 26 13:08:29.217848: | State DB: deleting IKEv1 state #8 in MAIN_R0 Aug 26 13:08:29.217852: | parent state #8: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.217857: | stop processing: state #8 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.217864: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.217867: | state #7 Aug 26 13:08:29.217873: | start processing: state #7 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.217876: | pstats #7 ikev1.isakmp deleted other Aug 26 13:08:29.217882: | [RE]START processing: state #7 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.217885: "test" #7: deleting state (STATE_MAIN_R0) aged 1.519s and NOT sending notification Aug 26 13:08:29.217889: | parent state #7: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.217928: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.217933: | in connection_discard for connection test Aug 26 13:08:29.217936: | State DB: deleting IKEv1 state #7 in MAIN_R0 Aug 26 13:08:29.217940: | parent state #7: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.217945: | stop processing: state #7 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.217950: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.217953: | state #6 Aug 26 13:08:29.217958: | start processing: state #6 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.217962: | pstats #6 ikev1.isakmp deleted other Aug 26 13:08:29.217967: | [RE]START processing: state #6 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.217971: "test" #6: deleting state (STATE_MAIN_R0) aged 1.550s and NOT sending notification Aug 26 13:08:29.217974: | parent state #6: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.218012: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.218017: | in connection_discard for connection test Aug 26 13:08:29.218020: | State DB: deleting IKEv1 state #6 in MAIN_R0 Aug 26 13:08:29.218024: | parent state #6: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.218030: | stop processing: state #6 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.218038: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.218041: | state #5 Aug 26 13:08:29.218046: | start processing: state #5 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.218050: | pstats #5 ikev1.isakmp deleted other Aug 26 13:08:29.218055: | [RE]START processing: state #5 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.218058: "test" #5: deleting state (STATE_MAIN_R0) aged 1.579s and NOT sending notification Aug 26 13:08:29.218062: | parent state #5: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.218099: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.218104: | in connection_discard for connection test Aug 26 13:08:29.218107: | State DB: deleting IKEv1 state #5 in MAIN_R0 Aug 26 13:08:29.218111: | parent state #5: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.218117: | stop processing: state #5 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.218124: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.218127: | state #4 Aug 26 13:08:29.218133: | start processing: state #4 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.218136: | pstats #4 ikev1.isakmp deleted other Aug 26 13:08:29.218141: | [RE]START processing: state #4 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.218144: "test" #4: deleting state (STATE_MAIN_R0) aged 1.612s and NOT sending notification Aug 26 13:08:29.218148: | parent state #4: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.218184: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.218189: | in connection_discard for connection test Aug 26 13:08:29.218192: | State DB: deleting IKEv1 state #4 in MAIN_R0 Aug 26 13:08:29.218196: | parent state #4: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.218202: | stop processing: state #4 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.218206: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.218209: | state #3 Aug 26 13:08:29.218215: | start processing: state #3 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.218220: | pstats #3 ikev1.isakmp deleted other Aug 26 13:08:29.218225: | [RE]START processing: state #3 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.218229: "test" #3: deleting state (STATE_MAIN_R0) aged 1.642s and NOT sending notification Aug 26 13:08:29.218232: | parent state #3: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.218270: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.218274: | in connection_discard for connection test Aug 26 13:08:29.218278: | State DB: deleting IKEv1 state #3 in MAIN_R0 Aug 26 13:08:29.218282: | parent state #3: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.218287: | stop processing: state #3 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.218301: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.218304: | state #2 Aug 26 13:08:29.218311: | start processing: state #2 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.218314: | pstats #2 ikev1.isakmp deleted other Aug 26 13:08:29.218319: | [RE]START processing: state #2 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.218323: "test" #2: deleting state (STATE_MAIN_R0) aged 1.673s and NOT sending notification Aug 26 13:08:29.218326: | parent state #2: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.218365: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.218369: | in connection_discard for connection test Aug 26 13:08:29.218373: | State DB: deleting IKEv1 state #2 in MAIN_R0 Aug 26 13:08:29.218377: | parent state #2: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.218382: | stop processing: state #2 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.218389: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.218392: | state #1 Aug 26 13:08:29.218398: | start processing: state #1 connection "test" from 192.1.2.45:500 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:08:29.218401: | pstats #1 ikev1.isakmp deleted other Aug 26 13:08:29.218407: | [RE]START processing: state #1 connection "test" from 192.1.2.45:500 (in delete_state() at state.c:879) Aug 26 13:08:29.218410: "test" #1: deleting state (STATE_MAIN_R0) aged 1.813s and NOT sending notification Aug 26 13:08:29.218414: | parent state #1: MAIN_R0(half-open IKE SA) => delete Aug 26 13:08:29.220963: | State DB: IKEv1 state not found (flush_incomplete_children) Aug 26 13:08:29.220984: | in connection_discard for connection test Aug 26 13:08:29.220989: | State DB: deleting IKEv1 state #1 in MAIN_R0 Aug 26 13:08:29.220995: | parent state #1: MAIN_R0(half-open IKE SA) => UNDEFINED(ignore) Aug 26 13:08:29.221005: | stop processing: state #1 from 192.1.2.45:500 (in delete_state() at state.c:1143) Aug 26 13:08:29.221014: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:08:29.221018: | pass 1 Aug 26 13:08:29.221022: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 13:08:29.221027: | free hp@0x55ea70a1c900 Aug 26 13:08:29.221031: | flush revival: connection 'test' wasn't on the list Aug 26 13:08:29.221035: | processing: STOP connection NULL (in discard_connection() at connections.c:249) Aug 26 13:08:29.221041: | crl fetch request list locked by 'free_crl_fetch' Aug 26 13:08:29.221045: | crl fetch request list unlocked by 'free_crl_fetch' Aug 26 13:08:29.221060: shutting down interface lo/lo 127.0.0.1:4500 Aug 26 13:08:29.221067: shutting down interface lo/lo 127.0.0.1:500 Aug 26 13:08:29.221071: shutting down interface eth0/eth0 192.0.2.254:4500 Aug 26 13:08:29.221075: shutting down interface eth0/eth0 192.0.2.254:500 Aug 26 13:08:29.221079: shutting down interface eth1/eth1 192.1.2.23:4500 Aug 26 13:08:29.221083: shutting down interface eth1/eth1 192.1.2.23:500 Aug 26 13:08:29.221088: | FOR_EACH_STATE_... in delete_states_dead_interfaces Aug 26 13:08:29.221100: | libevent_free: release ptr-libevent@0x55ea70a4feb0 Aug 26 13:08:29.221105: | free_event_entry: release EVENT_NULL-pe@0x55ea70a39170 Aug 26 13:08:29.221119: | libevent_free: release ptr-libevent@0x55ea70a4ffa0 Aug 26 13:08:29.221123: | free_event_entry: release EVENT_NULL-pe@0x55ea70a4ff60 Aug 26 13:08:29.221131: | libevent_free: release ptr-libevent@0x55ea70a50090 Aug 26 13:08:29.221135: | free_event_entry: release EVENT_NULL-pe@0x55ea70a50050 Aug 26 13:08:29.221142: | libevent_free: release ptr-libevent@0x55ea70a50180 Aug 26 13:08:29.221146: | free_event_entry: release EVENT_NULL-pe@0x55ea70a50140 Aug 26 13:08:29.221153: | libevent_free: release ptr-libevent@0x55ea70a50270 Aug 26 13:08:29.221156: | free_event_entry: release EVENT_NULL-pe@0x55ea70a50230 Aug 26 13:08:29.221163: | libevent_free: release ptr-libevent@0x55ea70a50360 Aug 26 13:08:29.221167: | free_event_entry: release EVENT_NULL-pe@0x55ea70a50320 Aug 26 13:08:29.221173: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 13:08:29.223780: | libevent_free: release ptr-libevent@0x55ea70a4f810 Aug 26 13:08:29.223796: | free_event_entry: release EVENT_NULL-pe@0x55ea70a383f0 Aug 26 13:08:29.223802: | libevent_free: release ptr-libevent@0x55ea70a452f0 Aug 26 13:08:29.223805: | free_event_entry: release EVENT_NULL-pe@0x55ea70a386a0 Aug 26 13:08:29.223809: | libevent_free: release ptr-libevent@0x55ea70a45260 Aug 26 13:08:29.223814: | free_event_entry: release EVENT_NULL-pe@0x55ea70a3de00 Aug 26 13:08:29.223818: | global timer EVENT_REINIT_SECRET uninitialized Aug 26 13:08:29.223821: | global timer EVENT_SHUNT_SCAN uninitialized Aug 26 13:08:29.223824: | global timer EVENT_PENDING_DDNS uninitialized Aug 26 13:08:29.223827: | global timer EVENT_PENDING_PHASE2 uninitialized Aug 26 13:08:29.223830: | global timer EVENT_CHECK_CRLS uninitialized Aug 26 13:08:29.223833: | global timer EVENT_REVIVE_CONNS uninitialized Aug 26 13:08:29.223835: | global timer EVENT_FREE_ROOT_CERTS uninitialized Aug 26 13:08:29.223838: | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized Aug 26 13:08:29.223841: | global timer EVENT_NAT_T_KEEPALIVE uninitialized Aug 26 13:08:29.223847: | libevent_free: release ptr-libevent@0x55ea70a4f8e0 Aug 26 13:08:29.223850: | signal event handler PLUTO_SIGCHLD uninstalled Aug 26 13:08:29.223854: | libevent_free: release ptr-libevent@0x55ea70a4f9c0 Aug 26 13:08:29.223856: | signal event handler PLUTO_SIGTERM uninstalled Aug 26 13:08:29.223860: | libevent_free: release ptr-libevent@0x55ea70a4fa80 Aug 26 13:08:29.223863: | signal event handler PLUTO_SIGHUP uninstalled Aug 26 13:08:29.223866: | libevent_free: release ptr-libevent@0x55ea70a445d0 Aug 26 13:08:29.223870: | signal event handler PLUTO_SIGSYS uninstalled Aug 26 13:08:29.223873: | releasing event base Aug 26 13:08:29.223887: | libevent_free: release ptr-libevent@0x55ea70a4fb40 Aug 26 13:08:29.223890: | libevent_free: release ptr-libevent@0x55ea70a25140 Aug 26 13:08:29.223894: | libevent_free: release ptr-libevent@0x55ea70a33980 Aug 26 13:08:29.223897: | libevent_free: release ptr-libevent@0x55ea70a33a50 Aug 26 13:08:29.223900: | libevent_free: release ptr-libevent@0x55ea70a339a0 Aug 26 13:08:29.223903: | libevent_free: release ptr-libevent@0x55ea70a4f8a0 Aug 26 13:08:29.223906: | libevent_free: release ptr-libevent@0x55ea70a4f980 Aug 26 13:08:29.223909: | libevent_free: release ptr-libevent@0x55ea70a33a30 Aug 26 13:08:29.223912: | libevent_free: release ptr-libevent@0x55ea70a33b90 Aug 26 13:08:29.223914: | libevent_free: release ptr-libevent@0x55ea70a385f0 Aug 26 13:08:29.223917: | libevent_free: release ptr-libevent@0x55ea70a503f0 Aug 26 13:08:29.223920: | libevent_free: release ptr-libevent@0x55ea70a50300 Aug 26 13:08:29.223923: | libevent_free: release ptr-libevent@0x55ea70a50210 Aug 26 13:08:29.223925: | libevent_free: release ptr-libevent@0x55ea70a50120 Aug 26 13:08:29.223928: | libevent_free: release ptr-libevent@0x55ea70a50030 Aug 26 13:08:29.223931: | libevent_free: release ptr-libevent@0x55ea70a4ff40 Aug 26 13:08:29.223937: | libevent_free: release ptr-libevent@0x55ea709b7370 Aug 26 13:08:29.223940: | libevent_free: release ptr-libevent@0x55ea70a4fa60 Aug 26 13:08:29.223943: | libevent_free: release ptr-libevent@0x55ea70a4f9a0 Aug 26 13:08:29.223945: | libevent_free: release ptr-libevent@0x55ea70a4f8c0 Aug 26 13:08:29.223948: | libevent_free: release ptr-libevent@0x55ea70a4fb20 Aug 26 13:08:29.223951: | libevent_free: release ptr-libevent@0x55ea709b55b0 Aug 26 13:08:29.223954: | libevent_free: release ptr-libevent@0x55ea70a339c0 Aug 26 13:08:29.223957: | libevent_free: release ptr-libevent@0x55ea70a339f0 Aug 26 13:08:29.223960: | libevent_free: release ptr-libevent@0x55ea70a336e0 Aug 26 13:08:29.223962: | releasing global libevent data Aug 26 13:08:29.223966: | libevent_free: release ptr-libevent@0x55ea70a323d0 Aug 26 13:08:29.223969: | libevent_free: release ptr-libevent@0x55ea70a33680 Aug 26 13:08:29.223972: | libevent_free: release ptr-libevent@0x55ea70a336b0