Aug 26 13:09:09.302481: FIPS Product: YES Aug 26 13:09:09.302513: FIPS Kernel: NO Aug 26 13:09:09.302516: FIPS Mode: NO Aug 26 13:09:09.302518: NSS DB directory: sql:/etc/ipsec.d Aug 26 13:09:09.302647: Initializing NSS Aug 26 13:09:09.302651: Opening NSS database "sql:/etc/ipsec.d" read-only Aug 26 13:09:09.334964: NSS initialized Aug 26 13:09:09.334975: NSS crypto library initialized Aug 26 13:09:09.334977: FIPS HMAC integrity support [enabled] Aug 26 13:09:09.334979: FIPS mode disabled for pluto daemon Aug 26 13:09:09.373776: FIPS HMAC integrity verification self-test FAILED Aug 26 13:09:09.373862: libcap-ng support [enabled] Aug 26 13:09:09.373870: Linux audit support [enabled] Aug 26 13:09:09.373892: Linux audit activated Aug 26 13:09:09.373895: Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:2568 Aug 26 13:09:09.373897: core dump dir: /tmp Aug 26 13:09:09.373899: secrets file: /etc/ipsec.secrets Aug 26 13:09:09.373900: leak-detective enabled Aug 26 13:09:09.373902: NSS crypto [enabled] Aug 26 13:09:09.373903: XAUTH PAM support [enabled] Aug 26 13:09:09.373966: | libevent is using pluto's memory allocator Aug 26 13:09:09.373974: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Aug 26 13:09:09.373992: | libevent_malloc: new ptr-libevent@0x56552e8b69e8 size 40 Aug 26 13:09:09.373998: | libevent_malloc: new ptr-libevent@0x56552e8b6968 size 40 Aug 26 13:09:09.374002: | libevent_malloc: new ptr-libevent@0x56552e8b68e8 size 40 Aug 26 13:09:09.374005: | creating event base Aug 26 13:09:09.374009: | libevent_malloc: new ptr-libevent@0x56552e8a8518 size 56 Aug 26 13:09:09.374013: | libevent_malloc: new ptr-libevent@0x56552e829c58 size 664 Aug 26 13:09:09.374026: | libevent_malloc: new ptr-libevent@0x56552e8f1008 size 24 Aug 26 13:09:09.374029: | libevent_malloc: new ptr-libevent@0x56552e8f1058 size 384 Aug 26 13:09:09.374039: | libevent_malloc: new ptr-libevent@0x56552e8f0fc8 size 16 Aug 26 13:09:09.374042: | libevent_malloc: new ptr-libevent@0x56552e8b6868 size 40 Aug 26 13:09:09.374045: | libevent_malloc: new ptr-libevent@0x56552e8b67e8 size 48 Aug 26 13:09:09.374051: | libevent_realloc: new ptr-libevent@0x56552e8298e8 size 256 Aug 26 13:09:09.374054: | libevent_malloc: new ptr-libevent@0x56552e8f1208 size 16 Aug 26 13:09:09.374059: | libevent_free: release ptr-libevent@0x56552e8a8518 Aug 26 13:09:09.374063: | libevent initialized Aug 26 13:09:09.374066: | libevent_realloc: new ptr-libevent@0x56552e8a8518 size 64 Aug 26 13:09:09.374070: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Aug 26 13:09:09.374088: | init_nat_traversal() initialized with keep_alive=0s Aug 26 13:09:09.374091: NAT-Traversal support [enabled] Aug 26 13:09:09.374094: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Aug 26 13:09:09.374100: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Aug 26 13:09:09.374104: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Aug 26 13:09:09.374137: | global one-shot timer EVENT_REVIVE_CONNS initialized Aug 26 13:09:09.374142: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Aug 26 13:09:09.374146: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Aug 26 13:09:09.374199: Encryption algorithms: Aug 26 13:09:09.374209: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c Aug 26 13:09:09.374215: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b Aug 26 13:09:09.374219: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a Aug 26 13:09:09.374223: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des Aug 26 13:09:09.374227: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Aug 26 13:09:09.374238: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia Aug 26 13:09:09.374243: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c Aug 26 13:09:09.374247: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b Aug 26 13:09:09.374252: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a Aug 26 13:09:09.374256: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr Aug 26 13:09:09.374260: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes Aug 26 13:09:09.374264: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent Aug 26 13:09:09.374268: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish Aug 26 13:09:09.374272: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh Aug 26 13:09:09.374276: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac Aug 26 13:09:09.374279: NULL IKEv1: ESP IKEv2: ESP [] Aug 26 13:09:09.374283: CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Aug 26 13:09:09.374311: Hash algorithms: Aug 26 13:09:09.374318: MD5 IKEv1: IKE IKEv2: Aug 26 13:09:09.374322: SHA1 IKEv1: IKE IKEv2: FIPS sha Aug 26 13:09:09.374325: SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 Aug 26 13:09:09.374329: SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 Aug 26 13:09:09.374332: SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 Aug 26 13:09:09.374345: PRF algorithms: Aug 26 13:09:09.374349: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 Aug 26 13:09:09.374353: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 Aug 26 13:09:09.374357: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 Aug 26 13:09:09.374360: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 Aug 26 13:09:09.374364: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 Aug 26 13:09:09.374367: AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Aug 26 13:09:09.374394: Integrity algorithms: Aug 26 13:09:09.374398: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 Aug 26 13:09:09.374403: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 Aug 26 13:09:09.374407: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Aug 26 13:09:09.374411: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Aug 26 13:09:09.374416: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Aug 26 13:09:09.374419: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Aug 26 13:09:09.374423: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 Aug 26 13:09:09.374427: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Aug 26 13:09:09.374430: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Aug 26 13:09:09.374443: DH algorithms: Aug 26 13:09:09.374447: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 Aug 26 13:09:09.374450: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 Aug 26 13:09:09.374454: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 Aug 26 13:09:09.374460: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 Aug 26 13:09:09.374463: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 Aug 26 13:09:09.374466: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 Aug 26 13:09:09.374469: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 Aug 26 13:09:09.374473: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 Aug 26 13:09:09.374476: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 Aug 26 13:09:09.374479: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 Aug 26 13:09:09.374481: DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 Aug 26 13:09:09.374484: testing CAMELLIA_CBC: Aug 26 13:09:09.374487: Camellia: 16 bytes with 128-bit key Aug 26 13:09:09.374624: Camellia: 16 bytes with 128-bit key Aug 26 13:09:09.374659: Camellia: 16 bytes with 256-bit key Aug 26 13:09:09.374696: Camellia: 16 bytes with 256-bit key Aug 26 13:09:09.374728: testing AES_GCM_16: Aug 26 13:09:09.374732: empty string Aug 26 13:09:09.374764: one block Aug 26 13:09:09.374793: two blocks Aug 26 13:09:09.374822: two blocks with associated data Aug 26 13:09:09.374851: testing AES_CTR: Aug 26 13:09:09.374855: Encrypting 16 octets using AES-CTR with 128-bit key Aug 26 13:09:09.374883: Encrypting 32 octets using AES-CTR with 128-bit key Aug 26 13:09:09.374914: Encrypting 36 octets using AES-CTR with 128-bit key Aug 26 13:09:09.374946: Encrypting 16 octets using AES-CTR with 192-bit key Aug 26 13:09:09.374975: Encrypting 32 octets using AES-CTR with 192-bit key Aug 26 13:09:09.375004: Encrypting 36 octets using AES-CTR with 192-bit key Aug 26 13:09:09.375035: Encrypting 16 octets using AES-CTR with 256-bit key Aug 26 13:09:09.375064: Encrypting 32 octets using AES-CTR with 256-bit key Aug 26 13:09:09.375093: Encrypting 36 octets using AES-CTR with 256-bit key Aug 26 13:09:09.375121: testing AES_CBC: Aug 26 13:09:09.375124: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Aug 26 13:09:09.375152: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Aug 26 13:09:09.375184: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Aug 26 13:09:09.375214: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Aug 26 13:09:09.375248: testing AES_XCBC: Aug 26 13:09:09.375251: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input Aug 26 13:09:09.375374: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input Aug 26 13:09:09.375511: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input Aug 26 13:09:09.375645: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input Aug 26 13:09:09.375785: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input Aug 26 13:09:09.375918: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input Aug 26 13:09:09.376055: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input Aug 26 13:09:09.376392: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Aug 26 13:09:09.376530: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Aug 26 13:09:09.376671: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Aug 26 13:09:09.376920: testing HMAC_MD5: Aug 26 13:09:09.376926: RFC 2104: MD5_HMAC test 1 Aug 26 13:09:09.377104: RFC 2104: MD5_HMAC test 2 Aug 26 13:09:09.377267: RFC 2104: MD5_HMAC test 3 Aug 26 13:09:09.377467: 8 CPU cores online Aug 26 13:09:09.377475: starting up 7 crypto helpers Aug 26 13:09:09.377518: started thread for crypto helper 0 Aug 26 13:09:09.377541: started thread for crypto helper 1 Aug 26 13:09:09.377548: | starting up helper thread 1 Aug 26 13:09:09.377562: started thread for crypto helper 2 Aug 26 13:09:09.377565: | status value returned by setting the priority of this thread (crypto helper 1) 22 Aug 26 13:09:09.377574: | crypto helper 1 waiting (nothing to do) Aug 26 13:09:09.377578: | starting up helper thread 0 Aug 26 13:09:09.377588: | starting up helper thread 3 Aug 26 13:09:09.377585: started thread for crypto helper 3 Aug 26 13:09:09.377596: | status value returned by setting the priority of this thread (crypto helper 0) 22 Aug 26 13:09:09.377594: | status value returned by setting the priority of this thread (crypto helper 3) 22 Aug 26 13:09:09.377601: | crypto helper 0 waiting (nothing to do) Aug 26 13:09:09.377615: | crypto helper 3 waiting (nothing to do) Aug 26 13:09:09.377617: started thread for crypto helper 4 Aug 26 13:09:09.377650: started thread for crypto helper 5 Aug 26 13:09:09.377678: started thread for crypto helper 6 Aug 26 13:09:09.377680: | starting up helper thread 6 Aug 26 13:09:09.377620: | starting up helper thread 4 Aug 26 13:09:09.377683: | checking IKEv1 state table Aug 26 13:09:09.377690: | status value returned by setting the priority of this thread (crypto helper 6) 22 Aug 26 13:09:09.377702: | crypto helper 6 waiting (nothing to do) Aug 26 13:09:09.377705: | MAIN_R0: category: half-open IKE SA flags: 0: Aug 26 13:09:09.377710: | -> MAIN_R1 EVENT_SO_DISCARD Aug 26 13:09:09.377714: | MAIN_I1: category: half-open IKE SA flags: 0: Aug 26 13:09:09.377717: | -> MAIN_I2 EVENT_RETRANSMIT Aug 26 13:09:09.377721: | MAIN_R1: category: open IKE SA flags: 200: Aug 26 13:09:09.377724: | -> MAIN_R2 EVENT_RETRANSMIT Aug 26 13:09:09.377727: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:09:09.377730: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:09:09.377733: | MAIN_I2: category: open IKE SA flags: 0: Aug 26 13:09:09.377736: | -> MAIN_I3 EVENT_RETRANSMIT Aug 26 13:09:09.377739: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:09:09.377743: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:09:09.377746: | MAIN_R2: category: open IKE SA flags: 0: Aug 26 13:09:09.377750: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:09:09.377753: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:09:09.377756: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 13:09:09.377760: | MAIN_I3: category: open IKE SA flags: 0: Aug 26 13:09:09.377763: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:09:09.377767: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:09:09.377770: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 13:09:09.377773: | MAIN_R3: category: established IKE SA flags: 200: Aug 26 13:09:09.377777: | -> UNDEFINED EVENT_NULL Aug 26 13:09:09.377780: | MAIN_I4: category: established IKE SA flags: 0: Aug 26 13:09:09.377783: | -> UNDEFINED EVENT_NULL Aug 26 13:09:09.377787: | AGGR_R0: category: half-open IKE SA flags: 0: Aug 26 13:09:09.377790: | -> AGGR_R1 EVENT_SO_DISCARD Aug 26 13:09:09.377794: | AGGR_I1: category: half-open IKE SA flags: 0: Aug 26 13:09:09.377797: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 13:09:09.377800: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 13:09:09.377803: | AGGR_R1: category: open IKE SA flags: 200: Aug 26 13:09:09.377807: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 13:09:09.377809: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 13:09:09.377813: | AGGR_I2: category: established IKE SA flags: 200: Aug 26 13:09:09.377816: | -> UNDEFINED EVENT_NULL Aug 26 13:09:09.377820: | AGGR_R2: category: established IKE SA flags: 0: Aug 26 13:09:09.377823: | -> UNDEFINED EVENT_NULL Aug 26 13:09:09.377827: | QUICK_R0: category: established CHILD SA flags: 0: Aug 26 13:09:09.377830: | -> QUICK_R1 EVENT_RETRANSMIT Aug 26 13:09:09.377833: | QUICK_I1: category: established CHILD SA flags: 0: Aug 26 13:09:09.377837: | -> QUICK_I2 EVENT_SA_REPLACE Aug 26 13:09:09.377840: | QUICK_R1: category: established CHILD SA flags: 0: Aug 26 13:09:09.377843: | -> QUICK_R2 EVENT_SA_REPLACE Aug 26 13:09:09.377847: | QUICK_I2: category: established CHILD SA flags: 200: Aug 26 13:09:09.377850: | -> UNDEFINED EVENT_NULL Aug 26 13:09:09.377854: | QUICK_R2: category: established CHILD SA flags: 0: Aug 26 13:09:09.377857: | -> UNDEFINED EVENT_NULL Aug 26 13:09:09.377860: | INFO: category: informational flags: 0: Aug 26 13:09:09.377866: | -> UNDEFINED EVENT_NULL Aug 26 13:09:09.377870: | INFO_PROTECTED: category: informational flags: 0: Aug 26 13:09:09.377873: | -> UNDEFINED EVENT_NULL Aug 26 13:09:09.377877: | XAUTH_R0: category: established IKE SA flags: 0: Aug 26 13:09:09.377880: | -> XAUTH_R1 EVENT_NULL Aug 26 13:09:09.377884: | XAUTH_R1: category: established IKE SA flags: 0: Aug 26 13:09:09.377887: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:09:09.377890: | MODE_CFG_R0: category: informational flags: 0: Aug 26 13:09:09.377894: | -> MODE_CFG_R1 EVENT_SA_REPLACE Aug 26 13:09:09.377897: | MODE_CFG_R1: category: established IKE SA flags: 0: Aug 26 13:09:09.377900: | -> MODE_CFG_R2 EVENT_SA_REPLACE Aug 26 13:09:09.377904: | MODE_CFG_R2: category: established IKE SA flags: 0: Aug 26 13:09:09.377907: | -> UNDEFINED EVENT_NULL Aug 26 13:09:09.377911: | MODE_CFG_I1: category: established IKE SA flags: 0: Aug 26 13:09:09.377914: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:09:09.377918: | XAUTH_I0: category: established IKE SA flags: 0: Aug 26 13:09:09.377921: | -> XAUTH_I1 EVENT_RETRANSMIT Aug 26 13:09:09.377924: | XAUTH_I1: category: established IKE SA flags: 0: Aug 26 13:09:09.377927: | -> MAIN_I4 EVENT_RETRANSMIT Aug 26 13:09:09.377934: | checking IKEv2 state table Aug 26 13:09:09.377942: | PARENT_I0: category: ignore flags: 0: Aug 26 13:09:09.377945: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Aug 26 13:09:09.377949: | PARENT_I1: category: half-open IKE SA flags: 0: Aug 26 13:09:09.377953: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) Aug 26 13:09:09.377957: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) Aug 26 13:09:09.377961: | PARENT_I2: category: open IKE SA flags: 0: Aug 26 13:09:09.377965: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Aug 26 13:09:09.377968: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Aug 26 13:09:09.377972: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Aug 26 13:09:09.377976: | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Aug 26 13:09:09.377980: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Aug 26 13:09:09.377983: | PARENT_I3: category: established IKE SA flags: 0: Aug 26 13:09:09.377987: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) Aug 26 13:09:09.377990: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) Aug 26 13:09:09.377994: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) Aug 26 13:09:09.377997: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) Aug 26 13:09:09.378000: | PARENT_R0: category: half-open IKE SA flags: 0: Aug 26 13:09:09.378004: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) Aug 26 13:09:09.378008: | PARENT_R1: category: half-open IKE SA flags: 0: Aug 26 13:09:09.378012: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) Aug 26 13:09:09.378015: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) Aug 26 13:09:09.378019: | PARENT_R2: category: established IKE SA flags: 0: Aug 26 13:09:09.378023: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) Aug 26 13:09:09.378026: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) Aug 26 13:09:09.378030: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) Aug 26 13:09:09.378033: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) Aug 26 13:09:09.378037: | V2_CREATE_I0: category: established IKE SA flags: 0: Aug 26 13:09:09.378040: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Aug 26 13:09:09.378044: | V2_CREATE_I: category: established IKE SA flags: 0: Aug 26 13:09:09.378050: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Aug 26 13:09:09.378054: | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: Aug 26 13:09:09.378057: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Aug 26 13:09:09.378061: | V2_REKEY_IKE_I: category: established IKE SA flags: 0: Aug 26 13:09:09.378065: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Aug 26 13:09:09.378069: | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: Aug 26 13:09:09.378072: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Aug 26 13:09:09.378076: | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: Aug 26 13:09:09.378080: | V2_CREATE_R: category: established IKE SA flags: 0: Aug 26 13:09:09.378084: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) Aug 26 13:09:09.378088: | V2_REKEY_IKE_R: category: established IKE SA flags: 0: Aug 26 13:09:09.378092: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) Aug 26 13:09:09.378096: | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: Aug 26 13:09:09.378099: | V2_IPSEC_I: category: established CHILD SA flags: 0: Aug 26 13:09:09.378103: | V2_IPSEC_R: category: established CHILD SA flags: 0: Aug 26 13:09:09.378107: | IKESA_DEL: category: established IKE SA flags: 0: Aug 26 13:09:09.378110: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Aug 26 13:09:09.378114: | CHILDSA_DEL: category: informational flags: 0: Aug 26 13:09:09.378180: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 Aug 26 13:09:09.378320: | starting up helper thread 5 Aug 26 13:09:09.378334: | status value returned by setting the priority of this thread (crypto helper 5) 22 Aug 26 13:09:09.378337: | crypto helper 5 waiting (nothing to do) Aug 26 13:09:09.378589: | Hard-wiring algorithms Aug 26 13:09:09.378595: | adding AES_CCM_16 to kernel algorithm db Aug 26 13:09:09.378600: | adding AES_CCM_12 to kernel algorithm db Aug 26 13:09:09.378604: | adding AES_CCM_8 to kernel algorithm db Aug 26 13:09:09.378607: | adding 3DES_CBC to kernel algorithm db Aug 26 13:09:09.378610: | adding CAMELLIA_CBC to kernel algorithm db Aug 26 13:09:09.378613: | adding AES_GCM_16 to kernel algorithm db Aug 26 13:09:09.378617: | adding AES_GCM_12 to kernel algorithm db Aug 26 13:09:09.378620: | adding AES_GCM_8 to kernel algorithm db Aug 26 13:09:09.378623: | adding AES_CTR to kernel algorithm db Aug 26 13:09:09.378626: | adding AES_CBC to kernel algorithm db Aug 26 13:09:09.378630: | adding SERPENT_CBC to kernel algorithm db Aug 26 13:09:09.378633: | adding TWOFISH_CBC to kernel algorithm db Aug 26 13:09:09.378637: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Aug 26 13:09:09.378640: | adding NULL to kernel algorithm db Aug 26 13:09:09.378643: | adding CHACHA20_POLY1305 to kernel algorithm db Aug 26 13:09:09.378647: | adding HMAC_MD5_96 to kernel algorithm db Aug 26 13:09:09.378650: | adding HMAC_SHA1_96 to kernel algorithm db Aug 26 13:09:09.378653: | adding HMAC_SHA2_512_256 to kernel algorithm db Aug 26 13:09:09.378656: | adding HMAC_SHA2_384_192 to kernel algorithm db Aug 26 13:09:09.378660: | adding HMAC_SHA2_256_128 to kernel algorithm db Aug 26 13:09:09.378663: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Aug 26 13:09:09.378666: | adding AES_XCBC_96 to kernel algorithm db Aug 26 13:09:09.378669: | adding AES_CMAC_96 to kernel algorithm db Aug 26 13:09:09.378672: | adding NONE to kernel algorithm db Aug 26 13:09:09.378693: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Aug 26 13:09:09.378701: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Aug 26 13:09:09.378704: | setup kernel fd callback Aug 26 13:09:09.378708: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x56552e8b0708 Aug 26 13:09:09.378713: | libevent_malloc: new ptr-libevent@0x56552e8ef778 size 128 Aug 26 13:09:09.378720: | libevent_malloc: new ptr-libevent@0x56552e8f6808 size 16 Aug 26 13:09:09.378728: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x56552e8f6798 Aug 26 13:09:09.378733: | libevent_malloc: new ptr-libevent@0x56552e8a91c8 size 128 Aug 26 13:09:09.378737: | libevent_malloc: new ptr-libevent@0x56552e8f6468 size 16 Aug 26 13:09:09.379010: | global one-shot timer EVENT_CHECK_CRLS initialized Aug 26 13:09:09.379018: selinux support is enabled. Aug 26 13:09:09.379373: | starting up helper thread 2 Aug 26 13:09:09.379388: | status value returned by setting the priority of this thread (crypto helper 2) 22 Aug 26 13:09:09.379391: | crypto helper 2 waiting (nothing to do) Aug 26 13:09:09.379808: | unbound context created - setting debug level to 5 Aug 26 13:09:09.379841: | /etc/hosts lookups activated Aug 26 13:09:09.379857: | /etc/resolv.conf usage activated Aug 26 13:09:09.379927: | outgoing-port-avoid set 0-65535 Aug 26 13:09:09.379963: | outgoing-port-permit set 32768-60999 Aug 26 13:09:09.379967: | Loading dnssec root key from:/var/lib/unbound/root.key Aug 26 13:09:09.379971: | No additional dnssec trust anchors defined via dnssec-trusted= option Aug 26 13:09:09.379974: | Setting up events, loop start Aug 26 13:09:09.379978: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x56552e8f6c38 Aug 26 13:09:09.379982: | libevent_malloc: new ptr-libevent@0x56552e9026a8 size 128 Aug 26 13:09:09.379986: | libevent_malloc: new ptr-libevent@0x56552e90d998 size 16 Aug 26 13:09:09.379995: | libevent_realloc: new ptr-libevent@0x56552e90d9d8 size 256 Aug 26 13:09:09.379998: | libevent_malloc: new ptr-libevent@0x56552e90db08 size 8 Aug 26 13:09:09.380002: | libevent_realloc: new ptr-libevent@0x56552e90db48 size 144 Aug 26 13:09:09.380005: | libevent_malloc: new ptr-libevent@0x56552e8b4cd8 size 152 Aug 26 13:09:09.380009: | libevent_malloc: new ptr-libevent@0x56552e90dc08 size 16 Aug 26 13:09:09.380014: | signal event handler PLUTO_SIGCHLD installed Aug 26 13:09:09.380017: | libevent_malloc: new ptr-libevent@0x56552e90dc48 size 8 Aug 26 13:09:09.380020: | libevent_malloc: new ptr-libevent@0x56552e82a048 size 152 Aug 26 13:09:09.380023: | signal event handler PLUTO_SIGTERM installed Aug 26 13:09:09.380027: | libevent_malloc: new ptr-libevent@0x56552e90dc88 size 8 Aug 26 13:09:09.380030: | libevent_malloc: new ptr-libevent@0x56552e82d518 size 152 Aug 26 13:09:09.380033: | signal event handler PLUTO_SIGHUP installed Aug 26 13:09:09.380036: | libevent_malloc: new ptr-libevent@0x56552e90dcc8 size 8 Aug 26 13:09:09.380039: | libevent_realloc: release ptr-libevent@0x56552e90db48 Aug 26 13:09:09.380042: | libevent_realloc: new ptr-libevent@0x56552e90dd08 size 256 Aug 26 13:09:09.380046: | libevent_malloc: new ptr-libevent@0x56552e90de38 size 152 Aug 26 13:09:09.380049: | signal event handler PLUTO_SIGSYS installed Aug 26 13:09:09.380429: | created addconn helper (pid:2640) using fork+execve Aug 26 13:09:09.380450: | forked child 2640 Aug 26 13:09:09.380494: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:09:09.380509: listening for IKE messages Aug 26 13:09:09.380604: | Inspecting interface lo Aug 26 13:09:09.380611: | found lo with address 127.0.0.1 Aug 26 13:09:09.380620: | Inspecting interface eth0 Aug 26 13:09:09.380625: | found eth0 with address 192.0.2.254 Aug 26 13:09:09.380631: | Inspecting interface eth1 Aug 26 13:09:09.380636: | found eth1 with address 192.1.2.23 Aug 26 13:09:09.380695: Kernel supports NIC esp-hw-offload Aug 26 13:09:09.380705: adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.23:500 Aug 26 13:09:09.380755: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 13:09:09.380761: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 13:09:09.380766: adding interface eth1/eth1 192.1.2.23:4500 Aug 26 13:09:09.380790: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.2.254:500 Aug 26 13:09:09.380809: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 13:09:09.380819: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 13:09:09.380824: adding interface eth0/eth0 192.0.2.254:4500 Aug 26 13:09:09.380847: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 Aug 26 13:09:09.380865: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 13:09:09.380869: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 13:09:09.380874: adding interface lo/lo 127.0.0.1:4500 Aug 26 13:09:09.380950: | no interfaces to sort Aug 26 13:09:09.380956: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 13:09:09.380966: | add_fd_read_event_handler: new ethX-pe@0x56552e90e418 Aug 26 13:09:09.380970: | libevent_malloc: new ptr-libevent@0x56552e9025f8 size 128 Aug 26 13:09:09.380974: | libevent_malloc: new ptr-libevent@0x56552e90e488 size 16 Aug 26 13:09:09.380981: | setup callback for interface lo 127.0.0.1:4500 fd 22 Aug 26 13:09:09.380985: | add_fd_read_event_handler: new ethX-pe@0x56552e90e4c8 Aug 26 13:09:09.380991: | libevent_malloc: new ptr-libevent@0x56552e8a9278 size 128 Aug 26 13:09:09.380995: | libevent_malloc: new ptr-libevent@0x56552e90e538 size 16 Aug 26 13:09:09.381001: | setup callback for interface lo 127.0.0.1:500 fd 21 Aug 26 13:09:09.381005: | add_fd_read_event_handler: new ethX-pe@0x56552e90e578 Aug 26 13:09:09.381011: | libevent_malloc: new ptr-libevent@0x56552e8a8b98 size 128 Aug 26 13:09:09.381014: | libevent_malloc: new ptr-libevent@0x56552e90e5e8 size 16 Aug 26 13:09:09.381020: | setup callback for interface eth0 192.0.2.254:4500 fd 20 Aug 26 13:09:09.381024: | add_fd_read_event_handler: new ethX-pe@0x56552e90e628 Aug 26 13:09:09.381030: | libevent_malloc: new ptr-libevent@0x56552e8b0458 size 128 Aug 26 13:09:09.381034: | libevent_malloc: new ptr-libevent@0x56552e90e698 size 16 Aug 26 13:09:09.381039: | setup callback for interface eth0 192.0.2.254:500 fd 19 Aug 26 13:09:09.381043: | add_fd_read_event_handler: new ethX-pe@0x56552e90e6d8 Aug 26 13:09:09.381046: | libevent_malloc: new ptr-libevent@0x56552e8b0558 size 128 Aug 26 13:09:09.381050: | libevent_malloc: new ptr-libevent@0x56552e90e748 size 16 Aug 26 13:09:09.381055: | setup callback for interface eth1 192.1.2.23:4500 fd 18 Aug 26 13:09:09.381059: | add_fd_read_event_handler: new ethX-pe@0x56552e90e788 Aug 26 13:09:09.381063: | libevent_malloc: new ptr-libevent@0x56552e8b0658 size 128 Aug 26 13:09:09.381066: | libevent_malloc: new ptr-libevent@0x56552e90e7f8 size 16 Aug 26 13:09:09.381072: | setup callback for interface eth1 192.1.2.23:500 fd 17 Aug 26 13:09:09.381078: | certs and keys locked by 'free_preshared_secrets' Aug 26 13:09:09.381081: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 13:09:09.381188: loading secrets from "/etc/ipsec.secrets" Aug 26 13:09:09.381214: | saving Modulus Aug 26 13:09:09.381218: | saving PublicExponent Aug 26 13:09:09.381224: | ignoring PrivateExponent Aug 26 13:09:09.381228: | ignoring Prime1 Aug 26 13:09:09.381232: | ignoring Prime2 Aug 26 13:09:09.381236: | ignoring Exponent1 Aug 26 13:09:09.381241: | ignoring Exponent2 Aug 26 13:09:09.381245: | ignoring Coefficient Aug 26 13:09:09.381250: | ignoring CKAIDNSS Aug 26 13:09:09.381294: | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 Aug 26 13:09:09.381302: | computed rsa CKAID 8a 82 25 f1 Aug 26 13:09:09.381306: loaded private key for keyid: PKK_RSA:AQO9bJbr3 Aug 26 13:09:09.381315: | certs and keys locked by 'process_secret' Aug 26 13:09:09.381322: | certs and keys unlocked by 'process_secret' Aug 26 13:09:09.381332: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:09:09.381338: | spent 0.851 milliseconds in whack Aug 26 13:09:09.381353: | status value returned by setting the priority of this thread (crypto helper 4) 22 Aug 26 13:09:09.381360: | crypto helper 4 waiting (nothing to do) Aug 26 13:09:09.407836: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:09:09.407866: listening for IKE messages Aug 26 13:09:09.407908: | Inspecting interface lo Aug 26 13:09:09.407918: | found lo with address 127.0.0.1 Aug 26 13:09:09.407921: | Inspecting interface eth0 Aug 26 13:09:09.407926: | found eth0 with address 192.0.2.254 Aug 26 13:09:09.407929: | Inspecting interface eth1 Aug 26 13:09:09.407934: | found eth1 with address 192.1.2.23 Aug 26 13:09:09.407993: | no interfaces to sort Aug 26 13:09:09.408004: | libevent_free: release ptr-libevent@0x56552e9025f8 Aug 26 13:09:09.408008: | free_event_entry: release EVENT_NULL-pe@0x56552e90e418 Aug 26 13:09:09.408012: | add_fd_read_event_handler: new ethX-pe@0x56552e90e418 Aug 26 13:09:09.408015: | libevent_malloc: new ptr-libevent@0x56552e9025f8 size 128 Aug 26 13:09:09.408023: | setup callback for interface lo 127.0.0.1:4500 fd 22 Aug 26 13:09:09.408027: | libevent_free: release ptr-libevent@0x56552e8a9278 Aug 26 13:09:09.408031: | free_event_entry: release EVENT_NULL-pe@0x56552e90e4c8 Aug 26 13:09:09.408034: | add_fd_read_event_handler: new ethX-pe@0x56552e90e4c8 Aug 26 13:09:09.408037: | libevent_malloc: new ptr-libevent@0x56552e8a9278 size 128 Aug 26 13:09:09.408043: | setup callback for interface lo 127.0.0.1:500 fd 21 Aug 26 13:09:09.408047: | libevent_free: release ptr-libevent@0x56552e8a8b98 Aug 26 13:09:09.408050: | free_event_entry: release EVENT_NULL-pe@0x56552e90e578 Aug 26 13:09:09.408053: | add_fd_read_event_handler: new ethX-pe@0x56552e90e578 Aug 26 13:09:09.408056: | libevent_malloc: new ptr-libevent@0x56552e8a8b98 size 128 Aug 26 13:09:09.408062: | setup callback for interface eth0 192.0.2.254:4500 fd 20 Aug 26 13:09:09.408066: | libevent_free: release ptr-libevent@0x56552e8b0458 Aug 26 13:09:09.408070: | free_event_entry: release EVENT_NULL-pe@0x56552e90e628 Aug 26 13:09:09.408072: | add_fd_read_event_handler: new ethX-pe@0x56552e90e628 Aug 26 13:09:09.408075: | libevent_malloc: new ptr-libevent@0x56552e8b0458 size 128 Aug 26 13:09:09.408080: | setup callback for interface eth0 192.0.2.254:500 fd 19 Aug 26 13:09:09.408085: | libevent_free: release ptr-libevent@0x56552e8b0558 Aug 26 13:09:09.408088: | free_event_entry: release EVENT_NULL-pe@0x56552e90e6d8 Aug 26 13:09:09.408091: | add_fd_read_event_handler: new ethX-pe@0x56552e90e6d8 Aug 26 13:09:09.408094: | libevent_malloc: new ptr-libevent@0x56552e8b0558 size 128 Aug 26 13:09:09.408099: | setup callback for interface eth1 192.1.2.23:4500 fd 18 Aug 26 13:09:09.408102: | libevent_free: release ptr-libevent@0x56552e8b0658 Aug 26 13:09:09.408105: | free_event_entry: release EVENT_NULL-pe@0x56552e90e788 Aug 26 13:09:09.408108: | add_fd_read_event_handler: new ethX-pe@0x56552e90e788 Aug 26 13:09:09.408111: | libevent_malloc: new ptr-libevent@0x56552e8b0658 size 128 Aug 26 13:09:09.408116: | setup callback for interface eth1 192.1.2.23:500 fd 17 Aug 26 13:09:09.408119: | certs and keys locked by 'free_preshared_secrets' Aug 26 13:09:09.408122: forgetting secrets Aug 26 13:09:09.408132: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 13:09:09.408148: loading secrets from "/etc/ipsec.secrets" Aug 26 13:09:09.408164: | saving Modulus Aug 26 13:09:09.408167: | saving PublicExponent Aug 26 13:09:09.408172: | ignoring PrivateExponent Aug 26 13:09:09.408175: | ignoring Prime1 Aug 26 13:09:09.408178: | ignoring Prime2 Aug 26 13:09:09.408181: | ignoring Exponent1 Aug 26 13:09:09.408185: | ignoring Exponent2 Aug 26 13:09:09.408188: | ignoring Coefficient Aug 26 13:09:09.408191: | ignoring CKAIDNSS Aug 26 13:09:09.408215: | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 Aug 26 13:09:09.408218: | computed rsa CKAID 8a 82 25 f1 Aug 26 13:09:09.408222: loaded private key for keyid: PKK_RSA:AQO9bJbr3 Aug 26 13:09:09.408229: | certs and keys locked by 'process_secret' Aug 26 13:09:09.408232: | certs and keys unlocked by 'process_secret' Aug 26 13:09:09.408242: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:09:09.408249: | spent 0.421 milliseconds in whack Aug 26 13:09:09.408829: | processing signal PLUTO_SIGCHLD Aug 26 13:09:09.408846: | waitpid returned pid 2640 (exited with status 0) Aug 26 13:09:09.408855: | reaped addconn helper child (status 0) Aug 26 13:09:09.408861: | waitpid returned ECHILD (no child processes left) Aug 26 13:09:09.408867: | spent 0.0241 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 13:09:09.473377: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:09:09.473402: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:09:09.473407: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 13:09:09.473410: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:09:09.473413: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 13:09:09.473417: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:09:09.473425: | Added new connection northnet-eastnet-ipv4 with policy ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 13:09:09.473429: | No AUTH policy was set - defaulting to RSASIG Aug 26 13:09:09.473492: | ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 Aug 26 13:09:09.473497: | from whack: got --esp= Aug 26 13:09:09.473534: | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 Aug 26 13:09:09.473553: | counting wild cards for @north is 0 Aug 26 13:09:09.473557: | counting wild cards for @east is 0 Aug 26 13:09:09.473567: | connect_to_host_pair: 192.1.2.23:500 192.1.3.33:500 -> hp@(nil): none Aug 26 13:09:09.473588: | new hp@0x56552e910f98 Aug 26 13:09:09.473592: added connection description "northnet-eastnet-ipv4" Aug 26 13:09:09.473605: | ike_life: 50s; ipsec_life: 180s; rekey_margin: 5s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 13:09:09.473616: | 192.0.2.0/24===192.1.2.23<192.1.2.23>[@east]...192.1.3.33<192.1.3.33>[@north]===192.0.3.0/24 Aug 26 13:09:09.473626: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:09:09.473634: | spent 0.267 milliseconds in whack Aug 26 13:09:09.473676: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:09:09.473687: add keyid @north Aug 26 13:09:09.473692: | add pubkey 01 03 e5 df 73 b6 3e d5 36 a8 f1 3d 0d d3 02 ab Aug 26 13:09:09.473695: | add pubkey 7f ec 4c 9e 8b 0e 0e d2 cf 0f 59 bf 6d 88 21 86 Aug 26 13:09:09.473698: | add pubkey 93 9e 10 34 af 2d cf b3 7e eb e5 b2 24 b2 a5 b0 Aug 26 13:09:09.473700: | add pubkey 01 03 7d b5 96 ad 66 ee 48 c2 28 d9 9a 76 36 a9 Aug 26 13:09:09.473703: | add pubkey 10 84 b5 09 8f 17 4f 65 ce d8 2f 8e 78 80 8a 87 Aug 26 13:09:09.473705: | add pubkey f4 6b 98 d9 91 94 6b 52 15 5b 9c 47 12 be d8 6f Aug 26 13:09:09.473708: | add pubkey 25 b4 65 38 7e e4 8d c7 f0 58 d3 9f 69 14 cc 3e Aug 26 13:09:09.473711: | add pubkey c8 16 1f af bb 5d 93 2b 33 39 0e 94 55 81 f4 b3 Aug 26 13:09:09.473713: | add pubkey cc 92 58 6e 4a 5a 4e c3 76 ab 04 2e 11 08 06 55 Aug 26 13:09:09.473716: | add pubkey 13 0f 02 6c dd d1 bc c0 b8 8d 65 f5 97 ed fc 18 Aug 26 13:09:09.473718: | add pubkey 39 f9 55 ab fa 0d c5 49 99 7f 1b cf c3 de 99 7d Aug 26 13:09:09.473721: | add pubkey 9e ca 6f 9e 14 d6 5a ff de d6 4f 57 6a 83 ab 51 Aug 26 13:09:09.473724: | add pubkey ba 64 74 e0 22 e9 9a c5 10 71 bb d4 eb a4 99 28 Aug 26 13:09:09.473727: | add pubkey 9c 85 0e 31 ea cc ab ef 98 84 3f 59 c1 75 aa b3 Aug 26 13:09:09.473729: | add pubkey 61 eb 61 8c 58 a5 92 25 84 ad c7 79 f3 87 d0 c7 Aug 26 13:09:09.473732: | add pubkey 83 c2 d6 8a fe 26 9d 2a ff b1 dd 9b 89 21 7c ca Aug 26 13:09:09.473740: | add pubkey f5 38 2d 3f 64 0c 41 9c 34 e9 b2 55 0f 82 1a b3 Aug 26 13:09:09.473744: | add pubkey c7 5e a5 99 Aug 26 13:09:09.473766: | computed rsa CKAID 90 5d fc a1 08 68 74 7c 6f 20 d3 1b 2d 20 4b 8f Aug 26 13:09:09.473770: | computed rsa CKAID 88 aa 7c 5d Aug 26 13:09:09.473782: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:09:09.473789: | spent 0.118 milliseconds in whack Aug 26 13:09:09.473824: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:09:09.473834: add keyid @east Aug 26 13:09:09.473838: | add pubkey 01 03 bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b Aug 26 13:09:09.473840: | add pubkey e5 16 c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 Aug 26 13:09:09.473843: | add pubkey 85 7a e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c Aug 26 13:09:09.473846: | add pubkey 78 ca 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 Aug 26 13:09:09.473848: | add pubkey 21 c9 f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d Aug 26 13:09:09.473851: | add pubkey d2 67 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 Aug 26 13:09:09.473853: | add pubkey 62 cd 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce Aug 26 13:09:09.473856: | add pubkey 62 b5 af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e Aug 26 13:09:09.473858: | add pubkey bb 23 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d Aug 26 13:09:09.473861: | add pubkey ac 47 f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce Aug 26 13:09:09.473863: | add pubkey e0 98 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a Aug 26 13:09:09.473866: | add pubkey 92 b8 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 Aug 26 13:09:09.473868: | add pubkey 4d 58 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 Aug 26 13:09:09.473871: | add pubkey 5f 56 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 Aug 26 13:09:09.473873: | add pubkey d5 f1 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c Aug 26 13:09:09.473876: | add pubkey 47 cc 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 Aug 26 13:09:09.473878: | add pubkey 07 8f 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 Aug 26 13:09:09.473880: | add pubkey 51 51 48 ef Aug 26 13:09:09.473890: | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 Aug 26 13:09:09.473893: | computed rsa CKAID 8a 82 25 f1 Aug 26 13:09:09.473904: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:09:09.473910: | spent 0.0903 milliseconds in whack Aug 26 13:09:09.539103: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:09:09.539353: | FOR_EACH_CONNECTION_... in show_connections_status Aug 26 13:09:09.539362: | FOR_EACH_CONNECTION_... in show_connections_status Aug 26 13:09:09.539428: | FOR_EACH_STATE_... in show_states_status (sort_states) Aug 26 13:09:09.539442: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:09:09.539449: | spent 0.329 milliseconds in whack Aug 26 13:09:11.511071: | spent 0.0028 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:09:11.511101: | *received 828 bytes from 192.1.3.33:500 on eth1 (192.1.2.23:500) Aug 26 13:09:11.511106: | 15 85 64 94 8f f5 2d 2f 00 00 00 00 00 00 00 00 Aug 26 13:09:11.511109: | 21 20 22 08 00 00 00 00 00 00 03 3c 22 00 01 b4 Aug 26 13:09:11.511111: | 02 00 00 64 01 01 00 0b 03 00 00 0c 01 00 00 14 Aug 26 13:09:11.511114: | 80 0e 01 00 03 00 00 08 02 00 00 07 03 00 00 08 Aug 26 13:09:11.511117: | 02 00 00 05 03 00 00 08 04 00 00 0e 03 00 00 08 Aug 26 13:09:11.511119: | 04 00 00 0f 03 00 00 08 04 00 00 10 03 00 00 08 Aug 26 13:09:11.511121: | 04 00 00 12 03 00 00 08 04 00 00 13 03 00 00 08 Aug 26 13:09:11.511124: | 04 00 00 14 03 00 00 08 04 00 00 15 00 00 00 08 Aug 26 13:09:11.511126: | 04 00 00 1f 02 00 00 64 02 01 00 0b 03 00 00 0c Aug 26 13:09:11.511129: | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 Aug 26 13:09:11.511131: | 03 00 00 08 02 00 00 05 03 00 00 08 04 00 00 0e Aug 26 13:09:11.511134: | 03 00 00 08 04 00 00 0f 03 00 00 08 04 00 00 10 Aug 26 13:09:11.511139: | 03 00 00 08 04 00 00 12 03 00 00 08 04 00 00 13 Aug 26 13:09:11.511142: | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 15 Aug 26 13:09:11.511145: | 00 00 00 08 04 00 00 1f 02 00 00 74 03 01 00 0d Aug 26 13:09:11.511147: | 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 Aug 26 13:09:11.511150: | 02 00 00 07 03 00 00 08 02 00 00 05 03 00 00 08 Aug 26 13:09:11.511152: | 03 00 00 0e 03 00 00 08 03 00 00 0c 03 00 00 08 Aug 26 13:09:11.511155: | 04 00 00 0e 03 00 00 08 04 00 00 0f 03 00 00 08 Aug 26 13:09:11.511157: | 04 00 00 10 03 00 00 08 04 00 00 12 03 00 00 08 Aug 26 13:09:11.511160: | 04 00 00 13 03 00 00 08 04 00 00 14 03 00 00 08 Aug 26 13:09:11.511163: | 04 00 00 15 00 00 00 08 04 00 00 1f 00 00 00 74 Aug 26 13:09:11.511165: | 04 01 00 0d 03 00 00 0c 01 00 00 0c 80 0e 00 80 Aug 26 13:09:11.511168: | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 05 Aug 26 13:09:11.511170: | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c Aug 26 13:09:11.511173: | 03 00 00 08 04 00 00 0e 03 00 00 08 04 00 00 0f Aug 26 13:09:11.511175: | 03 00 00 08 04 00 00 10 03 00 00 08 04 00 00 12 Aug 26 13:09:11.511178: | 03 00 00 08 04 00 00 13 03 00 00 08 04 00 00 14 Aug 26 13:09:11.511180: | 03 00 00 08 04 00 00 15 00 00 00 08 04 00 00 1f Aug 26 13:09:11.511183: | 28 00 01 08 00 0e 00 00 13 db b6 db ea 73 cd 6b Aug 26 13:09:11.511185: | 16 7f fb 2d 13 13 7f 56 a4 b1 d3 54 43 89 6c 04 Aug 26 13:09:11.511188: | 77 36 00 1f c4 9f 8a 27 e5 7d 47 dd ec 83 34 f5 Aug 26 13:09:11.511195: | fd 9c 89 8a c1 df ec e5 95 6a b1 09 39 e0 10 67 Aug 26 13:09:11.511197: | 28 fa 1c ad 4a 52 11 e1 2c 10 a4 3f 8c b5 c9 6a Aug 26 13:09:11.511200: | 02 c8 4d e7 67 d6 af 87 87 bb b6 b4 16 ac 31 c0 Aug 26 13:09:11.511202: | 62 73 33 77 1d 42 2d 5f 2f a8 e2 30 67 0c 71 56 Aug 26 13:09:11.511205: | 2f 2b a8 84 44 22 e5 80 06 b7 51 39 6d e7 5c ab Aug 26 13:09:11.511207: | 80 6d d7 6f 90 a7 13 73 f1 89 28 e9 e1 c1 0f 94 Aug 26 13:09:11.511210: | 7d 21 65 7d f9 3c 26 fa ce 10 05 e6 ff 35 ba 89 Aug 26 13:09:11.511212: | c1 24 13 2d d0 80 40 fe b4 5f c0 26 c3 cd 04 c7 Aug 26 13:09:11.511215: | b4 e1 c8 75 73 f9 14 55 d3 e4 79 13 db 6b 0c b8 Aug 26 13:09:11.511218: | 18 59 8d b1 4a 72 27 49 7f 23 91 27 c5 f4 77 3d Aug 26 13:09:11.511220: | 10 ba fd 9d 4c dd e5 0c 14 02 ad 69 fb af df 80 Aug 26 13:09:11.511223: | 8d c6 1e 22 ff 22 5e aa 38 f2 56 36 5c 84 fa 1e Aug 26 13:09:11.511225: | b5 56 c4 c5 30 aa d0 39 89 f3 71 d2 28 41 b3 97 Aug 26 13:09:11.511228: | fa 11 33 34 c8 d4 5a 7a 29 00 00 24 e7 52 4f 77 Aug 26 13:09:11.511230: | 4b 44 2f c6 93 eb e2 e3 09 3c ab 0c d8 9f 84 f1 Aug 26 13:09:11.511233: | 97 3f d9 6b a7 7a 38 87 40 59 cb f6 29 00 00 08 Aug 26 13:09:11.511235: | 00 00 40 2e 29 00 00 1c 00 00 40 04 87 d6 70 e5 Aug 26 13:09:11.511238: | f6 ae 03 31 4a be 6b 77 04 5a 92 03 88 17 52 50 Aug 26 13:09:11.511240: | 00 00 00 1c 00 00 40 05 52 39 b1 9b ec 85 eb e8 Aug 26 13:09:11.511243: | 9c a2 03 a5 68 97 e2 40 fa 3f b1 12 Aug 26 13:09:11.511250: | start processing: from 192.1.3.33:500 (in process_md() at demux.c:378) Aug 26 13:09:11.511254: | **parse ISAKMP Message: Aug 26 13:09:11.511257: | initiator cookie: Aug 26 13:09:11.511259: | 15 85 64 94 8f f5 2d 2f Aug 26 13:09:11.511262: | responder cookie: Aug 26 13:09:11.511264: | 00 00 00 00 00 00 00 00 Aug 26 13:09:11.511267: | next payload type: ISAKMP_NEXT_v2SA (0x21) Aug 26 13:09:11.511270: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:09:11.511273: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Aug 26 13:09:11.511276: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Aug 26 13:09:11.511279: | Message ID: 0 (0x0) Aug 26 13:09:11.511281: | length: 828 (0x33c) Aug 26 13:09:11.511285: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) Aug 26 13:09:11.511297: | I am the IKE SA Original Responder receiving an IKEv2 IKE_SA_INIT request Aug 26 13:09:11.511305: | State DB: IKEv2 state not found (find_v2_ike_sa_by_initiator_spi) Aug 26 13:09:11.511309: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Aug 26 13:09:11.511313: | ***parse IKEv2 Security Association Payload: Aug 26 13:09:11.511316: | next payload type: ISAKMP_NEXT_v2KE (0x22) Aug 26 13:09:11.511318: | flags: none (0x0) Aug 26 13:09:11.511321: | length: 436 (0x1b4) Aug 26 13:09:11.511324: | processing payload: ISAKMP_NEXT_v2SA (len=432) Aug 26 13:09:11.511327: | Now let's proceed with payload (ISAKMP_NEXT_v2KE) Aug 26 13:09:11.511330: | ***parse IKEv2 Key Exchange Payload: Aug 26 13:09:11.511332: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Aug 26 13:09:11.511335: | flags: none (0x0) Aug 26 13:09:11.511338: | length: 264 (0x108) Aug 26 13:09:11.511340: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:09:11.511343: | processing payload: ISAKMP_NEXT_v2KE (len=256) Aug 26 13:09:11.511345: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Aug 26 13:09:11.511348: | ***parse IKEv2 Nonce Payload: Aug 26 13:09:11.511351: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:09:11.511353: | flags: none (0x0) Aug 26 13:09:11.511356: | length: 36 (0x24) Aug 26 13:09:11.511359: | processing payload: ISAKMP_NEXT_v2Ni (len=32) Aug 26 13:09:11.511361: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 13:09:11.511364: | ***parse IKEv2 Notify Payload: Aug 26 13:09:11.511367: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:09:11.511369: | flags: none (0x0) Aug 26 13:09:11.511372: | length: 8 (0x8) Aug 26 13:09:11.511375: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:09:11.511377: | SPI size: 0 (0x0) Aug 26 13:09:11.511380: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Aug 26 13:09:11.511383: | processing payload: ISAKMP_NEXT_v2N (len=0) Aug 26 13:09:11.511385: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 13:09:11.511388: | ***parse IKEv2 Notify Payload: Aug 26 13:09:11.511391: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:09:11.511394: | flags: none (0x0) Aug 26 13:09:11.511396: | length: 28 (0x1c) Aug 26 13:09:11.511399: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:09:11.511401: | SPI size: 0 (0x0) Aug 26 13:09:11.511404: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Aug 26 13:09:11.511407: | processing payload: ISAKMP_NEXT_v2N (len=20) Aug 26 13:09:11.511409: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 13:09:11.511411: | ***parse IKEv2 Notify Payload: Aug 26 13:09:11.511414: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:09:11.511417: | flags: none (0x0) Aug 26 13:09:11.511419: | length: 28 (0x1c) Aug 26 13:09:11.511422: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:09:11.511424: | SPI size: 0 (0x0) Aug 26 13:09:11.511427: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Aug 26 13:09:11.511430: | processing payload: ISAKMP_NEXT_v2N (len=20) Aug 26 13:09:11.511433: | DDOS disabled and no cookie sent, continuing Aug 26 13:09:11.511439: | find_host_connection local=192.1.2.23:500 remote=192.1.3.33:500 policy=ECDSA+IKEV2_ALLOW but ignoring ports Aug 26 13:09:11.511445: | find_host_pair: comparing 192.1.2.23:500 to 192.1.3.33:500 but ignoring ports Aug 26 13:09:11.511448: | find_next_host_connection policy=ECDSA+IKEV2_ALLOW Aug 26 13:09:11.511452: | found policy = RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (northnet-eastnet-ipv4) Aug 26 13:09:11.511455: | find_next_host_connection returns empty Aug 26 13:09:11.511460: | find_host_connection local=192.1.2.23:500 remote= policy=ECDSA+IKEV2_ALLOW but ignoring ports Aug 26 13:09:11.511463: | find_next_host_connection policy=ECDSA+IKEV2_ALLOW Aug 26 13:09:11.511465: | find_next_host_connection returns empty Aug 26 13:09:11.511470: | initial parent SA message received on 192.1.2.23:500 but no connection has been authorized with policy ECDSA+IKEV2_ALLOW Aug 26 13:09:11.511475: | find_host_connection local=192.1.2.23:500 remote=192.1.3.33:500 policy=RSASIG+IKEV2_ALLOW but ignoring ports Aug 26 13:09:11.511482: | find_host_pair: comparing 192.1.2.23:500 to 192.1.3.33:500 but ignoring ports Aug 26 13:09:11.511484: | find_next_host_connection policy=RSASIG+IKEV2_ALLOW Aug 26 13:09:11.511488: | found policy = RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (northnet-eastnet-ipv4) Aug 26 13:09:11.511491: | find_next_host_connection returns northnet-eastnet-ipv4 Aug 26 13:09:11.511493: | find_next_host_connection policy=RSASIG+IKEV2_ALLOW Aug 26 13:09:11.511496: | find_next_host_connection returns empty Aug 26 13:09:11.511499: | found connection: northnet-eastnet-ipv4 with policy RSASIG+IKEV2_ALLOW Aug 26 13:09:11.511521: | creating state object #1 at 0x56552e913098 Aug 26 13:09:11.511525: | State DB: adding IKEv2 state #1 in UNDEFINED Aug 26 13:09:11.511534: | pstats #1 ikev2.ike started Aug 26 13:09:11.511537: | Message ID: init #1: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 Aug 26 13:09:11.511541: | parent state #1: UNDEFINED(ignore) => PARENT_R0(half-open IKE SA) Aug 26 13:09:11.511547: | Message ID: init_ike #1; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 Aug 26 13:09:11.511556: | start processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.3.33 (in ikev2_process_packet() at ikev2.c:2016) Aug 26 13:09:11.511560: | State DB: IKEv2 state not found (find_v2_sa_by_responder_wip) Aug 26 13:09:11.511564: | [RE]START processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.3.33 (in ike_process_packet() at ikev2.c:2064) Aug 26 13:09:11.511568: | #1 st.st_msgid_lastrecv -1 md.hdr.isa_msgid 00000000 Aug 26 13:09:11.511572: | Message ID: #1 not a duplicate - message is new; initiator.sent=-1 initiator.recv=-1 responder.sent=-1 responder.recv=-1 Aug 26 13:09:11.511577: | Message ID: start-responder #1 request 0; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1->0 Aug 26 13:09:11.511580: | #1 in state PARENT_R0: processing SA_INIT request Aug 26 13:09:11.511583: | selected state microcode Respond to IKE_SA_INIT Aug 26 13:09:11.511586: | Now let's proceed with state specific processing Aug 26 13:09:11.511588: | calling processor Respond to IKE_SA_INIT Aug 26 13:09:11.511595: | #1 updating local interface from 192.1.2.23:500 to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:09:11.511598: | constructing local IKE proposals for northnet-eastnet-ipv4 (IKE SA responder matching remote proposals) Aug 26 13:09:11.511607: | converting ike_info AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 13:09:11.511615: | ... ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:09:11.511620: | converting ike_info AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 13:09:11.511625: | ... ikev2_proposal: 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:09:11.511630: | converting ike_info AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 13:09:11.511636: | ... ikev2_proposal: 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:09:11.511640: | converting ike_info AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 13:09:11.511646: | ... ikev2_proposal: 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:09:11.511660: "northnet-eastnet-ipv4": constructed local IKE proposals for northnet-eastnet-ipv4 (IKE SA responder matching remote proposals): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:09:11.511665: | Comparing remote proposals against IKE responder 4 local proposals Aug 26 13:09:11.511673: | local proposal 1 type ENCR has 1 transforms Aug 26 13:09:11.511676: | local proposal 1 type PRF has 2 transforms Aug 26 13:09:11.511678: | local proposal 1 type INTEG has 1 transforms Aug 26 13:09:11.511681: | local proposal 1 type DH has 8 transforms Aug 26 13:09:11.511684: | local proposal 1 type ESN has 0 transforms Aug 26 13:09:11.511688: | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG Aug 26 13:09:11.511690: | local proposal 2 type ENCR has 1 transforms Aug 26 13:09:11.511693: | local proposal 2 type PRF has 2 transforms Aug 26 13:09:11.511696: | local proposal 2 type INTEG has 1 transforms Aug 26 13:09:11.511699: | local proposal 2 type DH has 8 transforms Aug 26 13:09:11.511701: | local proposal 2 type ESN has 0 transforms Aug 26 13:09:11.511705: | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG Aug 26 13:09:11.511707: | local proposal 3 type ENCR has 1 transforms Aug 26 13:09:11.511710: | local proposal 3 type PRF has 2 transforms Aug 26 13:09:11.511713: | local proposal 3 type INTEG has 2 transforms Aug 26 13:09:11.511715: | local proposal 3 type DH has 8 transforms Aug 26 13:09:11.511718: | local proposal 3 type ESN has 0 transforms Aug 26 13:09:11.511721: | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none Aug 26 13:09:11.511724: | local proposal 4 type ENCR has 1 transforms Aug 26 13:09:11.511726: | local proposal 4 type PRF has 2 transforms Aug 26 13:09:11.511729: | local proposal 4 type INTEG has 2 transforms Aug 26 13:09:11.511731: | local proposal 4 type DH has 8 transforms Aug 26 13:09:11.511734: | local proposal 4 type ESN has 0 transforms Aug 26 13:09:11.511737: | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none Aug 26 13:09:11.511740: | ****parse IKEv2 Proposal Substructure Payload: Aug 26 13:09:11.511743: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:09:11.511746: | length: 100 (0x64) Aug 26 13:09:11.511749: | prop #: 1 (0x1) Aug 26 13:09:11.511752: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:09:11.511754: | spi size: 0 (0x0) Aug 26 13:09:11.511757: | # transforms: 11 (0xb) Aug 26 13:09:11.511761: | Comparing remote proposal 1 containing 11 transforms against local proposal [1..4] of 4 local proposals Aug 26 13:09:11.511764: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.511767: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.511770: | length: 12 (0xc) Aug 26 13:09:11.511772: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:09:11.511775: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 13:09:11.511778: | ******parse IKEv2 Attribute Substructure Payload: Aug 26 13:09:11.511781: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:09:11.511784: | length/value: 256 (0x100) Aug 26 13:09:11.511788: | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 Aug 26 13:09:11.511791: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.511794: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.511797: | length: 8 (0x8) Aug 26 13:09:11.511799: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:09:11.511804: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:09:11.511808: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 Aug 26 13:09:11.511812: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 2 type 2 (PRF) transform 0 Aug 26 13:09:11.511815: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 3 type 2 (PRF) transform 0 Aug 26 13:09:11.511819: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 4 type 2 (PRF) transform 0 Aug 26 13:09:11.511821: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.511824: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.511827: | length: 8 (0x8) Aug 26 13:09:11.511829: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:09:11.511832: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 13:09:11.511835: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.511838: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.511840: | length: 8 (0x8) Aug 26 13:09:11.511843: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.511846: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:09:11.511849: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Aug 26 13:09:11.511853: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 2 type 4 (DH) transform 0 Aug 26 13:09:11.511856: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 3 type 4 (DH) transform 0 Aug 26 13:09:11.511860: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 4 type 4 (DH) transform 0 Aug 26 13:09:11.511862: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.511865: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.511868: | length: 8 (0x8) Aug 26 13:09:11.511870: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.511873: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 13:09:11.511876: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.511878: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.511881: | length: 8 (0x8) Aug 26 13:09:11.511884: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.511886: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 13:09:11.511889: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.511892: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.511894: | length: 8 (0x8) Aug 26 13:09:11.511897: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.511900: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 13:09:11.511903: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.511905: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.511908: | length: 8 (0x8) Aug 26 13:09:11.511911: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.511913: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 13:09:11.511916: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.511919: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.511921: | length: 8 (0x8) Aug 26 13:09:11.511924: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.511927: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 13:09:11.511930: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.511932: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.511935: | length: 8 (0x8) Aug 26 13:09:11.511938: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.511940: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 13:09:11.511943: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.511946: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:09:11.511948: | length: 8 (0x8) Aug 26 13:09:11.511951: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.511957: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 13:09:11.511962: | remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none Aug 26 13:09:11.511967: | comparing remote proposal 1 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH Aug 26 13:09:11.511969: | remote proposal 1 matches local proposal 1 Aug 26 13:09:11.511973: | ****parse IKEv2 Proposal Substructure Payload: Aug 26 13:09:11.511975: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:09:11.511978: | length: 100 (0x64) Aug 26 13:09:11.511981: | prop #: 2 (0x2) Aug 26 13:09:11.511983: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:09:11.511986: | spi size: 0 (0x0) Aug 26 13:09:11.511989: | # transforms: 11 (0xb) Aug 26 13:09:11.511992: | Comparing remote proposal 2 containing 11 transforms against local proposal [1..0] of 4 local proposals Aug 26 13:09:11.511995: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.511998: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512000: | length: 12 (0xc) Aug 26 13:09:11.512003: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:09:11.512006: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 13:09:11.512009: | ******parse IKEv2 Attribute Substructure Payload: Aug 26 13:09:11.512011: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:09:11.512014: | length/value: 128 (0x80) Aug 26 13:09:11.512017: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512020: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512022: | length: 8 (0x8) Aug 26 13:09:11.512025: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:09:11.512028: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:09:11.512031: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512034: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512036: | length: 8 (0x8) Aug 26 13:09:11.512039: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:09:11.512041: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 13:09:11.512044: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512047: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512049: | length: 8 (0x8) Aug 26 13:09:11.512052: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512055: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:09:11.512057: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512060: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512063: | length: 8 (0x8) Aug 26 13:09:11.512065: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512068: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 13:09:11.512071: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512074: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512076: | length: 8 (0x8) Aug 26 13:09:11.512079: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512082: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 13:09:11.512084: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512087: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512090: | length: 8 (0x8) Aug 26 13:09:11.512092: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512095: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 13:09:11.512098: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512100: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512103: | length: 8 (0x8) Aug 26 13:09:11.512106: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512108: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 13:09:11.512111: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512114: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512116: | length: 8 (0x8) Aug 26 13:09:11.512119: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512123: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 13:09:11.512126: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512129: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512131: | length: 8 (0x8) Aug 26 13:09:11.512134: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512137: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 13:09:11.512140: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512142: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:09:11.512145: | length: 8 (0x8) Aug 26 13:09:11.512147: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512150: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 13:09:11.512154: | remote proposal 2 proposed transforms: ENCR+PRF+DH; matched: none; unmatched: ENCR+PRF+DH Aug 26 13:09:11.512158: | remote proposal 2 does not match; unmatched remote transforms: ENCR+PRF+DH Aug 26 13:09:11.512160: | ****parse IKEv2 Proposal Substructure Payload: Aug 26 13:09:11.512163: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:09:11.512166: | length: 116 (0x74) Aug 26 13:09:11.512168: | prop #: 3 (0x3) Aug 26 13:09:11.512171: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:09:11.512173: | spi size: 0 (0x0) Aug 26 13:09:11.512176: | # transforms: 13 (0xd) Aug 26 13:09:11.512179: | Comparing remote proposal 3 containing 13 transforms against local proposal [1..0] of 4 local proposals Aug 26 13:09:11.512182: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512185: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512187: | length: 12 (0xc) Aug 26 13:09:11.512190: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:09:11.512193: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 13:09:11.512195: | ******parse IKEv2 Attribute Substructure Payload: Aug 26 13:09:11.512198: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:09:11.512201: | length/value: 256 (0x100) Aug 26 13:09:11.512204: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512207: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512209: | length: 8 (0x8) Aug 26 13:09:11.512212: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:09:11.512215: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:09:11.512218: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512220: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512223: | length: 8 (0x8) Aug 26 13:09:11.512225: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:09:11.512228: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 13:09:11.512231: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512234: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512236: | length: 8 (0x8) Aug 26 13:09:11.512239: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:09:11.512241: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 13:09:11.512244: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512247: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512250: | length: 8 (0x8) Aug 26 13:09:11.512252: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:09:11.512255: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 13:09:11.512258: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512261: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512263: | length: 8 (0x8) Aug 26 13:09:11.512266: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512268: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:09:11.512271: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512274: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512277: | length: 8 (0x8) Aug 26 13:09:11.512279: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512282: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 13:09:11.512286: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512303: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512306: | length: 8 (0x8) Aug 26 13:09:11.512309: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512312: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 13:09:11.512315: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512318: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512320: | length: 8 (0x8) Aug 26 13:09:11.512323: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512326: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 13:09:11.512329: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512332: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512334: | length: 8 (0x8) Aug 26 13:09:11.512337: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512339: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 13:09:11.512342: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512345: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512347: | length: 8 (0x8) Aug 26 13:09:11.512350: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512353: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 13:09:11.512356: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512359: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512361: | length: 8 (0x8) Aug 26 13:09:11.512364: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512366: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 13:09:11.512369: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512372: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:09:11.512375: | length: 8 (0x8) Aug 26 13:09:11.512377: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512380: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 13:09:11.512385: | remote proposal 3 proposed transforms: ENCR+PRF+INTEG+DH; matched: none; unmatched: ENCR+PRF+INTEG+DH Aug 26 13:09:11.512388: | remote proposal 3 does not match; unmatched remote transforms: ENCR+PRF+INTEG+DH Aug 26 13:09:11.512391: | ****parse IKEv2 Proposal Substructure Payload: Aug 26 13:09:11.512393: | last proposal: v2_PROPOSAL_LAST (0x0) Aug 26 13:09:11.512396: | length: 116 (0x74) Aug 26 13:09:11.512399: | prop #: 4 (0x4) Aug 26 13:09:11.512401: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:09:11.512404: | spi size: 0 (0x0) Aug 26 13:09:11.512406: | # transforms: 13 (0xd) Aug 26 13:09:11.512410: | Comparing remote proposal 4 containing 13 transforms against local proposal [1..0] of 4 local proposals Aug 26 13:09:11.512413: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512415: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512418: | length: 12 (0xc) Aug 26 13:09:11.512420: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:09:11.512423: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 13:09:11.512426: | ******parse IKEv2 Attribute Substructure Payload: Aug 26 13:09:11.512429: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:09:11.512431: | length/value: 128 (0x80) Aug 26 13:09:11.512435: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512438: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512440: | length: 8 (0x8) Aug 26 13:09:11.512443: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:09:11.512445: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:09:11.512448: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512451: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512454: | length: 8 (0x8) Aug 26 13:09:11.512456: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:09:11.512459: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 13:09:11.512462: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512466: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512469: | length: 8 (0x8) Aug 26 13:09:11.512472: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:09:11.512474: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 13:09:11.512477: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512480: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512483: | length: 8 (0x8) Aug 26 13:09:11.512485: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:09:11.512488: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 13:09:11.512491: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512493: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512496: | length: 8 (0x8) Aug 26 13:09:11.512498: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512501: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:09:11.512504: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512507: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512509: | length: 8 (0x8) Aug 26 13:09:11.512512: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512515: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 13:09:11.512518: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512520: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512523: | length: 8 (0x8) Aug 26 13:09:11.512525: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512528: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 13:09:11.512531: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512534: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512536: | length: 8 (0x8) Aug 26 13:09:11.512539: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512542: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 13:09:11.512544: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512547: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512549: | length: 8 (0x8) Aug 26 13:09:11.512552: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512555: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 13:09:11.512558: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512560: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512563: | length: 8 (0x8) Aug 26 13:09:11.512566: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512568: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 13:09:11.512571: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512574: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.512577: | length: 8 (0x8) Aug 26 13:09:11.512579: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512582: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 13:09:11.512585: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:09:11.512587: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:09:11.512590: | length: 8 (0x8) Aug 26 13:09:11.512592: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.512595: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 13:09:11.512599: | remote proposal 4 proposed transforms: ENCR+PRF+INTEG+DH; matched: none; unmatched: ENCR+PRF+INTEG+DH Aug 26 13:09:11.512603: | remote proposal 4 does not match; unmatched remote transforms: ENCR+PRF+INTEG+DH Aug 26 13:09:11.512608: "northnet-eastnet-ipv4" #1: proposal 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048 chosen from remote proposals 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;PRF=HMAC_SHA2_256;DH=MODP2048;DH=MODP3072;DH=MODP4096;DH=MODP8192;DH=ECP_256;DH=ECP_384;DH=ECP_521;DH=CURVE25519[first-match] 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512;PRF=HMAC_SHA2_256;DH=MODP2048;DH=MODP3072;DH=MODP4096;DH=MODP8192;DH=ECP_256;DH=ECP_384;DH=ECP_521;DH=CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512;PRF=HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256;INTEG=HMAC_SHA2_256_128;DH=MODP2048;DH=MODP3072;DH=MODP4096;DH=MODP8192;DH=ECP_256;DH=ECP_384;DH=ECP_521;DH=CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512;PRF=HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256;INTEG=HMAC_SHA2_256_128;DH=MODP2048;DH=MODP3072;DH=MODP4096;DH=MODP8192;DH=ECP_256;DH=ECP_384;DH=ECP_521;DH=CURVE25519 Aug 26 13:09:11.512615: | accepted IKE proposal ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048 Aug 26 13:09:11.512618: | converting proposal to internal trans attrs Aug 26 13:09:11.512622: | natd_hash: rcookie is zero Aug 26 13:09:11.512636: | natd_hash: hasher=0x56552cd4e800(20) Aug 26 13:09:11.512639: | natd_hash: icookie= 15 85 64 94 8f f5 2d 2f Aug 26 13:09:11.512642: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Aug 26 13:09:11.512645: | natd_hash: ip= c0 01 02 17 Aug 26 13:09:11.512647: | natd_hash: port=500 Aug 26 13:09:11.512650: | natd_hash: hash= 52 39 b1 9b ec 85 eb e8 9c a2 03 a5 68 97 e2 40 Aug 26 13:09:11.512652: | natd_hash: hash= fa 3f b1 12 Aug 26 13:09:11.512655: | natd_hash: rcookie is zero Aug 26 13:09:11.512662: | natd_hash: hasher=0x56552cd4e800(20) Aug 26 13:09:11.512665: | natd_hash: icookie= 15 85 64 94 8f f5 2d 2f Aug 26 13:09:11.512668: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Aug 26 13:09:11.512670: | natd_hash: ip= c0 01 03 21 Aug 26 13:09:11.512672: | natd_hash: port=500 Aug 26 13:09:11.512675: | natd_hash: hash= 87 d6 70 e5 f6 ae 03 31 4a be 6b 77 04 5a 92 03 Aug 26 13:09:11.512677: | natd_hash: hash= 88 17 52 50 Aug 26 13:09:11.512680: | NAT_TRAVERSAL encaps using auto-detect Aug 26 13:09:11.512683: | NAT_TRAVERSAL this end is NOT behind NAT Aug 26 13:09:11.512685: | NAT_TRAVERSAL that end is NOT behind NAT Aug 26 13:09:11.512688: | NAT_TRAVERSAL nat-keepalive enabled 192.1.3.33 Aug 26 13:09:11.512692: | adding ikev2_inI1outR1 KE work-order 1 for state #1 Aug 26 13:09:11.512696: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x56552e911078 Aug 26 13:09:11.512700: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Aug 26 13:09:11.512704: | libevent_malloc: new ptr-libevent@0x56552e9113f8 size 128 Aug 26 13:09:11.512724: | crypto helper 1 resuming Aug 26 13:09:11.512729: | crypto helper 1 starting work-order 1 for state #1 Aug 26 13:09:11.512733: | crypto helper 1 doing build KE and nonce (ikev2_inI1outR1 KE); request ID 1 Aug 26 13:09:11.513311: | #1 spent 1.11 milliseconds in processing: Respond to IKE_SA_INIT in ikev2_process_state_packet() Aug 26 13:09:11.513327: | [RE]START processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.3.33:500 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 13:09:11.513332: | #1 complete_v2_state_transition() PARENT_R0->PARENT_R1 with status STF_SUSPEND Aug 26 13:09:11.513335: | suspending state #1 and saving MD Aug 26 13:09:11.513338: | #1 is busy; has a suspended MD Aug 26 13:09:11.513343: | [RE]START processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.3.33:500 (in log_stf_suspend() at ikev2.c:3269) Aug 26 13:09:11.513346: | "northnet-eastnet-ipv4" #1 complete v2 state STATE_PARENT_R0 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451 Aug 26 13:09:11.513352: | stop processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.3.33:500 (in ikev2_process_packet() at ikev2.c:2018) Aug 26 13:09:11.513356: | #1 spent 1.66 milliseconds in ikev2_process_packet() Aug 26 13:09:11.513361: | stop processing: from 192.1.3.33:500 (in process_md() at demux.c:380) Aug 26 13:09:11.513364: | processing: STOP state #0 (in process_md() at demux.c:382) Aug 26 13:09:11.513367: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:09:11.513371: | spent 1.67 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:09:11.513603: | crypto helper 1 finished build KE and nonce (ikev2_inI1outR1 KE); request ID 1 time elapsed 0.00087 seconds Aug 26 13:09:11.513611: | (#1) spent 0.862 milliseconds in crypto helper computing work-order 1: ikev2_inI1outR1 KE (pcr) Aug 26 13:09:11.513615: | crypto helper 1 sending results from work-order 1 for state #1 to event queue Aug 26 13:09:11.513617: | scheduling resume sending helper answer for #1 Aug 26 13:09:11.513620: | libevent_malloc: new ptr-libevent@0x7f9e40002888 size 128 Aug 26 13:09:11.513626: | crypto helper 1 waiting (nothing to do) Aug 26 13:09:11.513634: | processing resume sending helper answer for #1 Aug 26 13:09:11.513641: | start processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.3.33:500 (in resume_handler() at server.c:797) Aug 26 13:09:11.513644: | crypto helper 1 replies to request ID 1 Aug 26 13:09:11.513645: | calling continuation function 0x56552cc79b50 Aug 26 13:09:11.513648: | ikev2_parent_inI1outR1_continue for #1: calculated ke+nonce, sending R1 Aug 26 13:09:11.513676: | **emit ISAKMP Message: Aug 26 13:09:11.513679: | initiator cookie: Aug 26 13:09:11.513680: | 15 85 64 94 8f f5 2d 2f Aug 26 13:09:11.513682: | responder cookie: Aug 26 13:09:11.513684: | 1c 7b f0 c4 c6 59 09 e5 Aug 26 13:09:11.513686: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:09:11.513687: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:09:11.513690: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Aug 26 13:09:11.513692: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Aug 26 13:09:11.513693: | Message ID: 0 (0x0) Aug 26 13:09:11.513695: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:09:11.513697: | Emitting ikev2_proposal ... Aug 26 13:09:11.513699: | ***emit IKEv2 Security Association Payload: Aug 26 13:09:11.513701: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:09:11.513702: | flags: none (0x0) Aug 26 13:09:11.513705: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Aug 26 13:09:11.513707: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:09:11.513709: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 13:09:11.513711: | last proposal: v2_PROPOSAL_LAST (0x0) Aug 26 13:09:11.513712: | prop #: 1 (0x1) Aug 26 13:09:11.513714: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:09:11.513715: | spi size: 0 (0x0) Aug 26 13:09:11.513717: | # transforms: 3 (0x3) Aug 26 13:09:11.513720: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:09:11.513722: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:09:11.513725: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.513727: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:09:11.513730: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 13:09:11.513734: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:09:11.513737: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 13:09:11.513740: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:09:11.513743: | length/value: 256 (0x100) Aug 26 13:09:11.513746: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:09:11.513749: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:09:11.513752: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.513755: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:09:11.513758: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:09:11.513761: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.513764: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:09:11.513768: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:09:11.513770: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:09:11.513773: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:09:11.513779: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:09:11.513781: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:09:11.513783: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:09:11.513785: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:09:11.513787: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:09:11.513789: | emitting length of IKEv2 Proposal Substructure Payload: 36 Aug 26 13:09:11.513791: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:09:11.513792: | emitting length of IKEv2 Security Association Payload: 40 Aug 26 13:09:11.513794: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Aug 26 13:09:11.513797: | ***emit IKEv2 Key Exchange Payload: Aug 26 13:09:11.513798: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:09:11.513800: | flags: none (0x0) Aug 26 13:09:11.513802: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:09:11.513804: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) Aug 26 13:09:11.513806: | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' Aug 26 13:09:11.513808: | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload Aug 26 13:09:11.513810: | ikev2 g^x f6 a4 b9 ce ae 22 b9 6b 8a 97 f7 ab 28 c0 62 13 Aug 26 13:09:11.513812: | ikev2 g^x 71 0e eb 8d db 39 12 5a b7 81 5c 11 3e d7 18 bd Aug 26 13:09:11.513813: | ikev2 g^x 88 7b 68 a9 25 b7 2f df 19 1c 15 b8 75 77 fd ad Aug 26 13:09:11.513815: | ikev2 g^x e4 bf 2e 31 b7 48 41 b6 c0 02 d5 5e 08 fb 52 d6 Aug 26 13:09:11.513816: | ikev2 g^x 07 30 f7 1b d8 0f 8b 88 5a f7 af fd e1 ad 00 1e Aug 26 13:09:11.513818: | ikev2 g^x 02 8d 43 97 9d 3b 32 72 92 cd b8 65 f8 79 c3 92 Aug 26 13:09:11.513819: | ikev2 g^x b0 18 be d7 50 b5 a0 ed ed 40 c6 b8 39 71 5e 68 Aug 26 13:09:11.513821: | ikev2 g^x 85 f0 af 80 8c ac fc 9f cb 2e 1a a9 cc 4f 9d 68 Aug 26 13:09:11.513823: | ikev2 g^x 76 40 6b ee 40 74 b4 17 95 51 c0 57 24 3f 22 d8 Aug 26 13:09:11.513824: | ikev2 g^x e8 45 e9 46 02 72 db 05 29 3e a1 e1 a8 d5 00 55 Aug 26 13:09:11.513826: | ikev2 g^x 2e f0 b2 36 77 06 51 7b ea e6 b8 34 4a a6 0d f5 Aug 26 13:09:11.513827: | ikev2 g^x 3b 49 01 5e f6 25 62 9c 04 38 25 ac 04 1b a4 f9 Aug 26 13:09:11.513829: | ikev2 g^x cd 7d 2e 06 f5 12 3e d1 6f 8e 4c 9b ac 16 74 a6 Aug 26 13:09:11.513830: | ikev2 g^x e4 28 6f a0 87 43 43 7f ab ef 8c f6 55 9f c2 4c Aug 26 13:09:11.513832: | ikev2 g^x 68 4d ff 4d 3c ec 0a 99 87 c5 ec d4 a4 09 22 38 Aug 26 13:09:11.513833: | ikev2 g^x 30 7a a0 17 8e c8 c1 d5 3f c0 7c 2e 7e 45 58 42 Aug 26 13:09:11.513835: | emitting length of IKEv2 Key Exchange Payload: 264 Aug 26 13:09:11.513837: | ***emit IKEv2 Nonce Payload: Aug 26 13:09:11.513839: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:09:11.513840: | flags: none (0x0) Aug 26 13:09:11.513842: | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N Aug 26 13:09:11.513844: | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) Aug 26 13:09:11.513846: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' Aug 26 13:09:11.513848: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Aug 26 13:09:11.513849: | IKEv2 nonce 65 2e f3 04 ce 26 01 5a 7d fd 01 f7 f8 95 16 a9 Aug 26 13:09:11.513851: | IKEv2 nonce a4 53 76 12 86 99 c0 7f ce 91 ab 8e cb 97 96 83 Aug 26 13:09:11.513853: | emitting length of IKEv2 Nonce Payload: 36 Aug 26 13:09:11.513857: | Adding a v2N Payload Aug 26 13:09:11.513858: | ***emit IKEv2 Notify Payload: Aug 26 13:09:11.513860: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:09:11.513862: | flags: none (0x0) Aug 26 13:09:11.513863: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:09:11.513865: | SPI size: 0 (0x0) Aug 26 13:09:11.513867: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Aug 26 13:09:11.513869: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 13:09:11.513871: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 13:09:11.513872: | emitting length of IKEv2 Notify Payload: 8 Aug 26 13:09:11.513875: | NAT-Traversal support [enabled] add v2N payloads. Aug 26 13:09:11.513883: | natd_hash: hasher=0x56552cd4e800(20) Aug 26 13:09:11.513885: | natd_hash: icookie= 15 85 64 94 8f f5 2d 2f Aug 26 13:09:11.513886: | natd_hash: rcookie= 1c 7b f0 c4 c6 59 09 e5 Aug 26 13:09:11.513888: | natd_hash: ip= c0 01 02 17 Aug 26 13:09:11.513889: | natd_hash: port=500 Aug 26 13:09:11.513891: | natd_hash: hash= 2c 79 98 25 a3 95 2c a7 07 80 41 cc f3 5b 61 15 Aug 26 13:09:11.513893: | natd_hash: hash= 54 19 1a 29 Aug 26 13:09:11.513894: | Adding a v2N Payload Aug 26 13:09:11.513896: | ***emit IKEv2 Notify Payload: Aug 26 13:09:11.513897: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:09:11.513899: | flags: none (0x0) Aug 26 13:09:11.513900: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:09:11.513902: | SPI size: 0 (0x0) Aug 26 13:09:11.513904: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Aug 26 13:09:11.513906: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 13:09:11.513907: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 13:09:11.513909: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Aug 26 13:09:11.513911: | Notify data 2c 79 98 25 a3 95 2c a7 07 80 41 cc f3 5b 61 15 Aug 26 13:09:11.513912: | Notify data 54 19 1a 29 Aug 26 13:09:11.513914: | emitting length of IKEv2 Notify Payload: 28 Aug 26 13:09:11.513918: | natd_hash: hasher=0x56552cd4e800(20) Aug 26 13:09:11.513920: | natd_hash: icookie= 15 85 64 94 8f f5 2d 2f Aug 26 13:09:11.513921: | natd_hash: rcookie= 1c 7b f0 c4 c6 59 09 e5 Aug 26 13:09:11.513923: | natd_hash: ip= c0 01 03 21 Aug 26 13:09:11.513924: | natd_hash: port=500 Aug 26 13:09:11.513926: | natd_hash: hash= 13 75 59 8a 08 e4 b9 3b 8a 86 24 63 67 bd 12 f2 Aug 26 13:09:11.513927: | natd_hash: hash= 25 d0 bb 97 Aug 26 13:09:11.513929: | Adding a v2N Payload Aug 26 13:09:11.513930: | ***emit IKEv2 Notify Payload: Aug 26 13:09:11.513932: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:09:11.513933: | flags: none (0x0) Aug 26 13:09:11.513935: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:09:11.513937: | SPI size: 0 (0x0) Aug 26 13:09:11.513938: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Aug 26 13:09:11.513940: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 13:09:11.513942: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 13:09:11.513944: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Aug 26 13:09:11.513945: | Notify data 13 75 59 8a 08 e4 b9 3b 8a 86 24 63 67 bd 12 f2 Aug 26 13:09:11.513947: | Notify data 25 d0 bb 97 Aug 26 13:09:11.513948: | emitting length of IKEv2 Notify Payload: 28 Aug 26 13:09:11.513950: | emitting length of ISAKMP Message: 432 Aug 26 13:09:11.513955: | [RE]START processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.3.33:500 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 13:09:11.513957: | #1 complete_v2_state_transition() PARENT_R0->PARENT_R1 with status STF_OK Aug 26 13:09:11.513960: | IKEv2: transition from state STATE_PARENT_R0 to state STATE_PARENT_R1 Aug 26 13:09:11.513963: | parent state #1: PARENT_R0(half-open IKE SA) => PARENT_R1(half-open IKE SA) Aug 26 13:09:11.513965: | Message ID: updating counters for #1 to 0 after switching state Aug 26 13:09:11.513968: | Message ID: recv #1 request 0; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=-1 responder.recv=-1->0 wip.initiator=-1 wip.responder=0->-1 Aug 26 13:09:11.513971: | Message ID: sent #1 response 0; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=-1->0 responder.recv=0 wip.initiator=-1 wip.responder=-1 Aug 26 13:09:11.513974: "northnet-eastnet-ipv4" #1: STATE_PARENT_R1: received v2I1, sent v2R1 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} Aug 26 13:09:11.513978: | sending V2 new request packet to 192.1.3.33:500 (from 192.1.2.23:500) Aug 26 13:09:11.513981: | sending 432 bytes for STATE_PARENT_R0 through eth1 from 192.1.2.23:500 to 192.1.3.33:500 (using #1) Aug 26 13:09:11.513986: | 15 85 64 94 8f f5 2d 2f 1c 7b f0 c4 c6 59 09 e5 Aug 26 13:09:11.513987: | 21 20 22 20 00 00 00 00 00 00 01 b0 22 00 00 28 Aug 26 13:09:11.513989: | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14 Aug 26 13:09:11.513990: | 80 0e 01 00 03 00 00 08 02 00 00 07 00 00 00 08 Aug 26 13:09:11.513992: | 04 00 00 0e 28 00 01 08 00 0e 00 00 f6 a4 b9 ce Aug 26 13:09:11.513993: | ae 22 b9 6b 8a 97 f7 ab 28 c0 62 13 71 0e eb 8d Aug 26 13:09:11.513995: | db 39 12 5a b7 81 5c 11 3e d7 18 bd 88 7b 68 a9 Aug 26 13:09:11.513997: | 25 b7 2f df 19 1c 15 b8 75 77 fd ad e4 bf 2e 31 Aug 26 13:09:11.513998: | b7 48 41 b6 c0 02 d5 5e 08 fb 52 d6 07 30 f7 1b Aug 26 13:09:11.514000: | d8 0f 8b 88 5a f7 af fd e1 ad 00 1e 02 8d 43 97 Aug 26 13:09:11.514001: | 9d 3b 32 72 92 cd b8 65 f8 79 c3 92 b0 18 be d7 Aug 26 13:09:11.514003: | 50 b5 a0 ed ed 40 c6 b8 39 71 5e 68 85 f0 af 80 Aug 26 13:09:11.514004: | 8c ac fc 9f cb 2e 1a a9 cc 4f 9d 68 76 40 6b ee Aug 26 13:09:11.514006: | 40 74 b4 17 95 51 c0 57 24 3f 22 d8 e8 45 e9 46 Aug 26 13:09:11.514007: | 02 72 db 05 29 3e a1 e1 a8 d5 00 55 2e f0 b2 36 Aug 26 13:09:11.514009: | 77 06 51 7b ea e6 b8 34 4a a6 0d f5 3b 49 01 5e Aug 26 13:09:11.514010: | f6 25 62 9c 04 38 25 ac 04 1b a4 f9 cd 7d 2e 06 Aug 26 13:09:11.514012: | f5 12 3e d1 6f 8e 4c 9b ac 16 74 a6 e4 28 6f a0 Aug 26 13:09:11.514013: | 87 43 43 7f ab ef 8c f6 55 9f c2 4c 68 4d ff 4d Aug 26 13:09:11.514015: | 3c ec 0a 99 87 c5 ec d4 a4 09 22 38 30 7a a0 17 Aug 26 13:09:11.514016: | 8e c8 c1 d5 3f c0 7c 2e 7e 45 58 42 29 00 00 24 Aug 26 13:09:11.514018: | 65 2e f3 04 ce 26 01 5a 7d fd 01 f7 f8 95 16 a9 Aug 26 13:09:11.514019: | a4 53 76 12 86 99 c0 7f ce 91 ab 8e cb 97 96 83 Aug 26 13:09:11.514021: | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04 Aug 26 13:09:11.514022: | 2c 79 98 25 a3 95 2c a7 07 80 41 cc f3 5b 61 15 Aug 26 13:09:11.514024: | 54 19 1a 29 00 00 00 1c 00 00 40 05 13 75 59 8a Aug 26 13:09:11.514025: | 08 e4 b9 3b 8a 86 24 63 67 bd 12 f2 25 d0 bb 97 Aug 26 13:09:11.514072: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:09:11.514077: | libevent_free: release ptr-libevent@0x56552e9113f8 Aug 26 13:09:11.514080: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x56552e911078 Aug 26 13:09:11.514083: | event_schedule: new EVENT_SO_DISCARD-pe@0x56552e911078 Aug 26 13:09:11.514087: | inserting event EVENT_SO_DISCARD, timeout in 200 seconds for #1 Aug 26 13:09:11.514090: | libevent_malloc: new ptr-libevent@0x56552e912e28 size 128 Aug 26 13:09:11.514094: | resume sending helper answer for #1 suppresed complete_v2_state_transition() Aug 26 13:09:11.514100: | #1 spent 0.43 milliseconds in resume sending helper answer Aug 26 13:09:11.514106: | stop processing: state #1 connection "northnet-eastnet-ipv4" from 192.1.3.33:500 (in resume_handler() at server.c:833) Aug 26 13:09:11.514109: | libevent_free: release ptr-libevent@0x7f9e40002888 Aug 26 13:09:29.398093: | processing global timer EVENT_SHUNT_SCAN Aug 26 13:09:29.398145: | expiring aged bare shunts from shunt table Aug 26 13:09:29.398164: | spent 0.0163 milliseconds in global timer EVENT_SHUNT_SCAN Aug 26 13:09:49.398322: | processing global timer EVENT_SHUNT_SCAN Aug 26 13:09:49.398342: | expiring aged bare shunts from shunt table Aug 26 13:09:49.398348: | spent 0.00422 milliseconds in global timer EVENT_SHUNT_SCAN Aug 26 13:10:09.393341: | processing global timer EVENT_PENDING_DDNS Aug 26 13:10:09.393365: | FOR_EACH_CONNECTION_... in connection_check_ddns Aug 26 13:10:09.393368: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 13:10:09.393372: | elapsed time in connection_check_ddns for hostname lookup 0.000007 Aug 26 13:10:09.393379: | spent 0.0119 milliseconds in global timer EVENT_PENDING_DDNS Aug 26 13:10:09.393381: | processing global timer EVENT_SHUNT_SCAN Aug 26 13:10:09.393384: | expiring aged bare shunts from shunt table Aug 26 13:10:09.393386: | spent 0.00281 milliseconds in global timer EVENT_SHUNT_SCAN Aug 26 13:10:11.520841: | spent 0.00432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:10:11.520869: | *received 828 bytes from 192.1.3.33:500 on eth1 (192.1.2.23:500) Aug 26 13:10:11.520874: | 50 bc 4c 7d d5 32 bf f3 00 00 00 00 00 00 00 00 Aug 26 13:10:11.520877: | 21 20 22 08 00 00 00 00 00 00 03 3c 22 00 01 b4 Aug 26 13:10:11.520879: | 02 00 00 64 01 01 00 0b 03 00 00 0c 01 00 00 14 Aug 26 13:10:11.520882: | 80 0e 01 00 03 00 00 08 02 00 00 07 03 00 00 08 Aug 26 13:10:11.520884: | 02 00 00 05 03 00 00 08 04 00 00 0e 03 00 00 08 Aug 26 13:10:11.520887: | 04 00 00 0f 03 00 00 08 04 00 00 10 03 00 00 08 Aug 26 13:10:11.520889: | 04 00 00 12 03 00 00 08 04 00 00 13 03 00 00 08 Aug 26 13:10:11.520892: | 04 00 00 14 03 00 00 08 04 00 00 15 00 00 00 08 Aug 26 13:10:11.520894: | 04 00 00 1f 02 00 00 64 02 01 00 0b 03 00 00 0c Aug 26 13:10:11.520897: | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 Aug 26 13:10:11.520899: | 03 00 00 08 02 00 00 05 03 00 00 08 04 00 00 0e Aug 26 13:10:11.520902: | 03 00 00 08 04 00 00 0f 03 00 00 08 04 00 00 10 Aug 26 13:10:11.520904: | 03 00 00 08 04 00 00 12 03 00 00 08 04 00 00 13 Aug 26 13:10:11.520906: | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 15 Aug 26 13:10:11.520909: | 00 00 00 08 04 00 00 1f 02 00 00 74 03 01 00 0d Aug 26 13:10:11.520911: | 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 Aug 26 13:10:11.520914: | 02 00 00 07 03 00 00 08 02 00 00 05 03 00 00 08 Aug 26 13:10:11.520916: | 03 00 00 0e 03 00 00 08 03 00 00 0c 03 00 00 08 Aug 26 13:10:11.520919: | 04 00 00 0e 03 00 00 08 04 00 00 0f 03 00 00 08 Aug 26 13:10:11.520921: | 04 00 00 10 03 00 00 08 04 00 00 12 03 00 00 08 Aug 26 13:10:11.520924: | 04 00 00 13 03 00 00 08 04 00 00 14 03 00 00 08 Aug 26 13:10:11.520926: | 04 00 00 15 00 00 00 08 04 00 00 1f 00 00 00 74 Aug 26 13:10:11.520929: | 04 01 00 0d 03 00 00 0c 01 00 00 0c 80 0e 00 80 Aug 26 13:10:11.520931: | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 05 Aug 26 13:10:11.520934: | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c Aug 26 13:10:11.520936: | 03 00 00 08 04 00 00 0e 03 00 00 08 04 00 00 0f Aug 26 13:10:11.520939: | 03 00 00 08 04 00 00 10 03 00 00 08 04 00 00 12 Aug 26 13:10:11.520941: | 03 00 00 08 04 00 00 13 03 00 00 08 04 00 00 14 Aug 26 13:10:11.520943: | 03 00 00 08 04 00 00 15 00 00 00 08 04 00 00 1f Aug 26 13:10:11.520946: | 28 00 01 08 00 0e 00 00 7f e5 3f 05 fa ab e7 21 Aug 26 13:10:11.520948: | ac 84 da 3d ee 06 0c 11 53 0a 11 e6 4d 80 2c 45 Aug 26 13:10:11.520951: | 9c a3 d3 be c7 c5 32 f4 56 af 76 3c 15 fe 7e 96 Aug 26 13:10:11.520953: | 08 06 c0 7c 22 50 ce 34 ea fe 99 6e 83 04 f7 69 Aug 26 13:10:11.520956: | 79 52 1b ed c7 32 5c 97 a8 8f ae b4 89 09 2a 6b Aug 26 13:10:11.520958: | 35 3f 43 ec 99 ec c4 66 e8 25 63 79 69 23 2f b1 Aug 26 13:10:11.520961: | 11 8f c7 f3 18 ff 48 56 b0 2d 07 a2 56 cd ab db Aug 26 13:10:11.520967: | 99 ac 31 8a 2d 04 56 2b 79 27 2a 93 5b d9 99 f0 Aug 26 13:10:11.520970: | 7f 09 80 cc d0 d2 64 4a 05 9a 6c 47 da 9f 30 b1 Aug 26 13:10:11.520972: | 85 ff c9 3a 7a 0c c2 92 22 9c 8a 80 d9 cc 28 02 Aug 26 13:10:11.520975: | 8c be 00 1f 14 96 3b 72 7b 9a 95 4a 11 05 79 66 Aug 26 13:10:11.520977: | 0d c7 f3 4f 38 66 78 29 9d b4 66 45 1a e5 91 12 Aug 26 13:10:11.520980: | c3 28 0a 15 bb 37 93 1b b9 81 0c 21 e6 db 23 29 Aug 26 13:10:11.520982: | 16 7a a7 e6 0b 81 8a c2 48 00 06 fb 8c 7b 37 9e Aug 26 13:10:11.520985: | d3 3f ad 48 e4 dc 8b 92 94 21 13 f7 a1 04 75 3f Aug 26 13:10:11.520987: | 00 5f e7 4a b5 ba 60 d5 76 84 33 2d bb a9 9c 52 Aug 26 13:10:11.520990: | 5f 48 ef 94 93 18 e4 de 29 00 00 24 55 cd ac 1c Aug 26 13:10:11.520992: | ec 15 0c 13 ae 41 5d b7 fa de 8c 10 4e 4c 64 c4 Aug 26 13:10:11.520994: | a0 80 fc 40 a1 85 25 d6 12 de fa 48 29 00 00 08 Aug 26 13:10:11.520997: | 00 00 40 2e 29 00 00 1c 00 00 40 04 c9 97 a4 cd Aug 26 13:10:11.520999: | a7 d3 00 26 d3 91 24 43 33 87 c4 91 e2 d2 88 3b Aug 26 13:10:11.521002: | 00 00 00 1c 00 00 40 05 93 a5 ed 9b 6c bf 84 d7 Aug 26 13:10:11.521004: | 0b 5c 70 7f a6 1b 62 a0 e6 fe e6 b6 Aug 26 13:10:11.521009: | start processing: from 192.1.3.33:500 (in process_md() at demux.c:378) Aug 26 13:10:11.521013: | **parse ISAKMP Message: Aug 26 13:10:11.521016: | initiator cookie: Aug 26 13:10:11.521019: | 50 bc 4c 7d d5 32 bf f3 Aug 26 13:10:11.521021: | responder cookie: Aug 26 13:10:11.521024: | 00 00 00 00 00 00 00 00 Aug 26 13:10:11.521027: | next payload type: ISAKMP_NEXT_v2SA (0x21) Aug 26 13:10:11.521030: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:10:11.521033: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Aug 26 13:10:11.521036: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Aug 26 13:10:11.521039: | Message ID: 0 (0x0) Aug 26 13:10:11.521041: | length: 828 (0x33c) Aug 26 13:10:11.521044: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) Aug 26 13:10:11.521048: | I am the IKE SA Original Responder receiving an IKEv2 IKE_SA_INIT request Aug 26 13:10:11.521052: | State DB: IKEv2 state not found (find_v2_ike_sa_by_initiator_spi) Aug 26 13:10:11.521055: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Aug 26 13:10:11.521058: | ***parse IKEv2 Security Association Payload: Aug 26 13:10:11.521061: | next payload type: ISAKMP_NEXT_v2KE (0x22) Aug 26 13:10:11.521063: | flags: none (0x0) Aug 26 13:10:11.521066: | length: 436 (0x1b4) Aug 26 13:10:11.521069: | processing payload: ISAKMP_NEXT_v2SA (len=432) Aug 26 13:10:11.521071: | Now let's proceed with payload (ISAKMP_NEXT_v2KE) Aug 26 13:10:11.521074: | ***parse IKEv2 Key Exchange Payload: Aug 26 13:10:11.521077: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Aug 26 13:10:11.521079: | flags: none (0x0) Aug 26 13:10:11.521082: | length: 264 (0x108) Aug 26 13:10:11.521084: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:10:11.521087: | processing payload: ISAKMP_NEXT_v2KE (len=256) Aug 26 13:10:11.521090: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Aug 26 13:10:11.521092: | ***parse IKEv2 Nonce Payload: Aug 26 13:10:11.521095: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:10:11.521097: | flags: none (0x0) Aug 26 13:10:11.521100: | length: 36 (0x24) Aug 26 13:10:11.521102: | processing payload: ISAKMP_NEXT_v2Ni (len=32) Aug 26 13:10:11.521105: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 13:10:11.521108: | ***parse IKEv2 Notify Payload: Aug 26 13:10:11.521110: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:10:11.521113: | flags: none (0x0) Aug 26 13:10:11.521115: | length: 8 (0x8) Aug 26 13:10:11.521118: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:10:11.521120: | SPI size: 0 (0x0) Aug 26 13:10:11.521123: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Aug 26 13:10:11.521126: | processing payload: ISAKMP_NEXT_v2N (len=0) Aug 26 13:10:11.521131: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 13:10:11.521133: | ***parse IKEv2 Notify Payload: Aug 26 13:10:11.521136: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:10:11.521138: | flags: none (0x0) Aug 26 13:10:11.521141: | length: 28 (0x1c) Aug 26 13:10:11.521143: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:10:11.521146: | SPI size: 0 (0x0) Aug 26 13:10:11.521148: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Aug 26 13:10:11.521151: | processing payload: ISAKMP_NEXT_v2N (len=20) Aug 26 13:10:11.521153: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 13:10:11.521156: | ***parse IKEv2 Notify Payload: Aug 26 13:10:11.521159: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:10:11.521161: | flags: none (0x0) Aug 26 13:10:11.521163: | length: 28 (0x1c) Aug 26 13:10:11.521166: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:10:11.521168: | SPI size: 0 (0x0) Aug 26 13:10:11.521171: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Aug 26 13:10:11.521174: | processing payload: ISAKMP_NEXT_v2N (len=20) Aug 26 13:10:11.521176: | DDOS disabled and no cookie sent, continuing Aug 26 13:10:11.521182: | find_host_connection local=192.1.2.23:500 remote=192.1.3.33:500 policy=ECDSA+IKEV2_ALLOW but ignoring ports Aug 26 13:10:11.521187: | find_host_pair: comparing 192.1.2.23:500 to 192.1.3.33:500 but ignoring ports Aug 26 13:10:11.521191: | find_next_host_connection policy=ECDSA+IKEV2_ALLOW Aug 26 13:10:11.521195: | found policy = RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (northnet-eastnet-ipv4) Aug 26 13:10:11.521198: | find_next_host_connection returns empty Aug 26 13:10:11.521202: | find_host_connection local=192.1.2.23:500 remote= policy=ECDSA+IKEV2_ALLOW but ignoring ports Aug 26 13:10:11.521205: | find_next_host_connection policy=ECDSA+IKEV2_ALLOW Aug 26 13:10:11.521208: | find_next_host_connection returns empty Aug 26 13:10:11.521212: | initial parent SA message received on 192.1.2.23:500 but no connection has been authorized with policy ECDSA+IKEV2_ALLOW Aug 26 13:10:11.521216: | find_host_connection local=192.1.2.23:500 remote=192.1.3.33:500 policy=RSASIG+IKEV2_ALLOW but ignoring ports Aug 26 13:10:11.521221: | find_host_pair: comparing 192.1.2.23:500 to 192.1.3.33:500 but ignoring ports Aug 26 13:10:11.521224: | find_next_host_connection policy=RSASIG+IKEV2_ALLOW Aug 26 13:10:11.521227: | found policy = RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO (northnet-eastnet-ipv4) Aug 26 13:10:11.521230: | find_next_host_connection returns northnet-eastnet-ipv4 Aug 26 13:10:11.521233: | find_next_host_connection policy=RSASIG+IKEV2_ALLOW Aug 26 13:10:11.521235: | find_next_host_connection returns empty Aug 26 13:10:11.521239: | found connection: northnet-eastnet-ipv4 with policy RSASIG+IKEV2_ALLOW Aug 26 13:10:11.521262: | creating state object #2 at 0x56552e9165e8 Aug 26 13:10:11.521266: | State DB: adding IKEv2 state #2 in UNDEFINED Aug 26 13:10:11.521274: | pstats #2 ikev2.ike started Aug 26 13:10:11.521277: | Message ID: init #2: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 Aug 26 13:10:11.521281: | parent state #2: UNDEFINED(ignore) => PARENT_R0(half-open IKE SA) Aug 26 13:10:11.521287: | Message ID: init_ike #2; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 Aug 26 13:10:11.521304: | start processing: state #2 connection "northnet-eastnet-ipv4" from 192.1.3.33 (in ikev2_process_packet() at ikev2.c:2016) Aug 26 13:10:11.521308: | State DB: IKEv2 state not found (find_v2_sa_by_responder_wip) Aug 26 13:10:11.521313: | [RE]START processing: state #2 connection "northnet-eastnet-ipv4" from 192.1.3.33 (in ike_process_packet() at ikev2.c:2064) Aug 26 13:10:11.521316: | #2 st.st_msgid_lastrecv -1 md.hdr.isa_msgid 00000000 Aug 26 13:10:11.521320: | Message ID: #2 not a duplicate - message is new; initiator.sent=-1 initiator.recv=-1 responder.sent=-1 responder.recv=-1 Aug 26 13:10:11.521329: | Message ID: start-responder #2 request 0; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1 wip.responder=-1->0 Aug 26 13:10:11.521332: | #2 in state PARENT_R0: processing SA_INIT request Aug 26 13:10:11.521336: | selected state microcode Respond to IKE_SA_INIT Aug 26 13:10:11.521338: | Now let's proceed with state specific processing Aug 26 13:10:11.521341: | calling processor Respond to IKE_SA_INIT Aug 26 13:10:11.521348: | #2 updating local interface from 192.1.2.23:500 to 192.1.2.23:500 using md->iface (in update_ike_endpoints() at state.c:2669) Aug 26 13:10:11.521363: | using existing local IKE proposals for connection northnet-eastnet-ipv4 (IKE SA responder matching remote proposals): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:10:11.521368: | Comparing remote proposals against IKE responder 4 local proposals Aug 26 13:10:11.521372: | local proposal 1 type ENCR has 1 transforms Aug 26 13:10:11.521374: | local proposal 1 type PRF has 2 transforms Aug 26 13:10:11.521377: | local proposal 1 type INTEG has 1 transforms Aug 26 13:10:11.521380: | local proposal 1 type DH has 8 transforms Aug 26 13:10:11.521382: | local proposal 1 type ESN has 0 transforms Aug 26 13:10:11.521386: | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG Aug 26 13:10:11.521389: | local proposal 2 type ENCR has 1 transforms Aug 26 13:10:11.521391: | local proposal 2 type PRF has 2 transforms Aug 26 13:10:11.521394: | local proposal 2 type INTEG has 1 transforms Aug 26 13:10:11.521397: | local proposal 2 type DH has 8 transforms Aug 26 13:10:11.521399: | local proposal 2 type ESN has 0 transforms Aug 26 13:10:11.521402: | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG Aug 26 13:10:11.521405: | local proposal 3 type ENCR has 1 transforms Aug 26 13:10:11.521408: | local proposal 3 type PRF has 2 transforms Aug 26 13:10:11.521410: | local proposal 3 type INTEG has 2 transforms Aug 26 13:10:11.521413: | local proposal 3 type DH has 8 transforms Aug 26 13:10:11.521416: | local proposal 3 type ESN has 0 transforms Aug 26 13:10:11.521419: | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none Aug 26 13:10:11.521421: | local proposal 4 type ENCR has 1 transforms Aug 26 13:10:11.521424: | local proposal 4 type PRF has 2 transforms Aug 26 13:10:11.521426: | local proposal 4 type INTEG has 2 transforms Aug 26 13:10:11.521429: | local proposal 4 type DH has 8 transforms Aug 26 13:10:11.521432: | local proposal 4 type ESN has 0 transforms Aug 26 13:10:11.521435: | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none Aug 26 13:10:11.521438: | ****parse IKEv2 Proposal Substructure Payload: Aug 26 13:10:11.521441: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:10:11.521444: | length: 100 (0x64) Aug 26 13:10:11.521446: | prop #: 1 (0x1) Aug 26 13:10:11.521449: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:10:11.521452: | spi size: 0 (0x0) Aug 26 13:10:11.521454: | # transforms: 11 (0xb) Aug 26 13:10:11.521458: | Comparing remote proposal 1 containing 11 transforms against local proposal [1..4] of 4 local proposals Aug 26 13:10:11.521461: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521464: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521466: | length: 12 (0xc) Aug 26 13:10:11.521469: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:10:11.521473: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 13:10:11.521476: | ******parse IKEv2 Attribute Substructure Payload: Aug 26 13:10:11.521479: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:10:11.521482: | length/value: 256 (0x100) Aug 26 13:10:11.521486: | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 Aug 26 13:10:11.521489: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521492: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521494: | length: 8 (0x8) Aug 26 13:10:11.521497: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:10:11.521500: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:10:11.521503: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 Aug 26 13:10:11.521507: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 2 type 2 (PRF) transform 0 Aug 26 13:10:11.521510: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 3 type 2 (PRF) transform 0 Aug 26 13:10:11.521513: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 4 type 2 (PRF) transform 0 Aug 26 13:10:11.521516: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521518: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521521: | length: 8 (0x8) Aug 26 13:10:11.521523: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:10:11.521526: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 13:10:11.521529: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521531: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521534: | length: 8 (0x8) Aug 26 13:10:11.521536: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521539: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:10:11.521542: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Aug 26 13:10:11.521546: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 2 type 4 (DH) transform 0 Aug 26 13:10:11.521549: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 3 type 4 (DH) transform 0 Aug 26 13:10:11.521552: | remote proposal 1 transform 3 (DH=MODP2048) matches local proposal 4 type 4 (DH) transform 0 Aug 26 13:10:11.521555: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521557: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521560: | length: 8 (0x8) Aug 26 13:10:11.521562: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521565: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 13:10:11.521568: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521570: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521573: | length: 8 (0x8) Aug 26 13:10:11.521575: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521578: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 13:10:11.521581: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521583: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521586: | length: 8 (0x8) Aug 26 13:10:11.521588: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521591: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 13:10:11.521594: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521596: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521598: | length: 8 (0x8) Aug 26 13:10:11.521601: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521604: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 13:10:11.521606: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521609: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521611: | length: 8 (0x8) Aug 26 13:10:11.521614: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521617: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 13:10:11.521621: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521623: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521626: | length: 8 (0x8) Aug 26 13:10:11.521628: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521631: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 13:10:11.521634: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521636: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:10:11.521639: | length: 8 (0x8) Aug 26 13:10:11.521641: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521644: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 13:10:11.521648: | remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none Aug 26 13:10:11.521652: | comparing remote proposal 1 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH Aug 26 13:10:11.521655: | remote proposal 1 matches local proposal 1 Aug 26 13:10:11.521658: | ****parse IKEv2 Proposal Substructure Payload: Aug 26 13:10:11.521661: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:10:11.521663: | length: 100 (0x64) Aug 26 13:10:11.521666: | prop #: 2 (0x2) Aug 26 13:10:11.521668: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:10:11.521671: | spi size: 0 (0x0) Aug 26 13:10:11.521673: | # transforms: 11 (0xb) Aug 26 13:10:11.521677: | Comparing remote proposal 2 containing 11 transforms against local proposal [1..0] of 4 local proposals Aug 26 13:10:11.521680: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521682: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521685: | length: 12 (0xc) Aug 26 13:10:11.521687: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:10:11.521690: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 13:10:11.521692: | ******parse IKEv2 Attribute Substructure Payload: Aug 26 13:10:11.521695: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:10:11.521697: | length/value: 128 (0x80) Aug 26 13:10:11.521701: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521703: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521706: | length: 8 (0x8) Aug 26 13:10:11.521708: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:10:11.521711: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:10:11.521714: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521716: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521718: | length: 8 (0x8) Aug 26 13:10:11.521721: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:10:11.521724: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 13:10:11.521726: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521729: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521731: | length: 8 (0x8) Aug 26 13:10:11.521734: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521736: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:10:11.521739: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521742: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521744: | length: 8 (0x8) Aug 26 13:10:11.521747: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521749: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 13:10:11.521752: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521755: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521757: | length: 8 (0x8) Aug 26 13:10:11.521760: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521762: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 13:10:11.521765: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521767: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521770: | length: 8 (0x8) Aug 26 13:10:11.521772: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521775: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 13:10:11.521782: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521784: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521787: | length: 8 (0x8) Aug 26 13:10:11.521789: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521792: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 13:10:11.521795: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521797: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521800: | length: 8 (0x8) Aug 26 13:10:11.521802: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521805: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 13:10:11.521808: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521810: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521813: | length: 8 (0x8) Aug 26 13:10:11.521815: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521818: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 13:10:11.521821: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521823: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:10:11.521826: | length: 8 (0x8) Aug 26 13:10:11.521828: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521831: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 13:10:11.521835: | remote proposal 2 proposed transforms: ENCR+PRF+DH; matched: none; unmatched: ENCR+PRF+DH Aug 26 13:10:11.521838: | remote proposal 2 does not match; unmatched remote transforms: ENCR+PRF+DH Aug 26 13:10:11.521841: | ****parse IKEv2 Proposal Substructure Payload: Aug 26 13:10:11.521843: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:10:11.521846: | length: 116 (0x74) Aug 26 13:10:11.521848: | prop #: 3 (0x3) Aug 26 13:10:11.521851: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:10:11.521853: | spi size: 0 (0x0) Aug 26 13:10:11.521855: | # transforms: 13 (0xd) Aug 26 13:10:11.521859: | Comparing remote proposal 3 containing 13 transforms against local proposal [1..0] of 4 local proposals Aug 26 13:10:11.521861: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521864: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521866: | length: 12 (0xc) Aug 26 13:10:11.521869: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:10:11.521871: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 13:10:11.521874: | ******parse IKEv2 Attribute Substructure Payload: Aug 26 13:10:11.521877: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:10:11.521879: | length/value: 256 (0x100) Aug 26 13:10:11.521882: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521885: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521887: | length: 8 (0x8) Aug 26 13:10:11.521890: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:10:11.521892: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:10:11.521895: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521898: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521900: | length: 8 (0x8) Aug 26 13:10:11.521903: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:10:11.521905: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 13:10:11.521908: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521911: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521913: | length: 8 (0x8) Aug 26 13:10:11.521916: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:10:11.521918: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 13:10:11.521921: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521923: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521926: | length: 8 (0x8) Aug 26 13:10:11.521928: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:10:11.521931: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 13:10:11.521934: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521938: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521941: | length: 8 (0x8) Aug 26 13:10:11.521943: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521946: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:10:11.521949: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521951: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521954: | length: 8 (0x8) Aug 26 13:10:11.521956: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521959: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 13:10:11.521962: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521964: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521967: | length: 8 (0x8) Aug 26 13:10:11.521969: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521972: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 13:10:11.521974: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521977: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521979: | length: 8 (0x8) Aug 26 13:10:11.521982: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521985: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 13:10:11.521987: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.521990: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.521992: | length: 8 (0x8) Aug 26 13:10:11.521995: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.521997: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 13:10:11.522000: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.522003: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.522005: | length: 8 (0x8) Aug 26 13:10:11.522008: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.522010: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 13:10:11.522013: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.522016: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.522018: | length: 8 (0x8) Aug 26 13:10:11.522020: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.522023: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 13:10:11.522026: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.522028: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:10:11.522031: | length: 8 (0x8) Aug 26 13:10:11.522033: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.522036: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 13:10:11.522040: | remote proposal 3 proposed transforms: ENCR+PRF+INTEG+DH; matched: none; unmatched: ENCR+PRF+INTEG+DH Aug 26 13:10:11.522043: | remote proposal 3 does not match; unmatched remote transforms: ENCR+PRF+INTEG+DH Aug 26 13:10:11.522046: | ****parse IKEv2 Proposal Substructure Payload: Aug 26 13:10:11.522048: | last proposal: v2_PROPOSAL_LAST (0x0) Aug 26 13:10:11.522051: | length: 116 (0x74) Aug 26 13:10:11.522053: | prop #: 4 (0x4) Aug 26 13:10:11.522055: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:10:11.522058: | spi size: 0 (0x0) Aug 26 13:10:11.522060: | # transforms: 13 (0xd) Aug 26 13:10:11.522063: | Comparing remote proposal 4 containing 13 transforms against local proposal [1..0] of 4 local proposals Aug 26 13:10:11.522066: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.522069: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.522071: | length: 12 (0xc) Aug 26 13:10:11.522074: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:10:11.522076: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 13:10:11.522079: | ******parse IKEv2 Attribute Substructure Payload: Aug 26 13:10:11.522081: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:10:11.522084: | length/value: 128 (0x80) Aug 26 13:10:11.522087: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.522089: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.522094: | length: 8 (0x8) Aug 26 13:10:11.522096: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:10:11.522099: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:10:11.522102: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.522104: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.522107: | length: 8 (0x8) Aug 26 13:10:11.522109: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:10:11.522112: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 13:10:11.522115: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.522117: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.522120: | length: 8 (0x8) Aug 26 13:10:11.522122: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:10:11.522125: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 13:10:11.522128: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.522130: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.522133: | length: 8 (0x8) Aug 26 13:10:11.522135: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:10:11.522138: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 13:10:11.522140: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.522143: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.522145: | length: 8 (0x8) Aug 26 13:10:11.522148: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.522151: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:10:11.522153: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.522156: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.522158: | length: 8 (0x8) Aug 26 13:10:11.522161: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.522163: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 13:10:11.522166: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.522169: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.522171: | length: 8 (0x8) Aug 26 13:10:11.522174: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.522176: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 13:10:11.522179: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.522182: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.522184: | length: 8 (0x8) Aug 26 13:10:11.522186: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.522189: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 13:10:11.522192: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.522194: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.522197: | length: 8 (0x8) Aug 26 13:10:11.522199: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.522202: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 13:10:11.522205: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.522207: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.522210: | length: 8 (0x8) Aug 26 13:10:11.522212: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.522215: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 13:10:11.522217: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.522220: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.522222: | length: 8 (0x8) Aug 26 13:10:11.522225: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.522227: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 13:10:11.522230: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:10:11.522233: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:10:11.522235: | length: 8 (0x8) Aug 26 13:10:11.522238: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.522240: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 13:10:11.522244: | remote proposal 4 proposed transforms: ENCR+PRF+INTEG+DH; matched: none; unmatched: ENCR+PRF+INTEG+DH Aug 26 13:10:11.522249: | remote proposal 4 does not match; unmatched remote transforms: ENCR+PRF+INTEG+DH Aug 26 13:10:11.522253: "northnet-eastnet-ipv4" #2: proposal 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048 chosen from remote proposals 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;PRF=HMAC_SHA2_256;DH=MODP2048;DH=MODP3072;DH=MODP4096;DH=MODP8192;DH=ECP_256;DH=ECP_384;DH=ECP_521;DH=CURVE25519[first-match] 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512;PRF=HMAC_SHA2_256;DH=MODP2048;DH=MODP3072;DH=MODP4096;DH=MODP8192;DH=ECP_256;DH=ECP_384;DH=ECP_521;DH=CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512;PRF=HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256;INTEG=HMAC_SHA2_256_128;DH=MODP2048;DH=MODP3072;DH=MODP4096;DH=MODP8192;DH=ECP_256;DH=ECP_384;DH=ECP_521;DH=CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512;PRF=HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256;INTEG=HMAC_SHA2_256_128;DH=MODP2048;DH=MODP3072;DH=MODP4096;DH=MODP8192;DH=ECP_256;DH=ECP_384;DH=ECP_521;DH=CURVE25519 Aug 26 13:10:11.522258: | accepted IKE proposal ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048 Aug 26 13:10:11.522261: | converting proposal to internal trans attrs Aug 26 13:10:11.522266: | natd_hash: rcookie is zero Aug 26 13:10:11.522275: | natd_hash: hasher=0x56552cd4e800(20) Aug 26 13:10:11.522279: | natd_hash: icookie= 50 bc 4c 7d d5 32 bf f3 Aug 26 13:10:11.522281: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Aug 26 13:10:11.522284: | natd_hash: ip= c0 01 02 17 Aug 26 13:10:11.522286: | natd_hash: port=500 Aug 26 13:10:11.522294: | natd_hash: hash= 93 a5 ed 9b 6c bf 84 d7 0b 5c 70 7f a6 1b 62 a0 Aug 26 13:10:11.522299: | natd_hash: hash= e6 fe e6 b6 Aug 26 13:10:11.522302: | natd_hash: rcookie is zero Aug 26 13:10:11.522309: | natd_hash: hasher=0x56552cd4e800(20) Aug 26 13:10:11.522312: | natd_hash: icookie= 50 bc 4c 7d d5 32 bf f3 Aug 26 13:10:11.522314: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Aug 26 13:10:11.522316: | natd_hash: ip= c0 01 03 21 Aug 26 13:10:11.522319: | natd_hash: port=500 Aug 26 13:10:11.522321: | natd_hash: hash= c9 97 a4 cd a7 d3 00 26 d3 91 24 43 33 87 c4 91 Aug 26 13:10:11.522324: | natd_hash: hash= e2 d2 88 3b Aug 26 13:10:11.522327: | NAT_TRAVERSAL encaps using auto-detect Aug 26 13:10:11.522329: | NAT_TRAVERSAL this end is NOT behind NAT Aug 26 13:10:11.522332: | NAT_TRAVERSAL that end is NOT behind NAT Aug 26 13:10:11.522335: | NAT_TRAVERSAL nat-keepalive enabled 192.1.3.33 Aug 26 13:10:11.522339: | adding ikev2_inI1outR1 KE work-order 2 for state #2 Aug 26 13:10:11.522342: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f9e40002b78 Aug 26 13:10:11.522346: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2 Aug 26 13:10:11.522350: | libevent_malloc: new ptr-libevent@0x7f9e40002888 size 128 Aug 26 13:10:11.522366: | #2 spent 1.02 milliseconds in processing: Respond to IKE_SA_INIT in ikev2_process_state_packet() Aug 26 13:10:11.522373: | [RE]START processing: state #2 connection "northnet-eastnet-ipv4" from 192.1.3.33:500 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 13:10:11.522378: | #2 complete_v2_state_transition() PARENT_R0->PARENT_R1 with status STF_SUSPEND Aug 26 13:10:11.522381: | suspending state #2 and saving MD Aug 26 13:10:11.522383: | #2 is busy; has a suspended MD Aug 26 13:10:11.522388: | [RE]START processing: state #2 connection "northnet-eastnet-ipv4" from 192.1.3.33:500 (in log_stf_suspend() at ikev2.c:3269) Aug 26 13:10:11.522392: | "northnet-eastnet-ipv4" #2 complete v2 state STATE_PARENT_R0 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451 Aug 26 13:10:11.522396: | stop processing: state #2 connection "northnet-eastnet-ipv4" from 192.1.3.33:500 (in ikev2_process_packet() at ikev2.c:2018) Aug 26 13:10:11.522401: | #2 spent 1.53 milliseconds in ikev2_process_packet() Aug 26 13:10:11.522405: | stop processing: from 192.1.3.33:500 (in process_md() at demux.c:380) Aug 26 13:10:11.522408: | processing: STOP state #0 (in process_md() at demux.c:382) Aug 26 13:10:11.522409: | crypto helper 0 resuming Aug 26 13:10:11.522436: | crypto helper 0 starting work-order 2 for state #2 Aug 26 13:10:11.522442: | crypto helper 0 doing build KE and nonce (ikev2_inI1outR1 KE); request ID 2 Aug 26 13:10:11.522411: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:10:11.522488: | spent 1.61 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:10:11.523330: | crypto helper 0 finished build KE and nonce (ikev2_inI1outR1 KE); request ID 2 time elapsed 0.000888 seconds Aug 26 13:10:11.523345: | (#2) spent 0.896 milliseconds in crypto helper computing work-order 2: ikev2_inI1outR1 KE (pcr) Aug 26 13:10:11.523349: | crypto helper 0 sending results from work-order 2 for state #2 to event queue Aug 26 13:10:11.523352: | scheduling resume sending helper answer for #2 Aug 26 13:10:11.523356: | libevent_malloc: new ptr-libevent@0x7f9e38002888 size 128 Aug 26 13:10:11.523368: | crypto helper 0 waiting (nothing to do) Aug 26 13:10:11.523379: | processing resume sending helper answer for #2 Aug 26 13:10:11.523391: | start processing: state #2 connection "northnet-eastnet-ipv4" from 192.1.3.33:500 (in resume_handler() at server.c:797) Aug 26 13:10:11.523396: | crypto helper 0 replies to request ID 2 Aug 26 13:10:11.523399: | calling continuation function 0x56552cc79b50 Aug 26 13:10:11.523402: | ikev2_parent_inI1outR1_continue for #2: calculated ke+nonce, sending R1 Aug 26 13:10:11.523409: | **emit ISAKMP Message: Aug 26 13:10:11.523413: | initiator cookie: Aug 26 13:10:11.523415: | 50 bc 4c 7d d5 32 bf f3 Aug 26 13:10:11.523418: | responder cookie: Aug 26 13:10:11.523420: | c5 28 39 f9 3f 2a 25 a1 Aug 26 13:10:11.523423: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:10:11.523426: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:10:11.523429: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Aug 26 13:10:11.523432: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Aug 26 13:10:11.523435: | Message ID: 0 (0x0) Aug 26 13:10:11.523438: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:10:11.523441: | Emitting ikev2_proposal ... Aug 26 13:10:11.523444: | ***emit IKEv2 Security Association Payload: Aug 26 13:10:11.523447: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:10:11.523449: | flags: none (0x0) Aug 26 13:10:11.523453: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Aug 26 13:10:11.523456: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:10:11.523459: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 13:10:11.523462: | last proposal: v2_PROPOSAL_LAST (0x0) Aug 26 13:10:11.523465: | prop #: 1 (0x1) Aug 26 13:10:11.523467: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:10:11.523470: | spi size: 0 (0x0) Aug 26 13:10:11.523473: | # transforms: 3 (0x3) Aug 26 13:10:11.523476: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:10:11.523479: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:10:11.523481: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.523484: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:10:11.523487: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 13:10:11.523490: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:10:11.523493: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 13:10:11.523496: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:10:11.523499: | length/value: 256 (0x100) Aug 26 13:10:11.523502: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:10:11.523505: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:10:11.523507: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.523510: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:10:11.523516: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:10:11.523520: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.523523: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:10:11.523526: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:10:11.523528: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:10:11.523531: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:10:11.523534: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:10:11.523536: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:10:11.523539: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:10:11.523542: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:10:11.523545: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:10:11.523548: | emitting length of IKEv2 Proposal Substructure Payload: 36 Aug 26 13:10:11.523551: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:10:11.523554: | emitting length of IKEv2 Security Association Payload: 40 Aug 26 13:10:11.523557: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Aug 26 13:10:11.523560: | ***emit IKEv2 Key Exchange Payload: Aug 26 13:10:11.523563: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:10:11.523565: | flags: none (0x0) Aug 26 13:10:11.523568: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:10:11.523571: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) Aug 26 13:10:11.523575: | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' Aug 26 13:10:11.523578: | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload Aug 26 13:10:11.523581: | ikev2 g^x 52 c2 de d5 52 d0 a4 55 8c d8 0d b0 60 22 85 06 Aug 26 13:10:11.523584: | ikev2 g^x 1c 08 ea 1c 92 15 60 45 a3 ce 0d ed a1 81 ac 95 Aug 26 13:10:11.523586: | ikev2 g^x fd 4e 7e 35 35 bf 0e 71 f7 57 bc 62 c3 d6 90 02 Aug 26 13:10:11.523589: | ikev2 g^x 2a 7c 88 4a e6 6a c6 f6 f8 5e dc 25 89 5a 9c dd Aug 26 13:10:11.523591: | ikev2 g^x ea 11 22 03 60 91 02 e2 f1 1c 51 ba 81 6c c8 6d Aug 26 13:10:11.523594: | ikev2 g^x 28 5d 83 73 0d 05 ee fb f7 3a 38 f8 c8 02 0b ee Aug 26 13:10:11.523596: | ikev2 g^x 1a eb 38 56 6e 7b c6 d3 c4 c7 ba c2 56 5a 4b a0 Aug 26 13:10:11.523599: | ikev2 g^x ac 2f 06 85 40 de 55 c4 75 64 78 4d 16 a6 1e b6 Aug 26 13:10:11.523601: | ikev2 g^x c6 bd 8e b8 6a 2a d9 c9 52 6e 7f 37 31 9c d8 95 Aug 26 13:10:11.523604: | ikev2 g^x d9 a9 55 4f b6 cb 1d 50 47 ea c4 52 48 a4 f1 22 Aug 26 13:10:11.523606: | ikev2 g^x dd 1d ed 94 61 7a 75 38 38 7e a6 a6 b5 27 2c 14 Aug 26 13:10:11.523609: | ikev2 g^x e3 5a 1b ad 5a 5e 1d 49 5e 65 c5 e0 2c 75 cb 2e Aug 26 13:10:11.523611: | ikev2 g^x ca 80 51 75 ed bf 8f d5 39 fd 0e 0a 75 be 79 5f Aug 26 13:10:11.523614: | ikev2 g^x b9 28 33 ef 68 b8 a8 52 ed 9d 8b ee 9f d0 30 14 Aug 26 13:10:11.523616: | ikev2 g^x ad 61 52 1a be cd 52 7c 0d a9 83 15 9f 7e 0a 4f Aug 26 13:10:11.523619: | ikev2 g^x 26 18 00 05 95 8d 3b 1f 57 7c 44 36 10 30 db 1b Aug 26 13:10:11.523622: | emitting length of IKEv2 Key Exchange Payload: 264 Aug 26 13:10:11.523624: | ***emit IKEv2 Nonce Payload: Aug 26 13:10:11.523627: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:10:11.523630: | flags: none (0x0) Aug 26 13:10:11.523633: | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N Aug 26 13:10:11.523638: | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) Aug 26 13:10:11.523641: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' Aug 26 13:10:11.523644: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Aug 26 13:10:11.523647: | IKEv2 nonce 94 17 87 23 9e 38 a2 7c 60 10 fb 6c 38 6b 46 63 Aug 26 13:10:11.523649: | IKEv2 nonce 68 68 85 f7 28 ca d2 e2 88 75 ae af 5a 7f 0c 65 Aug 26 13:10:11.523652: | emitting length of IKEv2 Nonce Payload: 36 Aug 26 13:10:11.523655: | Adding a v2N Payload Aug 26 13:10:11.523658: | ***emit IKEv2 Notify Payload: Aug 26 13:10:11.523661: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:10:11.523663: | flags: none (0x0) Aug 26 13:10:11.523666: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:10:11.523668: | SPI size: 0 (0x0) Aug 26 13:10:11.523671: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Aug 26 13:10:11.523674: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 13:10:11.523677: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 13:10:11.523680: | emitting length of IKEv2 Notify Payload: 8 Aug 26 13:10:11.523683: | NAT-Traversal support [enabled] add v2N payloads. Aug 26 13:10:11.523695: | natd_hash: hasher=0x56552cd4e800(20) Aug 26 13:10:11.523698: | natd_hash: icookie= 50 bc 4c 7d d5 32 bf f3 Aug 26 13:10:11.523701: | natd_hash: rcookie= c5 28 39 f9 3f 2a 25 a1 Aug 26 13:10:11.523704: | natd_hash: ip= c0 01 02 17 Aug 26 13:10:11.523706: | natd_hash: port=500 Aug 26 13:10:11.523709: | natd_hash: hash= 96 0d 0a 50 c2 34 8a 04 8d 05 33 57 c4 3e 7e 89 Aug 26 13:10:11.523711: | natd_hash: hash= da a7 16 b8 Aug 26 13:10:11.523714: | Adding a v2N Payload Aug 26 13:10:11.523716: | ***emit IKEv2 Notify Payload: Aug 26 13:10:11.523719: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:10:11.523722: | flags: none (0x0) Aug 26 13:10:11.523724: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:10:11.523727: | SPI size: 0 (0x0) Aug 26 13:10:11.523729: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Aug 26 13:10:11.523733: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 13:10:11.523735: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 13:10:11.523739: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Aug 26 13:10:11.523741: | Notify data 96 0d 0a 50 c2 34 8a 04 8d 05 33 57 c4 3e 7e 89 Aug 26 13:10:11.523744: | Notify data da a7 16 b8 Aug 26 13:10:11.523746: | emitting length of IKEv2 Notify Payload: 28 Aug 26 13:10:11.523752: | natd_hash: hasher=0x56552cd4e800(20) Aug 26 13:10:11.523755: | natd_hash: icookie= 50 bc 4c 7d d5 32 bf f3 Aug 26 13:10:11.523758: | natd_hash: rcookie= c5 28 39 f9 3f 2a 25 a1 Aug 26 13:10:11.523760: | natd_hash: ip= c0 01 03 21 Aug 26 13:10:11.523762: | natd_hash: port=500 Aug 26 13:10:11.523765: | natd_hash: hash= ff 7d 84 46 b2 af ef b9 03 4c 74 15 cd 7c df 6e Aug 26 13:10:11.523767: | natd_hash: hash= 87 13 71 79 Aug 26 13:10:11.523770: | Adding a v2N Payload Aug 26 13:10:11.523772: | ***emit IKEv2 Notify Payload: Aug 26 13:10:11.523775: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:10:11.523777: | flags: none (0x0) Aug 26 13:10:11.523780: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:10:11.523782: | SPI size: 0 (0x0) Aug 26 13:10:11.523785: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Aug 26 13:10:11.523788: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 13:10:11.523791: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 13:10:11.523796: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Aug 26 13:10:11.523799: | Notify data ff 7d 84 46 b2 af ef b9 03 4c 74 15 cd 7c df 6e Aug 26 13:10:11.523801: | Notify data 87 13 71 79 Aug 26 13:10:11.523803: | emitting length of IKEv2 Notify Payload: 28 Aug 26 13:10:11.523806: | emitting length of ISAKMP Message: 432 Aug 26 13:10:11.523814: | [RE]START processing: state #2 connection "northnet-eastnet-ipv4" from 192.1.3.33:500 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 13:10:11.523817: | #2 complete_v2_state_transition() PARENT_R0->PARENT_R1 with status STF_OK Aug 26 13:10:11.523821: | IKEv2: transition from state STATE_PARENT_R0 to state STATE_PARENT_R1 Aug 26 13:10:11.523824: | parent state #2: PARENT_R0(half-open IKE SA) => PARENT_R1(half-open IKE SA) Aug 26 13:10:11.523827: | Message ID: updating counters for #2 to 0 after switching state Aug 26 13:10:11.523832: | Message ID: recv #2 request 0; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=-1 responder.recv=-1->0 wip.initiator=-1 wip.responder=0->-1 Aug 26 13:10:11.523837: | Message ID: sent #2 response 0; ike: initiator.sent=-1 initiator.recv=-1 responder.sent=-1->0 responder.recv=0 wip.initiator=-1 wip.responder=-1 Aug 26 13:10:11.523842: "northnet-eastnet-ipv4" #2: STATE_PARENT_R1: received v2I1, sent v2R1 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} Aug 26 13:10:11.523847: | sending V2 new request packet to 192.1.3.33:500 (from 192.1.2.23:500) Aug 26 13:10:11.523853: | sending 432 bytes for STATE_PARENT_R0 through eth1 from 192.1.2.23:500 to 192.1.3.33:500 (using #2) Aug 26 13:10:11.523856: | 50 bc 4c 7d d5 32 bf f3 c5 28 39 f9 3f 2a 25 a1 Aug 26 13:10:11.523858: | 21 20 22 20 00 00 00 00 00 00 01 b0 22 00 00 28 Aug 26 13:10:11.523861: | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14 Aug 26 13:10:11.523863: | 80 0e 01 00 03 00 00 08 02 00 00 07 00 00 00 08 Aug 26 13:10:11.523866: | 04 00 00 0e 28 00 01 08 00 0e 00 00 52 c2 de d5 Aug 26 13:10:11.523868: | 52 d0 a4 55 8c d8 0d b0 60 22 85 06 1c 08 ea 1c Aug 26 13:10:11.523870: | 92 15 60 45 a3 ce 0d ed a1 81 ac 95 fd 4e 7e 35 Aug 26 13:10:11.523873: | 35 bf 0e 71 f7 57 bc 62 c3 d6 90 02 2a 7c 88 4a Aug 26 13:10:11.523875: | e6 6a c6 f6 f8 5e dc 25 89 5a 9c dd ea 11 22 03 Aug 26 13:10:11.523878: | 60 91 02 e2 f1 1c 51 ba 81 6c c8 6d 28 5d 83 73 Aug 26 13:10:11.523880: | 0d 05 ee fb f7 3a 38 f8 c8 02 0b ee 1a eb 38 56 Aug 26 13:10:11.523883: | 6e 7b c6 d3 c4 c7 ba c2 56 5a 4b a0 ac 2f 06 85 Aug 26 13:10:11.523885: | 40 de 55 c4 75 64 78 4d 16 a6 1e b6 c6 bd 8e b8 Aug 26 13:10:11.523888: | 6a 2a d9 c9 52 6e 7f 37 31 9c d8 95 d9 a9 55 4f Aug 26 13:10:11.523890: | b6 cb 1d 50 47 ea c4 52 48 a4 f1 22 dd 1d ed 94 Aug 26 13:10:11.523893: | 61 7a 75 38 38 7e a6 a6 b5 27 2c 14 e3 5a 1b ad Aug 26 13:10:11.523895: | 5a 5e 1d 49 5e 65 c5 e0 2c 75 cb 2e ca 80 51 75 Aug 26 13:10:11.523898: | ed bf 8f d5 39 fd 0e 0a 75 be 79 5f b9 28 33 ef Aug 26 13:10:11.523900: | 68 b8 a8 52 ed 9d 8b ee 9f d0 30 14 ad 61 52 1a Aug 26 13:10:11.523903: | be cd 52 7c 0d a9 83 15 9f 7e 0a 4f 26 18 00 05 Aug 26 13:10:11.523905: | 95 8d 3b 1f 57 7c 44 36 10 30 db 1b 29 00 00 24 Aug 26 13:10:11.523908: | 94 17 87 23 9e 38 a2 7c 60 10 fb 6c 38 6b 46 63 Aug 26 13:10:11.523910: | 68 68 85 f7 28 ca d2 e2 88 75 ae af 5a 7f 0c 65 Aug 26 13:10:11.523913: | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04 Aug 26 13:10:11.523915: | 96 0d 0a 50 c2 34 8a 04 8d 05 33 57 c4 3e 7e 89 Aug 26 13:10:11.523917: | da a7 16 b8 00 00 00 1c 00 00 40 05 ff 7d 84 46 Aug 26 13:10:11.523920: | b2 af ef b9 03 4c 74 15 cd 7c df 6e 87 13 71 79 Aug 26 13:10:11.523967: | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:10:11.523975: | libevent_free: release ptr-libevent@0x7f9e40002888 Aug 26 13:10:11.523981: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f9e40002b78 Aug 26 13:10:11.523990: | event_schedule: new EVENT_SO_DISCARD-pe@0x7f9e40002b78 Aug 26 13:10:11.523996: | inserting event EVENT_SO_DISCARD, timeout in 200 seconds for #2 Aug 26 13:10:11.524002: | libevent_malloc: new ptr-libevent@0x56552e9113f8 size 128 Aug 26 13:10:11.524009: | resume sending helper answer for #2 suppresed complete_v2_state_transition() Aug 26 13:10:11.524018: | #2 spent 0.595 milliseconds in resume sending helper answer Aug 26 13:10:11.524027: | stop processing: state #2 connection "northnet-eastnet-ipv4" from 192.1.3.33:500 (in resume_handler() at server.c:833) Aug 26 13:10:11.524033: | libevent_free: release ptr-libevent@0x7f9e38002888 Aug 26 13:10:29.397410: | processing global timer EVENT_SHUNT_SCAN Aug 26 13:10:29.397462: | expiring aged bare shunts from shunt table Aug 26 13:10:29.397479: | spent 0.0147 milliseconds in global timer EVENT_SHUNT_SCAN