Aug 26 13:28:11.334580: FIPS Product: YES Aug 26 13:28:11.334629: FIPS Kernel: NO Aug 26 13:28:11.334632: FIPS Mode: NO Aug 26 13:28:11.334634: NSS DB directory: sql:/etc/ipsec.d Aug 26 13:28:11.334771: Initializing NSS Aug 26 13:28:11.334776: Opening NSS database "sql:/etc/ipsec.d" read-only Aug 26 13:28:11.363473: NSS initialized Aug 26 13:28:11.363494: NSS crypto library initialized Aug 26 13:28:11.363497: FIPS HMAC integrity support [enabled] Aug 26 13:28:11.363500: FIPS mode disabled for pluto daemon Aug 26 13:28:11.406958: FIPS HMAC integrity verification self-test FAILED Aug 26 13:28:11.407450: libcap-ng support [enabled] Aug 26 13:28:11.407460: Linux audit support [enabled] Aug 26 13:28:11.407749: Linux audit activated Aug 26 13:28:11.407759: Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:14425 Aug 26 13:28:11.407764: core dump dir: /tmp Aug 26 13:28:11.407767: secrets file: /etc/ipsec.secrets Aug 26 13:28:11.407769: leak-detective enabled Aug 26 13:28:11.407771: NSS crypto [enabled] Aug 26 13:28:11.407773: XAUTH PAM support [enabled] Aug 26 13:28:11.407849: | libevent is using pluto's memory allocator Aug 26 13:28:11.407860: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Aug 26 13:28:11.407877: | libevent_malloc: new ptr-libevent@0x55728026aa08 size 40 Aug 26 13:28:11.407882: | libevent_malloc: new ptr-libevent@0x55728026c458 size 40 Aug 26 13:28:11.407886: | libevent_malloc: new ptr-libevent@0x55728026c3d8 size 40 Aug 26 13:28:11.407888: | creating event base Aug 26 13:28:11.407893: | libevent_malloc: new ptr-libevent@0x55728026b1d8 size 56 Aug 26 13:28:11.407897: | libevent_malloc: new ptr-libevent@0x5572801fd048 size 664 Aug 26 13:28:11.407909: | libevent_malloc: new ptr-libevent@0x55728029c5a8 size 24 Aug 26 13:28:11.407913: | libevent_malloc: new ptr-libevent@0x55728029c5f8 size 384 Aug 26 13:28:11.407923: | libevent_malloc: new ptr-libevent@0x55728029c568 size 16 Aug 26 13:28:11.407926: | libevent_malloc: new ptr-libevent@0x55728026c358 size 40 Aug 26 13:28:11.407929: | libevent_malloc: new ptr-libevent@0x55728026c2d8 size 48 Aug 26 13:28:11.407936: | libevent_realloc: new ptr-libevent@0x5572801fccd8 size 256 Aug 26 13:28:11.407939: | libevent_malloc: new ptr-libevent@0x55728029c7a8 size 16 Aug 26 13:28:11.407945: | libevent_free: release ptr-libevent@0x55728026b1d8 Aug 26 13:28:11.407949: | libevent initialized Aug 26 13:28:11.407953: | libevent_realloc: new ptr-libevent@0x55728026b1d8 size 64 Aug 26 13:28:11.407960: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Aug 26 13:28:11.407977: | init_nat_traversal() initialized with keep_alive=0s Aug 26 13:28:11.407981: NAT-Traversal support [enabled] Aug 26 13:28:11.407984: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Aug 26 13:28:11.407991: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Aug 26 13:28:11.407996: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Aug 26 13:28:11.408031: | global one-shot timer EVENT_REVIVE_CONNS initialized Aug 26 13:28:11.408037: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Aug 26 13:28:11.408041: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Aug 26 13:28:11.408094: Encryption algorithms: Aug 26 13:28:11.408100: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c Aug 26 13:28:11.408104: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b Aug 26 13:28:11.408107: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a Aug 26 13:28:11.408110: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des Aug 26 13:28:11.408114: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Aug 26 13:28:11.408123: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia Aug 26 13:28:11.408126: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c Aug 26 13:28:11.408129: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b Aug 26 13:28:11.408133: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a Aug 26 13:28:11.408136: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr Aug 26 13:28:11.408140: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes Aug 26 13:28:11.408143: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent Aug 26 13:28:11.408147: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish Aug 26 13:28:11.408150: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh Aug 26 13:28:11.408154: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac Aug 26 13:28:11.408157: NULL IKEv1: ESP IKEv2: ESP [] Aug 26 13:28:11.408161: CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Aug 26 13:28:11.408167: Hash algorithms: Aug 26 13:28:11.408170: MD5 IKEv1: IKE IKEv2: Aug 26 13:28:11.408173: SHA1 IKEv1: IKE IKEv2: FIPS sha Aug 26 13:28:11.408177: SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 Aug 26 13:28:11.408180: SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 Aug 26 13:28:11.408182: SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 Aug 26 13:28:11.408198: PRF algorithms: Aug 26 13:28:11.408201: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 Aug 26 13:28:11.408204: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 Aug 26 13:28:11.408207: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 Aug 26 13:28:11.408210: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 Aug 26 13:28:11.408213: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 Aug 26 13:28:11.408216: AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Aug 26 13:28:11.408241: Integrity algorithms: Aug 26 13:28:11.408244: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 Aug 26 13:28:11.408248: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 Aug 26 13:28:11.408251: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Aug 26 13:28:11.408255: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Aug 26 13:28:11.408259: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Aug 26 13:28:11.408262: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Aug 26 13:28:11.408266: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 Aug 26 13:28:11.408268: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Aug 26 13:28:11.408272: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Aug 26 13:28:11.408285: DH algorithms: Aug 26 13:28:11.408294: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 Aug 26 13:28:11.408300: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 Aug 26 13:28:11.408304: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 Aug 26 13:28:11.408310: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 Aug 26 13:28:11.408314: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 Aug 26 13:28:11.408317: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 Aug 26 13:28:11.408320: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 Aug 26 13:28:11.408324: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 Aug 26 13:28:11.408327: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 Aug 26 13:28:11.408331: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 Aug 26 13:28:11.408334: DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 Aug 26 13:28:11.408337: testing CAMELLIA_CBC: Aug 26 13:28:11.408341: Camellia: 16 bytes with 128-bit key Aug 26 13:28:11.408446: Camellia: 16 bytes with 128-bit key Aug 26 13:28:11.408467: Camellia: 16 bytes with 256-bit key Aug 26 13:28:11.408486: Camellia: 16 bytes with 256-bit key Aug 26 13:28:11.408503: testing AES_GCM_16: Aug 26 13:28:11.408507: empty string Aug 26 13:28:11.408552: one block Aug 26 13:28:11.408595: two blocks Aug 26 13:28:11.408625: two blocks with associated data Aug 26 13:28:11.408666: testing AES_CTR: Aug 26 13:28:11.408670: Encrypting 16 octets using AES-CTR with 128-bit key Aug 26 13:28:11.408713: Encrypting 32 octets using AES-CTR with 128-bit key Aug 26 13:28:11.408741: Encrypting 36 octets using AES-CTR with 128-bit key Aug 26 13:28:11.408760: Encrypting 16 octets using AES-CTR with 192-bit key Aug 26 13:28:11.408776: Encrypting 32 octets using AES-CTR with 192-bit key Aug 26 13:28:11.408794: Encrypting 36 octets using AES-CTR with 192-bit key Aug 26 13:28:11.408810: Encrypting 16 octets using AES-CTR with 256-bit key Aug 26 13:28:11.408840: Encrypting 32 octets using AES-CTR with 256-bit key Aug 26 13:28:11.408856: Encrypting 36 octets using AES-CTR with 256-bit key Aug 26 13:28:11.408873: testing AES_CBC: Aug 26 13:28:11.408874: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Aug 26 13:28:11.408891: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Aug 26 13:28:11.408908: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Aug 26 13:28:11.408927: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Aug 26 13:28:11.408949: testing AES_XCBC: Aug 26 13:28:11.408951: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input Aug 26 13:28:11.409024: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input Aug 26 13:28:11.409102: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input Aug 26 13:28:11.409191: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input Aug 26 13:28:11.409268: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input Aug 26 13:28:11.409366: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input Aug 26 13:28:11.409446: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input Aug 26 13:28:11.409611: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Aug 26 13:28:11.409687: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Aug 26 13:28:11.409800: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Aug 26 13:28:11.409958: testing HMAC_MD5: Aug 26 13:28:11.409962: RFC 2104: MD5_HMAC test 1 Aug 26 13:28:11.410091: RFC 2104: MD5_HMAC test 2 Aug 26 13:28:11.410244: RFC 2104: MD5_HMAC test 3 Aug 26 13:28:11.410399: 8 CPU cores online Aug 26 13:28:11.410405: starting up 7 crypto helpers Aug 26 13:28:11.410431: started thread for crypto helper 0 Aug 26 13:28:11.410457: | starting up helper thread 0 Aug 26 13:28:11.410472: | status value returned by setting the priority of this thread (crypto helper 0) 22 Aug 26 13:28:11.410475: | crypto helper 0 waiting (nothing to do) Aug 26 13:28:11.410513: started thread for crypto helper 1 Aug 26 13:28:11.410517: | starting up helper thread 1 Aug 26 13:28:11.410527: | status value returned by setting the priority of this thread (crypto helper 1) 22 Aug 26 13:28:11.410530: | crypto helper 1 waiting (nothing to do) Aug 26 13:28:11.410538: started thread for crypto helper 2 Aug 26 13:28:11.410544: | starting up helper thread 2 Aug 26 13:28:11.410553: started thread for crypto helper 3 Aug 26 13:28:11.410575: | status value returned by setting the priority of this thread (crypto helper 2) 22 Aug 26 13:28:11.410579: | starting up helper thread 3 Aug 26 13:28:11.410584: | crypto helper 2 waiting (nothing to do) Aug 26 13:28:11.410607: started thread for crypto helper 4 Aug 26 13:28:11.410599: | status value returned by setting the priority of this thread (crypto helper 3) 22 Aug 26 13:28:11.410622: | crypto helper 3 waiting (nothing to do) Aug 26 13:28:11.410625: started thread for crypto helper 5 Aug 26 13:28:11.410628: | starting up helper thread 5 Aug 26 13:28:11.410633: | starting up helper thread 4 Aug 26 13:28:11.410640: | status value returned by setting the priority of this thread (crypto helper 5) 22 Aug 26 13:28:11.410702: | status value returned by setting the priority of this thread (crypto helper 4) 22 Aug 26 13:28:11.410703: started thread for crypto helper 6 Aug 26 13:28:11.410703: | crypto helper 5 waiting (nothing to do) Aug 26 13:28:11.410708: | checking IKEv1 state table Aug 26 13:28:11.410710: | starting up helper thread 6 Aug 26 13:28:11.410720: | MAIN_R0: category: half-open IKE SA flags: 0: Aug 26 13:28:11.410717: | crypto helper 4 waiting (nothing to do) Aug 26 13:28:11.410725: | -> MAIN_R1 EVENT_SO_DISCARD Aug 26 13:28:11.410735: | MAIN_I1: category: half-open IKE SA flags: 0: Aug 26 13:28:11.410737: | -> MAIN_I2 EVENT_RETRANSMIT Aug 26 13:28:11.410739: | MAIN_R1: category: open IKE SA flags: 200: Aug 26 13:28:11.410741: | -> MAIN_R2 EVENT_RETRANSMIT Aug 26 13:28:11.410743: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:28:11.410744: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:28:11.410746: | MAIN_I2: category: open IKE SA flags: 0: Aug 26 13:28:11.410760: | -> MAIN_I3 EVENT_RETRANSMIT Aug 26 13:28:11.410761: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:28:11.410763: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:28:11.410764: | MAIN_R2: category: open IKE SA flags: 0: Aug 26 13:28:11.410766: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:28:11.410780: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:28:11.410782: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 13:28:11.410785: | MAIN_I3: category: open IKE SA flags: 0: Aug 26 13:28:11.410787: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:28:11.410790: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:28:11.410793: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 13:28:11.410796: | MAIN_R3: category: established IKE SA flags: 200: Aug 26 13:28:11.410798: | -> UNDEFINED EVENT_NULL Aug 26 13:28:11.410801: | MAIN_I4: category: established IKE SA flags: 0: Aug 26 13:28:11.410804: | -> UNDEFINED EVENT_NULL Aug 26 13:28:11.410718: | status value returned by setting the priority of this thread (crypto helper 6) 22 Aug 26 13:28:11.410807: | AGGR_R0: category: half-open IKE SA flags: 0: Aug 26 13:28:11.410811: | crypto helper 6 waiting (nothing to do) Aug 26 13:28:11.410814: | -> AGGR_R1 EVENT_SO_DISCARD Aug 26 13:28:11.410820: | AGGR_I1: category: half-open IKE SA flags: 0: Aug 26 13:28:11.410821: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 13:28:11.410823: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 13:28:11.410825: | AGGR_R1: category: open IKE SA flags: 200: Aug 26 13:28:11.410826: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 13:28:11.410828: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 13:28:11.410829: | AGGR_I2: category: established IKE SA flags: 200: Aug 26 13:28:11.410831: | -> UNDEFINED EVENT_NULL Aug 26 13:28:11.410832: | AGGR_R2: category: established IKE SA flags: 0: Aug 26 13:28:11.410834: | -> UNDEFINED EVENT_NULL Aug 26 13:28:11.410836: | QUICK_R0: category: established CHILD SA flags: 0: Aug 26 13:28:11.410837: | -> QUICK_R1 EVENT_RETRANSMIT Aug 26 13:28:11.410842: | QUICK_I1: category: established CHILD SA flags: 0: Aug 26 13:28:11.410844: | -> QUICK_I2 EVENT_SA_REPLACE Aug 26 13:28:11.410845: | QUICK_R1: category: established CHILD SA flags: 0: Aug 26 13:28:11.410847: | -> QUICK_R2 EVENT_SA_REPLACE Aug 26 13:28:11.410849: | QUICK_I2: category: established CHILD SA flags: 200: Aug 26 13:28:11.410850: | -> UNDEFINED EVENT_NULL Aug 26 13:28:11.410852: | QUICK_R2: category: established CHILD SA flags: 0: Aug 26 13:28:11.410853: | -> UNDEFINED EVENT_NULL Aug 26 13:28:11.410855: | INFO: category: informational flags: 0: Aug 26 13:28:11.410856: | -> UNDEFINED EVENT_NULL Aug 26 13:28:11.410858: | INFO_PROTECTED: category: informational flags: 0: Aug 26 13:28:11.410860: | -> UNDEFINED EVENT_NULL Aug 26 13:28:11.410861: | XAUTH_R0: category: established IKE SA flags: 0: Aug 26 13:28:11.410863: | -> XAUTH_R1 EVENT_NULL Aug 26 13:28:11.410864: | XAUTH_R1: category: established IKE SA flags: 0: Aug 26 13:28:11.410866: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:28:11.410868: | MODE_CFG_R0: category: informational flags: 0: Aug 26 13:28:11.410869: | -> MODE_CFG_R1 EVENT_SA_REPLACE Aug 26 13:28:11.410871: | MODE_CFG_R1: category: established IKE SA flags: 0: Aug 26 13:28:11.410872: | -> MODE_CFG_R2 EVENT_SA_REPLACE Aug 26 13:28:11.410874: | MODE_CFG_R2: category: established IKE SA flags: 0: Aug 26 13:28:11.410876: | -> UNDEFINED EVENT_NULL Aug 26 13:28:11.410877: | MODE_CFG_I1: category: established IKE SA flags: 0: Aug 26 13:28:11.410879: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:28:11.410881: | XAUTH_I0: category: established IKE SA flags: 0: Aug 26 13:28:11.410882: | -> XAUTH_I1 EVENT_RETRANSMIT Aug 26 13:28:11.410884: | XAUTH_I1: category: established IKE SA flags: 0: Aug 26 13:28:11.410885: | -> MAIN_I4 EVENT_RETRANSMIT Aug 26 13:28:11.410891: | checking IKEv2 state table Aug 26 13:28:11.410895: | PARENT_I0: category: ignore flags: 0: Aug 26 13:28:11.410897: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Aug 26 13:28:11.410899: | PARENT_I1: category: half-open IKE SA flags: 0: Aug 26 13:28:11.410901: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) Aug 26 13:28:11.410903: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) Aug 26 13:28:11.410918: | PARENT_I2: category: open IKE SA flags: 0: Aug 26 13:28:11.410919: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Aug 26 13:28:11.410921: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Aug 26 13:28:11.410923: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Aug 26 13:28:11.410925: | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Aug 26 13:28:11.410926: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Aug 26 13:28:11.410928: | PARENT_I3: category: established IKE SA flags: 0: Aug 26 13:28:11.410930: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) Aug 26 13:28:11.410931: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) Aug 26 13:28:11.410933: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) Aug 26 13:28:11.410935: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) Aug 26 13:28:11.410936: | PARENT_R0: category: half-open IKE SA flags: 0: Aug 26 13:28:11.410938: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) Aug 26 13:28:11.410940: | PARENT_R1: category: half-open IKE SA flags: 0: Aug 26 13:28:11.410941: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) Aug 26 13:28:11.410943: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) Aug 26 13:28:11.410945: | PARENT_R2: category: established IKE SA flags: 0: Aug 26 13:28:11.410947: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) Aug 26 13:28:11.410950: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) Aug 26 13:28:11.410951: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) Aug 26 13:28:11.410953: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) Aug 26 13:28:11.410955: | V2_CREATE_I0: category: established IKE SA flags: 0: Aug 26 13:28:11.410956: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Aug 26 13:28:11.410958: | V2_CREATE_I: category: established IKE SA flags: 0: Aug 26 13:28:11.410960: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Aug 26 13:28:11.410962: | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: Aug 26 13:28:11.410963: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Aug 26 13:28:11.410965: | V2_REKEY_IKE_I: category: established IKE SA flags: 0: Aug 26 13:28:11.410967: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Aug 26 13:28:11.410969: | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: Aug 26 13:28:11.410970: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Aug 26 13:28:11.410972: | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: Aug 26 13:28:11.410974: | V2_CREATE_R: category: established IKE SA flags: 0: Aug 26 13:28:11.410976: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) Aug 26 13:28:11.410977: | V2_REKEY_IKE_R: category: established IKE SA flags: 0: Aug 26 13:28:11.410979: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) Aug 26 13:28:11.410981: | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: Aug 26 13:28:11.410983: | V2_IPSEC_I: category: established CHILD SA flags: 0: Aug 26 13:28:11.410984: | V2_IPSEC_R: category: established CHILD SA flags: 0: Aug 26 13:28:11.410986: | IKESA_DEL: category: established IKE SA flags: 0: Aug 26 13:28:11.410988: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Aug 26 13:28:11.410991: | CHILDSA_DEL: category: informational flags: 0: Aug 26 13:28:11.411003: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 Aug 26 13:28:11.411413: | Hard-wiring algorithms Aug 26 13:28:11.411424: | adding AES_CCM_16 to kernel algorithm db Aug 26 13:28:11.411429: | adding AES_CCM_12 to kernel algorithm db Aug 26 13:28:11.411432: | adding AES_CCM_8 to kernel algorithm db Aug 26 13:28:11.411433: | adding 3DES_CBC to kernel algorithm db Aug 26 13:28:11.411435: | adding CAMELLIA_CBC to kernel algorithm db Aug 26 13:28:11.411437: | adding AES_GCM_16 to kernel algorithm db Aug 26 13:28:11.411438: | adding AES_GCM_12 to kernel algorithm db Aug 26 13:28:11.411440: | adding AES_GCM_8 to kernel algorithm db Aug 26 13:28:11.411442: | adding AES_CTR to kernel algorithm db Aug 26 13:28:11.411443: | adding AES_CBC to kernel algorithm db Aug 26 13:28:11.411445: | adding SERPENT_CBC to kernel algorithm db Aug 26 13:28:11.411447: | adding TWOFISH_CBC to kernel algorithm db Aug 26 13:28:11.411449: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Aug 26 13:28:11.411450: | adding NULL to kernel algorithm db Aug 26 13:28:11.411452: | adding CHACHA20_POLY1305 to kernel algorithm db Aug 26 13:28:11.411454: | adding HMAC_MD5_96 to kernel algorithm db Aug 26 13:28:11.411455: | adding HMAC_SHA1_96 to kernel algorithm db Aug 26 13:28:11.411457: | adding HMAC_SHA2_512_256 to kernel algorithm db Aug 26 13:28:11.411459: | adding HMAC_SHA2_384_192 to kernel algorithm db Aug 26 13:28:11.411460: | adding HMAC_SHA2_256_128 to kernel algorithm db Aug 26 13:28:11.411462: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Aug 26 13:28:11.411463: | adding AES_XCBC_96 to kernel algorithm db Aug 26 13:28:11.411465: | adding AES_CMAC_96 to kernel algorithm db Aug 26 13:28:11.411467: | adding NONE to kernel algorithm db Aug 26 13:28:11.411488: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Aug 26 13:28:11.411493: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Aug 26 13:28:11.411495: | setup kernel fd callback Aug 26 13:28:11.411498: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x55728029bfc8 Aug 26 13:28:11.411500: | libevent_malloc: new ptr-libevent@0x55728029a7d8 size 128 Aug 26 13:28:11.411503: | libevent_malloc: new ptr-libevent@0x5572802a19c8 size 16 Aug 26 13:28:11.411508: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x5572802a1d38 Aug 26 13:28:11.411509: | libevent_malloc: new ptr-libevent@0x5572802700f8 size 128 Aug 26 13:28:11.411511: | libevent_malloc: new ptr-libevent@0x5572802a22e8 size 16 Aug 26 13:28:11.411664: | global one-shot timer EVENT_CHECK_CRLS initialized Aug 26 13:28:11.411671: selinux support is enabled. Aug 26 13:28:11.412178: | unbound context created - setting debug level to 5 Aug 26 13:28:11.412281: | /etc/hosts lookups activated Aug 26 13:28:11.412311: | /etc/resolv.conf usage activated Aug 26 13:28:11.412391: | outgoing-port-avoid set 0-65535 Aug 26 13:28:11.412436: | outgoing-port-permit set 32768-60999 Aug 26 13:28:11.412439: | Loading dnssec root key from:/var/lib/unbound/root.key Aug 26 13:28:11.412458: | Added contents of trusted key file /testing/baseconfigs/all/etc/bind/keys/testing.key to unbound resolver context Aug 26 13:28:11.412462: | Setting up events, loop start Aug 26 13:28:11.412466: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x5572802a21d8 Aug 26 13:28:11.412470: | libevent_malloc: new ptr-libevent@0x5572802ae138 size 128 Aug 26 13:28:11.412474: | libevent_malloc: new ptr-libevent@0x5572802b9448 size 16 Aug 26 13:28:11.412483: | libevent_realloc: new ptr-libevent@0x5572802b94e8 size 256 Aug 26 13:28:11.412499: | libevent_malloc: new ptr-libevent@0x5572802b9618 size 8 Aug 26 13:28:11.412503: | libevent_realloc: new ptr-libevent@0x5572802b9658 size 144 Aug 26 13:28:11.412507: | libevent_malloc: new ptr-libevent@0x5572801fda28 size 152 Aug 26 13:28:11.412512: | libevent_malloc: new ptr-libevent@0x5572802b9718 size 16 Aug 26 13:28:11.412516: | signal event handler PLUTO_SIGCHLD installed Aug 26 13:28:11.412519: | libevent_malloc: new ptr-libevent@0x5572802b9758 size 8 Aug 26 13:28:11.412522: | libevent_malloc: new ptr-libevent@0x5572802b9798 size 152 Aug 26 13:28:11.412525: | signal event handler PLUTO_SIGTERM installed Aug 26 13:28:11.412528: | libevent_malloc: new ptr-libevent@0x5572802b9868 size 8 Aug 26 13:28:11.412531: | libevent_malloc: new ptr-libevent@0x5572802b98a8 size 152 Aug 26 13:28:11.412534: | signal event handler PLUTO_SIGHUP installed Aug 26 13:28:11.412536: | libevent_malloc: new ptr-libevent@0x5572802b9978 size 8 Aug 26 13:28:11.412539: | libevent_realloc: release ptr-libevent@0x5572802b9658 Aug 26 13:28:11.412543: | libevent_realloc: new ptr-libevent@0x5572802b99b8 size 256 Aug 26 13:28:11.412545: | libevent_malloc: new ptr-libevent@0x5572802b9ae8 size 152 Aug 26 13:28:11.412547: | signal event handler PLUTO_SIGSYS installed Aug 26 13:28:11.412813: | created addconn helper (pid:14602) using fork+execve Aug 26 13:28:11.412825: | forked child 14602 Aug 26 13:28:11.412866: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:11.412878: listening for IKE messages Aug 26 13:28:11.413343: | Inspecting interface lo Aug 26 13:28:11.413356: | found lo with address 127.0.0.1 Aug 26 13:28:11.413361: | Inspecting interface eth0 Aug 26 13:28:11.413365: | found eth0 with address 192.1.3.209 Aug 26 13:28:11.413424: Kernel supports NIC esp-hw-offload Aug 26 13:28:11.413440: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.209:500 Aug 26 13:28:11.413494: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 13:28:11.413500: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 13:28:11.413505: adding interface eth0/eth0 192.1.3.209:4500 Aug 26 13:28:11.413532: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 Aug 26 13:28:11.413560: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 13:28:11.413565: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 13:28:11.413569: adding interface lo/lo 127.0.0.1:4500 Aug 26 13:28:11.413653: | no interfaces to sort Aug 26 13:28:11.413658: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 13:28:11.413668: | add_fd_read_event_handler: new ethX-pe@0x5572802b9e58 Aug 26 13:28:11.413672: | libevent_malloc: new ptr-libevent@0x5572802ae088 size 128 Aug 26 13:28:11.413676: | libevent_malloc: new ptr-libevent@0x5572802b9ec8 size 16 Aug 26 13:28:11.413685: | setup callback for interface lo 127.0.0.1:4500 fd 20 Aug 26 13:28:11.413688: | add_fd_read_event_handler: new ethX-pe@0x5572802b9f08 Aug 26 13:28:11.413692: | libevent_malloc: new ptr-libevent@0x5572802701a8 size 128 Aug 26 13:28:11.413695: | libevent_malloc: new ptr-libevent@0x5572802b9f78 size 16 Aug 26 13:28:11.413700: | setup callback for interface lo 127.0.0.1:500 fd 19 Aug 26 13:28:11.413704: | add_fd_read_event_handler: new ethX-pe@0x5572802b9fb8 Aug 26 13:28:11.413708: | libevent_malloc: new ptr-libevent@0x5572802713d8 size 128 Aug 26 13:28:11.413710: | libevent_malloc: new ptr-libevent@0x5572802ba028 size 16 Aug 26 13:28:11.413716: | setup callback for interface eth0 192.1.3.209:4500 fd 18 Aug 26 13:28:11.413718: | add_fd_read_event_handler: new ethX-pe@0x5572802ba068 Aug 26 13:28:11.413722: | libevent_malloc: new ptr-libevent@0x55728026add8 size 128 Aug 26 13:28:11.413725: | libevent_malloc: new ptr-libevent@0x5572802ba0d8 size 16 Aug 26 13:28:11.413730: | setup callback for interface eth0 192.1.3.209:500 fd 17 Aug 26 13:28:11.413735: | certs and keys locked by 'free_preshared_secrets' Aug 26 13:28:11.413751: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 13:28:11.413767: loading secrets from "/etc/ipsec.secrets" Aug 26 13:28:11.413804: | saving Modulus Aug 26 13:28:11.413809: | saving PublicExponent Aug 26 13:28:11.413861: | computed rsa CKAID 1a 15 cc e8 92 73 43 9c 2b f4 20 2a c1 06 6e f2 Aug 26 13:28:11.413865: | computed rsa CKAID 59 b0 ef 45 Aug 26 13:28:11.413869: loaded private key for keyid: PKK_RSA:AQPHFfpyJ Aug 26 13:28:11.413876: | certs and keys locked by 'process_secret' Aug 26 13:28:11.413893: | certs and keys unlocked by 'process_secret' Aug 26 13:28:11.413904: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:11.413913: | spent 1.05 milliseconds in whack Aug 26 13:28:11.428952: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:11.428976: listening for IKE messages Aug 26 13:28:11.429004: | Inspecting interface lo Aug 26 13:28:11.429009: | found lo with address 127.0.0.1 Aug 26 13:28:11.429025: | Inspecting interface eth0 Aug 26 13:28:11.429028: | found eth0 with address 192.1.3.209 Aug 26 13:28:11.429086: | no interfaces to sort Aug 26 13:28:11.429092: | libevent_free: release ptr-libevent@0x5572802ae088 Aug 26 13:28:11.429095: | free_event_entry: release EVENT_NULL-pe@0x5572802b9e58 Aug 26 13:28:11.429097: | add_fd_read_event_handler: new ethX-pe@0x5572802b9e58 Aug 26 13:28:11.429099: | libevent_malloc: new ptr-libevent@0x5572802ae088 size 128 Aug 26 13:28:11.429105: | setup callback for interface lo 127.0.0.1:4500 fd 20 Aug 26 13:28:11.429107: | libevent_free: release ptr-libevent@0x5572802701a8 Aug 26 13:28:11.429109: | free_event_entry: release EVENT_NULL-pe@0x5572802b9f08 Aug 26 13:28:11.429111: | add_fd_read_event_handler: new ethX-pe@0x5572802b9f08 Aug 26 13:28:11.429113: | libevent_malloc: new ptr-libevent@0x5572802701a8 size 128 Aug 26 13:28:11.429116: | setup callback for interface lo 127.0.0.1:500 fd 19 Aug 26 13:28:11.429118: | libevent_free: release ptr-libevent@0x5572802713d8 Aug 26 13:28:11.429120: | free_event_entry: release EVENT_NULL-pe@0x5572802b9fb8 Aug 26 13:28:11.429122: | add_fd_read_event_handler: new ethX-pe@0x5572802b9fb8 Aug 26 13:28:11.429123: | libevent_malloc: new ptr-libevent@0x5572802713d8 size 128 Aug 26 13:28:11.429131: | setup callback for interface eth0 192.1.3.209:4500 fd 18 Aug 26 13:28:11.429133: | libevent_free: release ptr-libevent@0x55728026add8 Aug 26 13:28:11.429135: | free_event_entry: release EVENT_NULL-pe@0x5572802ba068 Aug 26 13:28:11.429137: | add_fd_read_event_handler: new ethX-pe@0x5572802ba068 Aug 26 13:28:11.429138: | libevent_malloc: new ptr-libevent@0x55728026add8 size 128 Aug 26 13:28:11.429141: | setup callback for interface eth0 192.1.3.209:500 fd 17 Aug 26 13:28:11.429143: | certs and keys locked by 'free_preshared_secrets' Aug 26 13:28:11.429145: forgetting secrets Aug 26 13:28:11.429152: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 13:28:11.429162: loading secrets from "/etc/ipsec.secrets" Aug 26 13:28:11.429174: | saving Modulus Aug 26 13:28:11.429176: | saving PublicExponent Aug 26 13:28:11.429195: | computed rsa CKAID 1a 15 cc e8 92 73 43 9c 2b f4 20 2a c1 06 6e f2 Aug 26 13:28:11.429197: | computed rsa CKAID 59 b0 ef 45 Aug 26 13:28:11.429200: loaded private key for keyid: PKK_RSA:AQPHFfpyJ Aug 26 13:28:11.429204: | certs and keys locked by 'process_secret' Aug 26 13:28:11.429205: | certs and keys unlocked by 'process_secret' Aug 26 13:28:11.429212: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:11.429217: | spent 0.274 milliseconds in whack Aug 26 13:28:11.429572: | processing signal PLUTO_SIGCHLD Aug 26 13:28:11.429585: | waitpid returned pid 14602 (exited with status 0) Aug 26 13:28:11.429589: | reaped addconn helper child (status 0) Aug 26 13:28:11.429592: | waitpid returned ECHILD (no child processes left) Aug 26 13:28:11.429596: | spent 0.0132 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 13:28:11.497301: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:11.497329: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:28:11.497333: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 13:28:11.497336: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:28:11.497338: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 13:28:11.497342: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:28:11.497349: | Added new connection road-east-ikev2 with policy ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 13:28:11.497353: | No AUTH policy was set - defaulting to RSASIG Aug 26 13:28:11.497411: | ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 Aug 26 13:28:11.497416: | from whack: got --esp= Aug 26 13:28:11.497453: | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 Aug 26 13:28:11.497459: | counting wild cards for 192.1.3.209 is 0 Aug 26 13:28:11.497464: | counting wild cards for 192.1.2.23 is 0 Aug 26 13:28:11.497473: | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@(nil): none Aug 26 13:28:11.497476: | new hp@0x5572802bc738 Aug 26 13:28:11.497481: added connection description "road-east-ikev2" Aug 26 13:28:11.497491: | ike_life: 90s; ipsec_life: 300s; rekey_margin: 20s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 13:28:11.497498: | 192.1.3.209<192.1.3.209>...192.1.2.23<192.1.2.23> Aug 26 13:28:11.497505: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:11.497512: | spent 0.221 milliseconds in whack Aug 26 13:28:11.497546: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:11.497556: add keyid 192.1.3.209 Aug 26 13:28:11.497565: | add pubkey 01 03 c7 15 fa 72 27 70 a4 e1 f3 0a 70 21 f9 0c Aug 26 13:28:11.497568: | add pubkey 3f e2 65 12 87 d9 fd 12 cb af d4 e0 c2 e3 dd 77 Aug 26 13:28:11.497571: | add pubkey a0 ef aa c7 d6 a2 b2 30 f2 64 b0 c5 e6 c7 a7 27 Aug 26 13:28:11.497573: | add pubkey 17 54 7a 8e 32 c9 ac fd bf 8f b3 33 b9 74 74 73 Aug 26 13:28:11.497576: | add pubkey dd 23 83 11 53 d6 d4 91 0e 36 7e 67 fc 89 1e 48 Aug 26 13:28:11.497578: | add pubkey ac e9 da 2e 66 9d 6e 4f e2 98 a7 dc 41 b3 a4 37 Aug 26 13:28:11.497581: | add pubkey f5 07 a9 9c 23 69 83 54 87 7b ea 00 a7 5b ab 2d Aug 26 13:28:11.497583: | add pubkey 41 34 d1 a3 17 1e a7 64 2d 7f ff 45 7a 5d 85 5c Aug 26 13:28:11.497586: | add pubkey 73 dd 63 e7 40 ad eb 71 e6 5f 21 43 80 f5 23 4c Aug 26 13:28:11.497588: | add pubkey 3d 4a 11 2c ca 9a d6 79 c5 c2 51 6e af c3 6e 99 Aug 26 13:28:11.497591: | add pubkey f5 26 1c 67 ee 8a 3e 30 4b c1 93 a7 92 34 36 8c Aug 26 13:28:11.497593: | add pubkey bf e6 d0 d3 fe 78 0b 0a 64 04 44 ca 8c 83 fd f1 Aug 26 13:28:11.497596: | add pubkey 2e b5 00 76 61 a6 de f1 59 67 2b 6d c2 57 e0 f2 Aug 26 13:28:11.497598: | add pubkey 7d 6b 9f d3 46 41 8c 31 c2 fd c4 60 72 08 3b bb Aug 26 13:28:11.497601: | add pubkey 56 fb 01 fc 1d 57 4e cf 7c 0f c4 6f 72 6f 2a 0e Aug 26 13:28:11.497603: | add pubkey f3 30 db a0 80 f9 70 cc bb 07 a9 f9 d7 76 99 63 Aug 26 13:28:11.497606: | add pubkey 4b 6a 0f 1a 37 95 cb 9b ea 17 f7 55 62 6b 8a 83 Aug 26 13:28:11.497608: | add pubkey 05 ff 43 78 57 dd bd 08 85 9c f1 62 35 6e 69 c7 Aug 26 13:28:11.497611: | add pubkey 04 0b 4b c4 1b d2 38 89 8c de 56 d0 c8 2c 51 54 Aug 26 13:28:11.497613: | add pubkey 32 1b 7d 27 dc cd 37 7a 4e cb 1a ec d2 ce 48 ed Aug 26 13:28:11.497616: | add pubkey 43 48 9c 8a fc 30 9f b1 57 1c a9 98 e5 84 93 6c Aug 26 13:28:11.497618: | add pubkey da 4d cc 95 e3 f5 f2 a5 b3 9d 70 ae 24 8d 08 3b Aug 26 13:28:11.497621: | add pubkey 0f 8c e9 5a a5 f0 4d 9c 3c 2f 7f bc 10 95 34 1c Aug 26 13:28:11.497623: | add pubkey 96 74 29 fc ab fb 8f 4b 71 aa 0b 26 b5 f0 32 98 Aug 26 13:28:11.497626: | add pubkey 90 6a fd 31 f5 ab Aug 26 13:28:11.497647: | computed rsa CKAID 1a 15 cc e8 92 73 43 9c 2b f4 20 2a c1 06 6e f2 Aug 26 13:28:11.497649: | computed rsa CKAID 59 b0 ef 45 Aug 26 13:28:11.497660: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:11.497664: | spent 0.122 milliseconds in whack Aug 26 13:28:11.553600: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:11.553624: | old debugging base+cpu-usage + none Aug 26 13:28:11.553628: | base debugging = base+cpu-usage Aug 26 13:28:11.553630: | old impairing none + suppress-retransmits Aug 26 13:28:11.553632: | base impairing = suppress-retransmits Aug 26 13:28:11.553639: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:11.553646: | spent 0.0542 milliseconds in whack Aug 26 13:28:11.665745: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:11.666024: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:11.666031: | spent 0.294 milliseconds in whack Aug 26 13:28:11.879219: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:11.879256: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:11.879262: | spent 0.0511 milliseconds in whack Aug 26 13:28:11.940521: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:11.940544: | dup_any(fd@16) -> fd@21 (in whack_process() at rcv_whack.c:590) Aug 26 13:28:11.940548: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:28:11.940554: | start processing: connection "road-east-ikev2" (in initiate_a_connection() at initiate.c:186) Aug 26 13:28:11.940557: | connection 'road-east-ikev2' +POLICY_UP Aug 26 13:28:11.940560: | dup_any(fd@21) -> fd@22 (in initiate_a_connection() at initiate.c:342) Aug 26 13:28:11.940567: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:28:11.940588: | creating state object #1 at 0x5572802bcc68 Aug 26 13:28:11.940591: | State DB: adding IKEv2 state #1 in UNDEFINED Aug 26 13:28:11.940600: | pstats #1 ikev2.ike started Aug 26 13:28:11.940604: | Message ID: init #1: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 Aug 26 13:28:11.940607: | parent state #1: UNDEFINED(ignore) => PARENT_I0(ignore) Aug 26 13:28:11.940613: | Message ID: init_ike #1; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 Aug 26 13:28:11.940620: | suspend processing: connection "road-east-ikev2" (in ikev2_parent_outI1() at ikev2_parent.c:535) Aug 26 13:28:11.940627: | start processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) Aug 26 13:28:11.940631: | dup_any(fd@22) -> fd@23 (in ikev2_parent_outI1() at ikev2_parent.c:551) Aug 26 13:28:11.940636: | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-east-ikev2" IKE SA #1 "road-east-ikev2" Aug 26 13:28:11.940640: "road-east-ikev2" #1: initiating v2 parent SA Aug 26 13:28:11.940656: | "road-east-ikev2" #1 start IKEv2 DNS query -- 23.2.1.192.IN-ADDR.ARPA. IN IPSECKEY -- Aug 26 13:28:11.942680: | libevent_malloc: new ptr-libevent@0x55728056f238 size 16 Aug 26 13:28:11.942755: | constructing local IKE proposals for road-east-ikev2 (IKE SA initiator selecting KE) Aug 26 13:28:11.942763: | converting ike_info AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 13:28:11.942770: | ... ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:28:11.942772: | converting ike_info AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 13:28:11.942776: | ... ikev2_proposal: 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:28:11.942778: | converting ike_info AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 13:28:11.942782: | ... ikev2_proposal: 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:28:11.942785: | converting ike_info AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 13:28:11.942788: | ... ikev2_proposal: 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:28:11.942795: "road-east-ikev2": constructed local IKE proposals for road-east-ikev2 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:28:11.942805: | adding ikev2_outI1 KE work-order 1 for state #1 Aug 26 13:28:11.942808: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557280570ef8 Aug 26 13:28:11.942811: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Aug 26 13:28:11.942814: | libevent_malloc: new ptr-libevent@0x5572802bc978 size 128 Aug 26 13:28:11.942832: | #1 spent 2.19 milliseconds in ikev2_parent_outI1() Aug 26 13:28:11.942835: | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) Aug 26 13:28:11.942837: | crypto helper 0 resuming Aug 26 13:28:11.942854: | crypto helper 0 starting work-order 1 for state #1 Aug 26 13:28:11.942860: | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 1 Aug 26 13:28:11.942839: | RESET processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) Aug 26 13:28:11.942881: | RESET processing: connection "road-east-ikev2" (in ikev2_parent_outI1() at ikev2_parent.c:610) Aug 26 13:28:11.942885: | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) Aug 26 13:28:11.942888: | close_any(fd@21) (in initiate_connection() at initiate.c:372) Aug 26 13:28:11.942891: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:11.942895: | spent 2.3 milliseconds in whack Aug 26 13:28:11.943009: | libevent_malloc: new ptr-libevent@0x557280571198 size 16 Aug 26 13:28:11.943115: | libevent_malloc: new ptr-libevent@0x55728056f158 size 16 Aug 26 13:28:11.943383: | start processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in idr_ipseckey_fetch_continue() at ikev2_ipseckey.c:519) Aug 26 13:28:11.943394: | IKEv2 DNS query -- 23.2.1.192.IN-ADDR.ARPA. IN IPSECKEY -- returned SERVFAIL cache=no elapsed time 0.002721 Aug 26 13:28:11.943397: | DNSSEC=INSECURE MSG SIZE 52 bytes Aug 26 13:28:11.943399: "road-east-ikev2" #1: IKEv2 DNS query -- 23.2.1.192.IN-ADDR.ARPA. IN IPSECKEY -- returned SERVFAIL rr parse error SERVFAIL elapsed time 0.002721 Aug 26 13:28:11.943408: | RESET processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in idr_ipseckey_fetch_continue() at ikev2_ipseckey.c:541) Aug 26 13:28:11.943732: | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 1 time elapsed 0.000872 seconds Aug 26 13:28:11.943742: | (#1) spent 0.871 milliseconds in crypto helper computing work-order 1: ikev2_outI1 KE (pcr) Aug 26 13:28:11.943744: | crypto helper 0 sending results from work-order 1 for state #1 to event queue Aug 26 13:28:11.943747: | scheduling resume sending helper answer for #1 Aug 26 13:28:11.943749: | libevent_malloc: new ptr-libevent@0x7fdd18002888 size 128 Aug 26 13:28:11.943755: | crypto helper 0 waiting (nothing to do) Aug 26 13:28:11.943790: | processing resume sending helper answer for #1 Aug 26 13:28:11.943799: | start processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:28:11.943803: | crypto helper 0 replies to request ID 1 Aug 26 13:28:11.943805: | calling continuation function 0x55727eafeb50 Aug 26 13:28:11.943807: | ikev2_parent_outI1_continue for #1 Aug 26 13:28:11.943833: | **emit ISAKMP Message: Aug 26 13:28:11.943835: | initiator cookie: Aug 26 13:28:11.943837: | ec e3 a0 47 70 a7 9c 09 Aug 26 13:28:11.943839: | responder cookie: Aug 26 13:28:11.943840: | 00 00 00 00 00 00 00 00 Aug 26 13:28:11.943842: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:28:11.943844: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:28:11.943846: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Aug 26 13:28:11.943848: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Aug 26 13:28:11.943850: | Message ID: 0 (0x0) Aug 26 13:28:11.943852: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:28:11.943863: | using existing local IKE proposals for connection road-east-ikev2 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:28:11.943868: | Emitting ikev2_proposals ... Aug 26 13:28:11.943870: | ***emit IKEv2 Security Association Payload: Aug 26 13:28:11.943873: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:11.943874: | flags: none (0x0) Aug 26 13:28:11.943877: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Aug 26 13:28:11.943879: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:28:11.943881: | discarding INTEG=NONE Aug 26 13:28:11.943883: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 13:28:11.943884: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:11.943886: | prop #: 1 (0x1) Aug 26 13:28:11.943888: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:28:11.943889: | spi size: 0 (0x0) Aug 26 13:28:11.943891: | # transforms: 11 (0xb) Aug 26 13:28:11.943893: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:28:11.943895: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.943897: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.943898: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:11.943900: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 13:28:11.943902: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.943904: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 13:28:11.943906: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:11.943907: | length/value: 256 (0x100) Aug 26 13:28:11.943909: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:28:11.943911: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.943913: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.943914: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:11.943916: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:28:11.943918: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.943920: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.943922: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.943923: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.943925: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.943927: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:11.943928: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 13:28:11.943930: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.943932: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.943934: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.943935: | discarding INTEG=NONE Aug 26 13:28:11.943937: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.943938: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.943940: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.943942: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:28:11.943944: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.943945: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.943948: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.943950: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.943952: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.943953: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.943955: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 13:28:11.943957: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.943959: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.943960: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.943962: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.943963: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.943965: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.943967: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 13:28:11.943968: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.943970: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.943972: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.943974: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.943975: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.943977: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.943978: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 13:28:11.943980: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.943982: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.943984: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.943985: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.943987: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.943988: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.943990: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 13:28:11.943992: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.943994: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.943996: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.943997: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.943999: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944000: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944002: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 13:28:11.944004: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944006: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944007: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944009: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944010: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944012: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944014: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 13:28:11.944016: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944018: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944020: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944022: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944023: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:11.944025: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944027: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 13:28:11.944029: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944030: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944032: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944034: | emitting length of IKEv2 Proposal Substructure Payload: 100 Aug 26 13:28:11.944036: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:28:11.944037: | discarding INTEG=NONE Aug 26 13:28:11.944039: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 13:28:11.944041: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:11.944042: | prop #: 2 (0x2) Aug 26 13:28:11.944044: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:28:11.944045: | spi size: 0 (0x0) Aug 26 13:28:11.944047: | # transforms: 11 (0xb) Aug 26 13:28:11.944049: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:11.944051: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:28:11.944053: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944054: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944056: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:11.944057: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 13:28:11.944059: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944061: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 13:28:11.944063: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:11.944064: | length/value: 128 (0x80) Aug 26 13:28:11.944066: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:28:11.944068: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944069: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944071: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:11.944072: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:28:11.944074: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944076: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944078: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944079: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944081: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944083: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:11.944084: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 13:28:11.944086: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944088: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944091: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944092: | discarding INTEG=NONE Aug 26 13:28:11.944094: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944095: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944097: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944099: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:28:11.944101: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944102: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944104: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944106: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944107: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944109: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944110: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 13:28:11.944112: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944114: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944116: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944117: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944119: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944121: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944122: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 13:28:11.944124: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944126: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944128: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944129: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944131: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944132: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944134: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 13:28:11.944136: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944138: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944139: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944141: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944143: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944144: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944146: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 13:28:11.944148: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944149: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944151: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944153: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944154: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944156: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944158: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 13:28:11.944159: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944164: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944166: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944168: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944169: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944171: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944173: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 13:28:11.944174: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944176: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944178: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944180: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944181: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:11.944183: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944184: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 13:28:11.944186: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944188: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944190: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944192: | emitting length of IKEv2 Proposal Substructure Payload: 100 Aug 26 13:28:11.944193: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:28:11.944195: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 13:28:11.944197: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:11.944198: | prop #: 3 (0x3) Aug 26 13:28:11.944200: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:28:11.944201: | spi size: 0 (0x0) Aug 26 13:28:11.944203: | # transforms: 13 (0xd) Aug 26 13:28:11.944205: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:11.944207: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:28:11.944208: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944210: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944212: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:11.944213: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 13:28:11.944215: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944217: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 13:28:11.944219: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:11.944220: | length/value: 256 (0x100) Aug 26 13:28:11.944222: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:28:11.944223: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944225: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944227: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:11.944228: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:28:11.944230: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944232: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944234: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944236: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944238: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944239: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:11.944241: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 13:28:11.944243: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944245: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944246: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944248: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944249: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944251: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:28:11.944253: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 13:28:11.944255: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944257: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944258: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944260: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944261: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944263: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:28:11.944265: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 13:28:11.944266: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944268: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944270: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944272: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944273: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944275: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944276: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:28:11.944278: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944280: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944282: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944283: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944285: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944286: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944296: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 13:28:11.944302: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944304: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944306: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944307: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944309: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944310: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944312: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 13:28:11.944314: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944316: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944318: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944320: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944322: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944323: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944325: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 13:28:11.944327: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944328: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944330: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944332: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944333: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944335: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944336: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 13:28:11.944338: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944340: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944342: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944343: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944345: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944346: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944348: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 13:28:11.944350: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944352: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944353: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944355: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944356: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944358: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944360: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 13:28:11.944361: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944363: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944365: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944366: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944368: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:11.944370: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944371: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 13:28:11.944373: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944375: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944377: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944378: | emitting length of IKEv2 Proposal Substructure Payload: 116 Aug 26 13:28:11.944380: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:28:11.944382: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 13:28:11.944383: | last proposal: v2_PROPOSAL_LAST (0x0) Aug 26 13:28:11.944386: | prop #: 4 (0x4) Aug 26 13:28:11.944388: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:28:11.944389: | spi size: 0 (0x0) Aug 26 13:28:11.944391: | # transforms: 13 (0xd) Aug 26 13:28:11.944393: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:11.944395: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:28:11.944396: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944398: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944399: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:11.944401: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 13:28:11.944427: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944430: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 13:28:11.944431: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:11.944433: | length/value: 128 (0x80) Aug 26 13:28:11.944435: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:28:11.944436: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944438: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944440: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:11.944441: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:28:11.944443: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944445: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944447: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944448: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944450: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944451: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:11.944453: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 13:28:11.944455: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944457: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944458: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944460: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944462: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944463: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:28:11.944465: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 13:28:11.944467: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944468: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944470: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944472: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944473: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944475: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:28:11.944476: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 13:28:11.944478: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944480: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944482: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944484: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944486: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944488: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944489: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:28:11.944491: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944493: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944495: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944496: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944498: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944499: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944501: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 13:28:11.944503: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944505: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944506: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944508: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944510: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944511: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944513: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 13:28:11.944515: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944516: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944518: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944520: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944521: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944523: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944524: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 13:28:11.944526: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944528: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944530: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944531: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944533: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944534: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944536: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 13:28:11.944538: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944540: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944541: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944543: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944545: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944546: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944548: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 13:28:11.944550: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944552: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944554: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944556: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944557: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944559: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944560: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 13:28:11.944562: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944564: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944566: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944567: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.944569: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:11.944571: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.944572: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 13:28:11.944574: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.944576: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.944578: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.944579: | emitting length of IKEv2 Proposal Substructure Payload: 116 Aug 26 13:28:11.944581: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:28:11.944583: | emitting length of IKEv2 Security Association Payload: 436 Aug 26 13:28:11.944584: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Aug 26 13:28:11.944586: | ***emit IKEv2 Key Exchange Payload: Aug 26 13:28:11.944588: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:11.944590: | flags: none (0x0) Aug 26 13:28:11.944591: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:28:11.944593: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) Aug 26 13:28:11.944595: | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' Aug 26 13:28:11.944598: | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload Aug 26 13:28:11.944600: | ikev2 g^x 30 27 84 a1 7d 5d 81 7e fc 72 d4 51 77 6c df 78 Aug 26 13:28:11.944601: | ikev2 g^x 2f bb 2f 20 df 04 18 3e 06 87 88 40 39 fc f9 d1 Aug 26 13:28:11.944603: | ikev2 g^x 89 dc 51 14 2a 96 6e ce 16 2b ce 1d a7 6d b0 22 Aug 26 13:28:11.944604: | ikev2 g^x b6 9d 5c 37 df f5 b4 2b f9 28 35 83 a1 6b cd 59 Aug 26 13:28:11.944606: | ikev2 g^x ba 2e 1f 80 cb 5b 3f bd 49 1c 27 d2 97 3c 9f 15 Aug 26 13:28:11.944608: | ikev2 g^x bc 1e 67 6c 7f e0 8f 1d 1b bd df e8 c4 68 d1 d7 Aug 26 13:28:11.944609: | ikev2 g^x 45 81 bd 2f 95 f9 44 5e 72 c0 13 4a 60 77 ff 78 Aug 26 13:28:11.944611: | ikev2 g^x 97 13 95 fb 20 12 a5 88 0f 7b 92 8f 6d dc ec be Aug 26 13:28:11.944612: | ikev2 g^x 8e 0d 07 f5 e3 83 97 56 0d eb 8c 76 aa 12 ef 83 Aug 26 13:28:11.944614: | ikev2 g^x b5 7c 98 88 78 db b5 cd 1c d2 ca bb e8 f0 c7 11 Aug 26 13:28:11.944615: | ikev2 g^x 22 95 7e f1 f0 b7 1d 3f 1d ac 27 ce 83 b4 d6 90 Aug 26 13:28:11.944617: | ikev2 g^x ed 70 ad 84 99 be f1 10 97 ec c9 d1 5b 48 bb bc Aug 26 13:28:11.944618: | ikev2 g^x 9a 60 f0 6d fe 89 d1 67 e6 69 b8 97 92 d4 4c 40 Aug 26 13:28:11.944620: | ikev2 g^x 04 b9 f5 be f5 48 f3 74 c6 23 fd 14 0d 3a 3d e5 Aug 26 13:28:11.944621: | ikev2 g^x 1a 5e 60 2c 01 a2 63 5f cc 0b 3d 93 0d 07 9d 48 Aug 26 13:28:11.944624: | ikev2 g^x 06 b6 f9 a3 c5 58 c5 00 88 88 3c 20 4e 16 60 ef Aug 26 13:28:11.944626: | emitting length of IKEv2 Key Exchange Payload: 264 Aug 26 13:28:11.944627: | ***emit IKEv2 Nonce Payload: Aug 26 13:28:11.944629: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:28:11.944631: | flags: none (0x0) Aug 26 13:28:11.944632: | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N Aug 26 13:28:11.944635: | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) Aug 26 13:28:11.944636: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' Aug 26 13:28:11.944638: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Aug 26 13:28:11.944640: | IKEv2 nonce 76 bd 58 06 31 ca 10 95 24 08 9a ab b4 93 8a 39 Aug 26 13:28:11.944642: | IKEv2 nonce 59 2a 48 9e b0 ee 85 8a fa 6d e1 d3 2b 5c 43 d3 Aug 26 13:28:11.944643: | emitting length of IKEv2 Nonce Payload: 36 Aug 26 13:28:11.944645: | Adding a v2N Payload Aug 26 13:28:11.944647: | ***emit IKEv2 Notify Payload: Aug 26 13:28:11.944649: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:11.944650: | flags: none (0x0) Aug 26 13:28:11.944652: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:28:11.944654: | SPI size: 0 (0x0) Aug 26 13:28:11.944656: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Aug 26 13:28:11.944658: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 13:28:11.944659: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 13:28:11.944661: | emitting length of IKEv2 Notify Payload: 8 Aug 26 13:28:11.944663: | NAT-Traversal support [enabled] add v2N payloads. Aug 26 13:28:11.944665: | natd_hash: rcookie is zero Aug 26 13:28:11.944676: | natd_hash: hasher=0x55727ebd3800(20) Aug 26 13:28:11.944678: | natd_hash: icookie= ec e3 a0 47 70 a7 9c 09 Aug 26 13:28:11.944679: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Aug 26 13:28:11.944681: | natd_hash: ip= c0 01 03 d1 Aug 26 13:28:11.944682: | natd_hash: port=500 Aug 26 13:28:11.944684: | natd_hash: hash= b9 48 5c 6f 16 da 49 ef 04 85 27 57 cc e0 62 9c Aug 26 13:28:11.944685: | natd_hash: hash= 34 28 18 b3 Aug 26 13:28:11.944687: | Adding a v2N Payload Aug 26 13:28:11.944689: | ***emit IKEv2 Notify Payload: Aug 26 13:28:11.944690: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:11.944692: | flags: none (0x0) Aug 26 13:28:11.944693: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:28:11.944695: | SPI size: 0 (0x0) Aug 26 13:28:11.944697: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Aug 26 13:28:11.944699: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 13:28:11.944700: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 13:28:11.944702: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Aug 26 13:28:11.944704: | Notify data b9 48 5c 6f 16 da 49 ef 04 85 27 57 cc e0 62 9c Aug 26 13:28:11.944706: | Notify data 34 28 18 b3 Aug 26 13:28:11.944707: | emitting length of IKEv2 Notify Payload: 28 Aug 26 13:28:11.944709: | natd_hash: rcookie is zero Aug 26 13:28:11.944713: | natd_hash: hasher=0x55727ebd3800(20) Aug 26 13:28:11.944714: | natd_hash: icookie= ec e3 a0 47 70 a7 9c 09 Aug 26 13:28:11.944716: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Aug 26 13:28:11.944717: | natd_hash: ip= c0 01 02 17 Aug 26 13:28:11.944719: | natd_hash: port=500 Aug 26 13:28:11.944721: | natd_hash: hash= 20 9d cc 51 56 e0 9d 45 69 c2 ce 75 81 81 c0 64 Aug 26 13:28:11.944722: | natd_hash: hash= 2e 28 82 27 Aug 26 13:28:11.944724: | Adding a v2N Payload Aug 26 13:28:11.944725: | ***emit IKEv2 Notify Payload: Aug 26 13:28:11.944728: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:11.944729: | flags: none (0x0) Aug 26 13:28:11.944731: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:28:11.944732: | SPI size: 0 (0x0) Aug 26 13:28:11.944734: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Aug 26 13:28:11.944736: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 13:28:11.944738: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 13:28:11.944740: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Aug 26 13:28:11.944741: | Notify data 20 9d cc 51 56 e0 9d 45 69 c2 ce 75 81 81 c0 64 Aug 26 13:28:11.944743: | Notify data 2e 28 82 27 Aug 26 13:28:11.944744: | emitting length of IKEv2 Notify Payload: 28 Aug 26 13:28:11.944746: | emitting length of ISAKMP Message: 828 Aug 26 13:28:11.944751: | stop processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) Aug 26 13:28:11.944758: | start processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 13:28:11.944761: | #1 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK Aug 26 13:28:11.944763: | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 Aug 26 13:28:11.944766: | parent state #1: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) Aug 26 13:28:11.944768: | Message ID: updating counters for #1 to 4294967295 after switching state Aug 26 13:28:11.944770: | Message ID: IKE #1 skipping update_recv as MD is fake Aug 26 13:28:11.944773: | Message ID: sent #1 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 Aug 26 13:28:11.944775: "road-east-ikev2" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 Aug 26 13:28:11.944786: | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) Aug 26 13:28:11.944790: | sending 828 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) Aug 26 13:28:11.944792: | ec e3 a0 47 70 a7 9c 09 00 00 00 00 00 00 00 00 Aug 26 13:28:11.944794: | 21 20 22 08 00 00 00 00 00 00 03 3c 22 00 01 b4 Aug 26 13:28:11.944795: | 02 00 00 64 01 01 00 0b 03 00 00 0c 01 00 00 14 Aug 26 13:28:11.944797: | 80 0e 01 00 03 00 00 08 02 00 00 07 03 00 00 08 Aug 26 13:28:11.944798: | 02 00 00 05 03 00 00 08 04 00 00 0e 03 00 00 08 Aug 26 13:28:11.944800: | 04 00 00 0f 03 00 00 08 04 00 00 10 03 00 00 08 Aug 26 13:28:11.944801: | 04 00 00 12 03 00 00 08 04 00 00 13 03 00 00 08 Aug 26 13:28:11.944803: | 04 00 00 14 03 00 00 08 04 00 00 15 00 00 00 08 Aug 26 13:28:11.944804: | 04 00 00 1f 02 00 00 64 02 01 00 0b 03 00 00 0c Aug 26 13:28:11.944806: | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 Aug 26 13:28:11.944808: | 03 00 00 08 02 00 00 05 03 00 00 08 04 00 00 0e Aug 26 13:28:11.944809: | 03 00 00 08 04 00 00 0f 03 00 00 08 04 00 00 10 Aug 26 13:28:11.944811: | 03 00 00 08 04 00 00 12 03 00 00 08 04 00 00 13 Aug 26 13:28:11.944812: | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 15 Aug 26 13:28:11.944814: | 00 00 00 08 04 00 00 1f 02 00 00 74 03 01 00 0d Aug 26 13:28:11.944815: | 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 Aug 26 13:28:11.944817: | 02 00 00 07 03 00 00 08 02 00 00 05 03 00 00 08 Aug 26 13:28:11.944818: | 03 00 00 0e 03 00 00 08 03 00 00 0c 03 00 00 08 Aug 26 13:28:11.944820: | 04 00 00 0e 03 00 00 08 04 00 00 0f 03 00 00 08 Aug 26 13:28:11.944821: | 04 00 00 10 03 00 00 08 04 00 00 12 03 00 00 08 Aug 26 13:28:11.944823: | 04 00 00 13 03 00 00 08 04 00 00 14 03 00 00 08 Aug 26 13:28:11.944824: | 04 00 00 15 00 00 00 08 04 00 00 1f 00 00 00 74 Aug 26 13:28:11.944826: | 04 01 00 0d 03 00 00 0c 01 00 00 0c 80 0e 00 80 Aug 26 13:28:11.944827: | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 05 Aug 26 13:28:11.944830: | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c Aug 26 13:28:11.944832: | 03 00 00 08 04 00 00 0e 03 00 00 08 04 00 00 0f Aug 26 13:28:11.944833: | 03 00 00 08 04 00 00 10 03 00 00 08 04 00 00 12 Aug 26 13:28:11.944835: | 03 00 00 08 04 00 00 13 03 00 00 08 04 00 00 14 Aug 26 13:28:11.944836: | 03 00 00 08 04 00 00 15 00 00 00 08 04 00 00 1f Aug 26 13:28:11.944838: | 28 00 01 08 00 0e 00 00 30 27 84 a1 7d 5d 81 7e Aug 26 13:28:11.944839: | fc 72 d4 51 77 6c df 78 2f bb 2f 20 df 04 18 3e Aug 26 13:28:11.944841: | 06 87 88 40 39 fc f9 d1 89 dc 51 14 2a 96 6e ce Aug 26 13:28:11.944842: | 16 2b ce 1d a7 6d b0 22 b6 9d 5c 37 df f5 b4 2b Aug 26 13:28:11.944844: | f9 28 35 83 a1 6b cd 59 ba 2e 1f 80 cb 5b 3f bd Aug 26 13:28:11.944845: | 49 1c 27 d2 97 3c 9f 15 bc 1e 67 6c 7f e0 8f 1d Aug 26 13:28:11.944847: | 1b bd df e8 c4 68 d1 d7 45 81 bd 2f 95 f9 44 5e Aug 26 13:28:11.944848: | 72 c0 13 4a 60 77 ff 78 97 13 95 fb 20 12 a5 88 Aug 26 13:28:11.944850: | 0f 7b 92 8f 6d dc ec be 8e 0d 07 f5 e3 83 97 56 Aug 26 13:28:11.944851: | 0d eb 8c 76 aa 12 ef 83 b5 7c 98 88 78 db b5 cd Aug 26 13:28:11.944853: | 1c d2 ca bb e8 f0 c7 11 22 95 7e f1 f0 b7 1d 3f Aug 26 13:28:11.944854: | 1d ac 27 ce 83 b4 d6 90 ed 70 ad 84 99 be f1 10 Aug 26 13:28:11.944856: | 97 ec c9 d1 5b 48 bb bc 9a 60 f0 6d fe 89 d1 67 Aug 26 13:28:11.944857: | e6 69 b8 97 92 d4 4c 40 04 b9 f5 be f5 48 f3 74 Aug 26 13:28:11.944859: | c6 23 fd 14 0d 3a 3d e5 1a 5e 60 2c 01 a2 63 5f Aug 26 13:28:11.944860: | cc 0b 3d 93 0d 07 9d 48 06 b6 f9 a3 c5 58 c5 00 Aug 26 13:28:11.944862: | 88 88 3c 20 4e 16 60 ef 29 00 00 24 76 bd 58 06 Aug 26 13:28:11.944863: | 31 ca 10 95 24 08 9a ab b4 93 8a 39 59 2a 48 9e Aug 26 13:28:11.944865: | b0 ee 85 8a fa 6d e1 d3 2b 5c 43 d3 29 00 00 08 Aug 26 13:28:11.944866: | 00 00 40 2e 29 00 00 1c 00 00 40 04 b9 48 5c 6f Aug 26 13:28:11.944868: | 16 da 49 ef 04 85 27 57 cc e0 62 9c 34 28 18 b3 Aug 26 13:28:11.944869: | 00 00 00 1c 00 00 40 05 20 9d cc 51 56 e0 9d 45 Aug 26 13:28:11.944871: | 69 c2 ce 75 81 81 c0 64 2e 28 82 27 Aug 26 13:28:11.944928: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:28:11.944934: | libevent_free: release ptr-libevent@0x5572802bc978 Aug 26 13:28:11.944937: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557280570ef8 Aug 26 13:28:11.944940: | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=2000ms Aug 26 13:28:11.944944: "road-east-ikev2" #1: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds Aug 26 13:28:11.944952: | event_schedule: new EVENT_RETRANSMIT-pe@0x557280570ef8 Aug 26 13:28:11.944956: | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #1 Aug 26 13:28:11.944959: | libevent_malloc: new ptr-libevent@0x5572805717f8 size 128 Aug 26 13:28:11.944964: | #1 STATE_PARENT_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11377.687418 Aug 26 13:28:11.944969: | resume sending helper answer for #1 suppresed complete_v2_state_transition() and stole MD Aug 26 13:28:11.944974: | #1 spent 1.1 milliseconds in resume sending helper answer Aug 26 13:28:11.944980: | stop processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:28:11.944984: | libevent_free: release ptr-libevent@0x7fdd18002888 Aug 26 13:28:11.946737: | spent 0.00315 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:28:11.946762: | *received 437 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) Aug 26 13:28:11.946765: | ec e3 a0 47 70 a7 9c 09 29 2e 29 53 5c 6d 0a 75 Aug 26 13:28:11.946767: | 21 20 22 20 00 00 00 00 00 00 01 b5 22 00 00 28 Aug 26 13:28:11.946768: | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14 Aug 26 13:28:11.946770: | 80 0e 01 00 03 00 00 08 02 00 00 07 00 00 00 08 Aug 26 13:28:11.946771: | 04 00 00 0e 28 00 01 08 00 0e 00 00 05 d0 78 18 Aug 26 13:28:11.946774: | a4 bc b2 cb d8 de 5f ea 38 52 d3 5a 44 df 8e c6 Aug 26 13:28:11.946776: | 82 66 bc 06 8c 56 88 27 93 06 3f e7 f5 6b 0e fd Aug 26 13:28:11.946778: | 94 03 66 d4 55 40 5d f1 55 76 d7 4b 17 08 11 8f Aug 26 13:28:11.946779: | 79 df 73 7e 5c bc 38 eb ba 5f 31 ba 8a 2f b7 70 Aug 26 13:28:11.946781: | 86 5a 0f 29 c0 b8 03 f1 b7 70 19 79 bd 0d f1 7d Aug 26 13:28:11.946782: | 86 b7 19 6f 39 2a ea 20 84 b7 41 7b 5b 7b 34 60 Aug 26 13:28:11.946784: | 13 f4 c4 91 82 c0 ca 62 5d 85 72 45 8f b6 b6 f7 Aug 26 13:28:11.946785: | dc 08 2c 0f 21 7f e2 b8 18 9c 96 09 aa d8 d4 04 Aug 26 13:28:11.946787: | 58 43 db 84 02 96 dc 13 0b c4 3e a8 35 55 12 78 Aug 26 13:28:11.946788: | da c1 4c f9 f6 cc 74 05 17 b3 ce be 99 d4 77 45 Aug 26 13:28:11.946790: | d4 55 e4 4f 01 cd ec 40 dc 4a c6 90 64 5e 4f 64 Aug 26 13:28:11.946791: | 7a f6 e1 f8 f4 6b 5f 7e dc c9 17 89 32 39 c9 b8 Aug 26 13:28:11.946793: | 99 bc 5a c6 ea dd 96 03 fd 86 20 0e f5 2c 00 e0 Aug 26 13:28:11.946794: | 89 e8 eb 5f 54 48 1d da a7 4f 14 95 2a 00 a3 24 Aug 26 13:28:11.946796: | 09 f4 52 68 bc 09 08 f5 07 d8 3f 58 1c 9c 31 c8 Aug 26 13:28:11.946797: | 7e 2d ae a3 b7 69 61 ce a2 7a ac f1 29 00 00 24 Aug 26 13:28:11.946799: | 6e 66 77 13 1e e5 c1 69 5d 61 04 cc 2a 0f b6 f7 Aug 26 13:28:11.946800: | 7f 05 80 a3 13 65 6b a4 e3 df 59 56 d0 d1 13 53 Aug 26 13:28:11.946802: | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04 Aug 26 13:28:11.946803: | 10 6e 6c f9 94 3c 76 f3 f0 ff 0a 78 2f 3c 55 83 Aug 26 13:28:11.946805: | 3c 70 c7 2b 26 00 00 1c 00 00 40 05 2d 92 21 63 Aug 26 13:28:11.946806: | 13 ab 7e 21 40 e9 73 bf 00 29 4e f7 a5 3b c5 7b Aug 26 13:28:11.946808: | 00 00 00 05 04 Aug 26 13:28:11.946811: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:28:11.946813: | **parse ISAKMP Message: Aug 26 13:28:11.946815: | initiator cookie: Aug 26 13:28:11.946817: | ec e3 a0 47 70 a7 9c 09 Aug 26 13:28:11.946818: | responder cookie: Aug 26 13:28:11.946820: | 29 2e 29 53 5c 6d 0a 75 Aug 26 13:28:11.946822: | next payload type: ISAKMP_NEXT_v2SA (0x21) Aug 26 13:28:11.946824: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:28:11.946825: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Aug 26 13:28:11.946827: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Aug 26 13:28:11.946829: | Message ID: 0 (0x0) Aug 26 13:28:11.946831: | length: 437 (0x1b5) Aug 26 13:28:11.946832: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) Aug 26 13:28:11.946835: | I am the IKE SA Original Initiator receiving an IKEv2 IKE_SA_INIT response Aug 26 13:28:11.946837: | State DB: found IKEv2 state #1 in PARENT_I1 (find_v2_ike_sa_by_initiator_spi) Aug 26 13:28:11.946842: | start processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) Aug 26 13:28:11.946844: | [RE]START processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) Aug 26 13:28:11.946846: | #1 is idle Aug 26 13:28:11.946848: | #1 idle Aug 26 13:28:11.946849: | unpacking clear payload Aug 26 13:28:11.946851: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Aug 26 13:28:11.946853: | ***parse IKEv2 Security Association Payload: Aug 26 13:28:11.946855: | next payload type: ISAKMP_NEXT_v2KE (0x22) Aug 26 13:28:11.946856: | flags: none (0x0) Aug 26 13:28:11.946858: | length: 40 (0x28) Aug 26 13:28:11.946860: | processing payload: ISAKMP_NEXT_v2SA (len=36) Aug 26 13:28:11.946861: | Now let's proceed with payload (ISAKMP_NEXT_v2KE) Aug 26 13:28:11.946863: | ***parse IKEv2 Key Exchange Payload: Aug 26 13:28:11.946865: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Aug 26 13:28:11.946866: | flags: none (0x0) Aug 26 13:28:11.946868: | length: 264 (0x108) Aug 26 13:28:11.946870: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:28:11.946871: | processing payload: ISAKMP_NEXT_v2KE (len=256) Aug 26 13:28:11.946874: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Aug 26 13:28:11.946875: | ***parse IKEv2 Nonce Payload: Aug 26 13:28:11.946877: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:28:11.946879: | flags: none (0x0) Aug 26 13:28:11.946880: | length: 36 (0x24) Aug 26 13:28:11.946882: | processing payload: ISAKMP_NEXT_v2Ni (len=32) Aug 26 13:28:11.946883: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 13:28:11.946885: | ***parse IKEv2 Notify Payload: Aug 26 13:28:11.946887: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:28:11.946888: | flags: none (0x0) Aug 26 13:28:11.946890: | length: 8 (0x8) Aug 26 13:28:11.946891: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:28:11.946893: | SPI size: 0 (0x0) Aug 26 13:28:11.946895: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Aug 26 13:28:11.946897: | processing payload: ISAKMP_NEXT_v2N (len=0) Aug 26 13:28:11.946898: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 13:28:11.946900: | ***parse IKEv2 Notify Payload: Aug 26 13:28:11.946901: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:28:11.946903: | flags: none (0x0) Aug 26 13:28:11.946904: | length: 28 (0x1c) Aug 26 13:28:11.946906: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:28:11.946907: | SPI size: 0 (0x0) Aug 26 13:28:11.946909: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Aug 26 13:28:11.946911: | processing payload: ISAKMP_NEXT_v2N (len=20) Aug 26 13:28:11.946912: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 13:28:11.946914: | ***parse IKEv2 Notify Payload: Aug 26 13:28:11.946915: | next payload type: ISAKMP_NEXT_v2CERTREQ (0x26) Aug 26 13:28:11.946917: | flags: none (0x0) Aug 26 13:28:11.946918: | length: 28 (0x1c) Aug 26 13:28:11.946920: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:28:11.946921: | SPI size: 0 (0x0) Aug 26 13:28:11.946923: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Aug 26 13:28:11.946925: | processing payload: ISAKMP_NEXT_v2N (len=20) Aug 26 13:28:11.946926: | Now let's proceed with payload (ISAKMP_NEXT_v2CERTREQ) Aug 26 13:28:11.946928: | ***parse IKEv2 Certificate Request Payload: Aug 26 13:28:11.946929: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:11.946931: | flags: none (0x0) Aug 26 13:28:11.946932: | length: 5 (0x5) Aug 26 13:28:11.946934: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) Aug 26 13:28:11.946936: | processing payload: ISAKMP_NEXT_v2CERTREQ (len=0) Aug 26 13:28:11.946937: | State DB: re-hashing IKEv2 state #1 IKE SPIi and SPI[ir] Aug 26 13:28:11.946942: | #1 in state PARENT_I1: sent v2I1, expected v2R1 Aug 26 13:28:11.946944: | selected state microcode Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH Aug 26 13:28:11.946945: | Now let's proceed with state specific processing Aug 26 13:28:11.946947: | calling processor Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH Aug 26 13:28:11.946950: | ikev2 parent inR1: calculating g^{xy} in order to send I2 Aug 26 13:28:11.946960: | using existing local IKE proposals for connection road-east-ikev2 (IKE SA initiator accepting remote proposal): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:28:11.946963: | Comparing remote proposals against IKE initiator (accepting) 4 local proposals Aug 26 13:28:11.946966: | local proposal 1 type ENCR has 1 transforms Aug 26 13:28:11.946967: | local proposal 1 type PRF has 2 transforms Aug 26 13:28:11.946970: | local proposal 1 type INTEG has 1 transforms Aug 26 13:28:11.946972: | local proposal 1 type DH has 8 transforms Aug 26 13:28:11.946973: | local proposal 1 type ESN has 0 transforms Aug 26 13:28:11.946976: | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG Aug 26 13:28:11.946977: | local proposal 2 type ENCR has 1 transforms Aug 26 13:28:11.946979: | local proposal 2 type PRF has 2 transforms Aug 26 13:28:11.946980: | local proposal 2 type INTEG has 1 transforms Aug 26 13:28:11.946982: | local proposal 2 type DH has 8 transforms Aug 26 13:28:11.946984: | local proposal 2 type ESN has 0 transforms Aug 26 13:28:11.946985: | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG Aug 26 13:28:11.946987: | local proposal 3 type ENCR has 1 transforms Aug 26 13:28:11.946989: | local proposal 3 type PRF has 2 transforms Aug 26 13:28:11.946990: | local proposal 3 type INTEG has 2 transforms Aug 26 13:28:11.946992: | local proposal 3 type DH has 8 transforms Aug 26 13:28:11.946993: | local proposal 3 type ESN has 0 transforms Aug 26 13:28:11.946995: | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none Aug 26 13:28:11.946997: | local proposal 4 type ENCR has 1 transforms Aug 26 13:28:11.946999: | local proposal 4 type PRF has 2 transforms Aug 26 13:28:11.947000: | local proposal 4 type INTEG has 2 transforms Aug 26 13:28:11.947002: | local proposal 4 type DH has 8 transforms Aug 26 13:28:11.947003: | local proposal 4 type ESN has 0 transforms Aug 26 13:28:11.947005: | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none Aug 26 13:28:11.947007: | ****parse IKEv2 Proposal Substructure Payload: Aug 26 13:28:11.947009: | last proposal: v2_PROPOSAL_LAST (0x0) Aug 26 13:28:11.947011: | length: 36 (0x24) Aug 26 13:28:11.947012: | prop #: 1 (0x1) Aug 26 13:28:11.947014: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:28:11.947015: | spi size: 0 (0x0) Aug 26 13:28:11.947017: | # transforms: 3 (0x3) Aug 26 13:28:11.947019: | Comparing remote proposal 1 containing 3 transforms against local proposal [1..1] of 4 local proposals Aug 26 13:28:11.947021: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:28:11.947023: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.947024: | length: 12 (0xc) Aug 26 13:28:11.947026: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:11.947028: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 13:28:11.947029: | ******parse IKEv2 Attribute Substructure Payload: Aug 26 13:28:11.947031: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:11.947033: | length/value: 256 (0x100) Aug 26 13:28:11.947035: | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 Aug 26 13:28:11.947037: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:28:11.947039: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.947040: | length: 8 (0x8) Aug 26 13:28:11.947042: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:11.947044: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:28:11.947046: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 Aug 26 13:28:11.947047: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:28:11.947049: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:11.947051: | length: 8 (0x8) Aug 26 13:28:11.947052: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:11.947054: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:28:11.947056: | remote proposal 1 transform 2 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Aug 26 13:28:11.947058: | remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none Aug 26 13:28:11.947061: | comparing remote proposal 1 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH Aug 26 13:28:11.947063: | remote proposal 1 matches local proposal 1 Aug 26 13:28:11.947066: | remote accepted the proposal 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048[first-match] Aug 26 13:28:11.947068: | converting proposal to internal trans attrs Aug 26 13:28:11.947079: | natd_hash: hasher=0x55727ebd3800(20) Aug 26 13:28:11.947081: | natd_hash: icookie= ec e3 a0 47 70 a7 9c 09 Aug 26 13:28:11.947082: | natd_hash: rcookie= 29 2e 29 53 5c 6d 0a 75 Aug 26 13:28:11.947084: | natd_hash: ip= c0 01 03 d1 Aug 26 13:28:11.947085: | natd_hash: port=500 Aug 26 13:28:11.947087: | natd_hash: hash= 2d 92 21 63 13 ab 7e 21 40 e9 73 bf 00 29 4e f7 Aug 26 13:28:11.947088: | natd_hash: hash= a5 3b c5 7b Aug 26 13:28:11.947092: | natd_hash: hasher=0x55727ebd3800(20) Aug 26 13:28:11.947094: | natd_hash: icookie= ec e3 a0 47 70 a7 9c 09 Aug 26 13:28:11.947095: | natd_hash: rcookie= 29 2e 29 53 5c 6d 0a 75 Aug 26 13:28:11.947097: | natd_hash: ip= c0 01 02 17 Aug 26 13:28:11.947098: | natd_hash: port=500 Aug 26 13:28:11.947100: | natd_hash: hash= 10 6e 6c f9 94 3c 76 f3 f0 ff 0a 78 2f 3c 55 83 Aug 26 13:28:11.947101: | natd_hash: hash= 3c 70 c7 2b Aug 26 13:28:11.947103: | NAT_TRAVERSAL encaps using auto-detect Aug 26 13:28:11.947105: | NAT_TRAVERSAL this end is NOT behind NAT Aug 26 13:28:11.947106: | NAT_TRAVERSAL that end is NOT behind NAT Aug 26 13:28:11.947108: | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 Aug 26 13:28:11.947111: | offloading IKEv2 SKEYSEED using prf=HMAC_SHA2_512 integ=NONE cipherkey=AES_GCM_16 Aug 26 13:28:11.947114: | adding ikev2_inR1outI2 KE work-order 2 for state #1 Aug 26 13:28:11.947116: | state #1 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:28:11.947118: | #1 STATE_PARENT_I1: retransmits: cleared Aug 26 13:28:11.947121: | libevent_free: release ptr-libevent@0x5572805717f8 Aug 26 13:28:11.947123: | free_event_entry: release EVENT_RETRANSMIT-pe@0x557280570ef8 Aug 26 13:28:11.947125: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557280570ef8 Aug 26 13:28:11.947127: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Aug 26 13:28:11.947129: | libevent_malloc: new ptr-libevent@0x7fdd18002888 size 128 Aug 26 13:28:11.947138: | #1 spent 0.187 milliseconds in processing: Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH in ikev2_process_state_packet() Aug 26 13:28:11.947142: | [RE]START processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 13:28:11.947144: | #1 complete_v2_state_transition() PARENT_I1->PARENT_I2 with status STF_SUSPEND Aug 26 13:28:11.947146: | suspending state #1 and saving MD Aug 26 13:28:11.947146: | crypto helper 1 resuming Aug 26 13:28:11.947147: | #1 is busy; has a suspended MD Aug 26 13:28:11.947160: | crypto helper 1 starting work-order 2 for state #1 Aug 26 13:28:11.947163: | [RE]START processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in log_stf_suspend() at ikev2.c:3269) Aug 26 13:28:11.947166: | "road-east-ikev2" #1 complete v2 state STATE_PARENT_I1 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451 Aug 26 13:28:11.947167: | crypto helper 1 doing compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 Aug 26 13:28:11.947170: | stop processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) Aug 26 13:28:11.947174: | #1 spent 0.416 milliseconds in ikev2_process_packet() Aug 26 13:28:11.947176: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) Aug 26 13:28:11.947178: | processing: STOP state #0 (in process_md() at demux.c:382) Aug 26 13:28:11.947180: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:28:11.947183: | spent 0.426 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:28:11.947973: | calculating skeyseed using prf=sha2_512 integ=none cipherkey-size=32 salt-size=4 Aug 26 13:28:11.948262: | crypto helper 1 finished compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 time elapsed 0.001096 seconds Aug 26 13:28:11.948269: | (#1) spent 1.1 milliseconds in crypto helper computing work-order 2: ikev2_inR1outI2 KE (pcr) Aug 26 13:28:11.948273: | crypto helper 1 sending results from work-order 2 for state #1 to event queue Aug 26 13:28:11.948276: | scheduling resume sending helper answer for #1 Aug 26 13:28:11.948278: | libevent_malloc: new ptr-libevent@0x7fdd10000f48 size 128 Aug 26 13:28:11.948285: | crypto helper 1 waiting (nothing to do) Aug 26 13:28:11.948296: | processing resume sending helper answer for #1 Aug 26 13:28:11.948309: | start processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:28:11.948312: | crypto helper 1 replies to request ID 2 Aug 26 13:28:11.948314: | calling continuation function 0x55727eafeb50 Aug 26 13:28:11.948316: | ikev2_parent_inR1outI2_continue for #1: calculating g^{xy}, sending I2 Aug 26 13:28:11.948321: | creating state object #2 at 0x5572805744a8 Aug 26 13:28:11.948323: | State DB: adding IKEv2 state #2 in UNDEFINED Aug 26 13:28:11.948326: | pstats #2 ikev2.child started Aug 26 13:28:11.948328: | duplicating state object #1 "road-east-ikev2" as #2 for IPSEC SA Aug 26 13:28:11.948331: | #2 setting local endpoint to 192.1.3.209:500 from #1.st_localport (in duplicate_state() at state.c:1484) Aug 26 13:28:11.948336: | Message ID: init_child #1.#2; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=0->-1 Aug 26 13:28:11.948339: | Message ID: switch-from #1 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=0->-1 wip.responder=-1 Aug 26 13:28:11.948342: | Message ID: switch-to #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->0 wip.responder=-1 Aug 26 13:28:11.948344: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:28:11.948346: | libevent_free: release ptr-libevent@0x7fdd18002888 Aug 26 13:28:11.948348: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557280570ef8 Aug 26 13:28:11.948350: | event_schedule: new EVENT_SA_REPLACE-pe@0x557280570ef8 Aug 26 13:28:11.948352: | inserting event EVENT_SA_REPLACE, timeout in 60 seconds for #1 Aug 26 13:28:11.948354: | libevent_malloc: new ptr-libevent@0x7fdd18002888 size 128 Aug 26 13:28:11.948357: | parent state #1: PARENT_I1(half-open IKE SA) => PARENT_I2(open IKE SA) Aug 26 13:28:11.948361: | **emit ISAKMP Message: Aug 26 13:28:11.948363: | initiator cookie: Aug 26 13:28:11.948365: | ec e3 a0 47 70 a7 9c 09 Aug 26 13:28:11.948366: | responder cookie: Aug 26 13:28:11.948368: | 29 2e 29 53 5c 6d 0a 75 Aug 26 13:28:11.948370: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:28:11.948372: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:28:11.948374: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Aug 26 13:28:11.948376: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Aug 26 13:28:11.948377: | Message ID: 1 (0x1) Aug 26 13:28:11.948379: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:28:11.948381: | ***emit IKEv2 Encryption Payload: Aug 26 13:28:11.948383: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:11.948385: | flags: none (0x0) Aug 26 13:28:11.948387: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Aug 26 13:28:11.948389: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' Aug 26 13:28:11.948391: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload Aug 26 13:28:11.948397: | IKEv2 CERT: send a certificate? Aug 26 13:28:11.948399: | IKEv2 CERT: no certificate to send Aug 26 13:28:11.948401: | IDr payload will NOT be sent Aug 26 13:28:11.948412: | ****emit IKEv2 Identification - Initiator - Payload: Aug 26 13:28:11.948414: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:11.948416: | flags: none (0x0) Aug 26 13:28:11.948417: | ID type: ID_IPV4_ADDR (0x1) Aug 26 13:28:11.948420: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Initiator - Payload (35:ISAKMP_NEXT_v2IDi) Aug 26 13:28:11.948424: | next payload chain: saving location 'IKEv2 Identification - Initiator - Payload'.'next payload type' in 'reply packet' Aug 26 13:28:11.948427: | emitting 4 raw bytes of my identity into IKEv2 Identification - Initiator - Payload Aug 26 13:28:11.948428: | my identity c0 01 03 d1 Aug 26 13:28:11.948430: | emitting length of IKEv2 Identification - Initiator - Payload: 12 Aug 26 13:28:11.948436: | not sending INITIAL_CONTACT Aug 26 13:28:11.948438: | ****emit IKEv2 Authentication Payload: Aug 26 13:28:11.948440: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:11.948441: | flags: none (0x0) Aug 26 13:28:11.948443: | auth method: IKEv2_AUTH_RSA (0x1) Aug 26 13:28:11.948445: | next payload chain: setting previous 'IKEv2 Identification - Initiator - Payload'.'next payload type' to current IKEv2 Authentication Payload (39:ISAKMP_NEXT_v2AUTH) Aug 26 13:28:11.948447: | next payload chain: saving location 'IKEv2 Authentication Payload'.'next payload type' in 'reply packet' Aug 26 13:28:11.948452: | started looking for secret for 192.1.3.209->192.1.2.23 of kind PKK_RSA Aug 26 13:28:11.948454: | actually looking for secret for 192.1.3.209->192.1.2.23 of kind PKK_RSA Aug 26 13:28:11.948457: | line 1: key type PKK_RSA(192.1.3.209) to type PKK_RSA Aug 26 13:28:11.948460: | 1: compared key (none) to 192.1.3.209 / 192.1.2.23 -> 002 Aug 26 13:28:11.948462: | 2: compared key (none) to 192.1.3.209 / 192.1.2.23 -> 002 Aug 26 13:28:11.948463: | line 1: match=002 Aug 26 13:28:11.948465: | match 002 beats previous best_match 000 match=0x5572801c9c48 (line=1) Aug 26 13:28:11.948467: | concluding with best_match=002 best=0x5572801c9c48 (lineno=1) Aug 26 13:28:11.953798: | #1 spent 5.3 milliseconds in ikev2_calculate_rsa_hash() calling sign_hash_RSA() Aug 26 13:28:11.953821: | emitting 388 raw bytes of rsa signature into IKEv2 Authentication Payload Aug 26 13:28:11.953823: | rsa signature 35 ef fb a4 93 52 6e 00 01 48 9d 57 8e ad 54 fd Aug 26 13:28:11.953825: | rsa signature 8a 40 7a 25 18 84 c8 b4 fa 44 18 fb ea e4 20 24 Aug 26 13:28:11.953827: | rsa signature ba b0 34 2d 2b ab 7c 24 e1 d6 64 f2 5f 62 a5 a3 Aug 26 13:28:11.953828: | rsa signature 8f 25 88 ad 12 3c ae 85 a2 72 c9 04 1e 08 94 66 Aug 26 13:28:11.953830: | rsa signature 65 61 8c 4f 04 54 c2 77 8d 1d 32 da bc 68 5b 08 Aug 26 13:28:11.953831: | rsa signature 7c 66 4f 29 6a 84 71 40 d8 e0 1e f8 dd 21 39 7e Aug 26 13:28:11.953833: | rsa signature 37 67 6b d3 16 2c 41 c2 8e 83 d9 45 d4 bc e3 ff Aug 26 13:28:11.953834: | rsa signature da 75 98 41 60 e1 c5 5a c0 be 7a 13 f2 f2 6b 68 Aug 26 13:28:11.953836: | rsa signature aa 35 02 d5 00 04 92 a0 7e ed 9f 13 e4 85 9e 21 Aug 26 13:28:11.953837: | rsa signature 6c 6f 79 d6 f4 66 fc 19 14 f8 a4 21 1d d1 ce 62 Aug 26 13:28:11.953839: | rsa signature 95 b1 43 f0 80 72 49 8d f3 3a 8e f4 24 98 7a be Aug 26 13:28:11.953841: | rsa signature 43 06 0a 7e 3c 00 9f 53 7e 48 e2 d7 f1 73 ec 4f Aug 26 13:28:11.953842: | rsa signature 09 34 1f 84 5c 92 26 4c a5 15 ca 07 1c b8 3a 4a Aug 26 13:28:11.953844: | rsa signature 07 68 b8 da 1e bf d4 65 ac 03 68 8e c5 52 2e 1d Aug 26 13:28:11.953845: | rsa signature ee 65 4c 29 4a c3 66 95 94 4b 76 11 9c a1 9e fb Aug 26 13:28:11.953847: | rsa signature 71 0e 24 0a 13 17 a9 68 87 c3 c0 d3 a2 e7 b0 a4 Aug 26 13:28:11.953848: | rsa signature eb 32 19 46 42 ba 20 1c d3 cb ad 50 54 af 11 d8 Aug 26 13:28:11.953850: | rsa signature 7a 78 2b 06 3f c3 8f 67 ab c1 b8 9e bd 50 32 51 Aug 26 13:28:11.953851: | rsa signature c0 32 cf db 23 45 63 13 ba 37 98 71 c6 8d 13 a0 Aug 26 13:28:11.953853: | rsa signature 58 59 bc 26 0d 6d e0 ab ae d3 63 03 46 7e 63 8c Aug 26 13:28:11.953855: | rsa signature 69 04 b0 28 36 f0 2d ec 4c ec 9e 77 ae b9 2a 12 Aug 26 13:28:11.953856: | rsa signature d6 fa a7 a0 fb b4 24 1a d9 17 f5 a3 25 22 69 ad Aug 26 13:28:11.953861: | rsa signature f7 03 b3 ef 94 e5 67 7e 9f b9 4e a9 bf e7 46 9c Aug 26 13:28:11.953863: | rsa signature fd ff da 23 4d 3f 6c c5 57 f4 c2 42 c3 7a d4 cb Aug 26 13:28:11.953865: | rsa signature 03 7c 8c 42 Aug 26 13:28:11.953868: | #1 spent 5.4 milliseconds in ikev2_calculate_rsa_hash() Aug 26 13:28:11.953870: | emitting length of IKEv2 Authentication Payload: 396 Aug 26 13:28:11.953872: | getting first pending from state #1 Aug 26 13:28:11.954138: | netlink_get_spi: allocated 0x47b9080b for esp.0@192.1.3.209 Aug 26 13:28:11.954142: | constructing ESP/AH proposals with all DH removed for road-east-ikev2 (IKE SA initiator emitting ESP/AH proposals) Aug 26 13:28:11.954147: | converting proposal AES_GCM_16_256-NONE to ikev2 ... Aug 26 13:28:11.954152: | ... ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED Aug 26 13:28:11.954154: | converting proposal AES_GCM_16_128-NONE to ikev2 ... Aug 26 13:28:11.954157: | ... ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED Aug 26 13:28:11.954159: | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... Aug 26 13:28:11.954162: | ... ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Aug 26 13:28:11.954164: | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... Aug 26 13:28:11.954166: | ... ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Aug 26 13:28:11.954171: "road-east-ikev2": constructed local ESP/AH proposals for road-east-ikev2 (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Aug 26 13:28:11.954182: | Emitting ikev2_proposals ... Aug 26 13:28:11.954185: | ****emit IKEv2 Security Association Payload: Aug 26 13:28:11.954187: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:11.954189: | flags: none (0x0) Aug 26 13:28:11.954192: | next payload chain: setting previous 'IKEv2 Authentication Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Aug 26 13:28:11.954194: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:28:11.954196: | discarding INTEG=NONE Aug 26 13:28:11.954198: | discarding DH=NONE Aug 26 13:28:11.954199: | *****emit IKEv2 Proposal Substructure Payload: Aug 26 13:28:11.954201: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:11.954203: | prop #: 1 (0x1) Aug 26 13:28:11.954205: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Aug 26 13:28:11.954206: | spi size: 4 (0x4) Aug 26 13:28:11.954208: | # transforms: 2 (0x2) Aug 26 13:28:11.954210: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:28:11.954212: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Aug 26 13:28:11.954214: | our spi 47 b9 08 0b Aug 26 13:28:11.954215: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.954217: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.954219: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:11.954220: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 13:28:11.954222: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.954224: | *******emit IKEv2 Attribute Substructure Payload: Aug 26 13:28:11.954226: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:11.954228: | length/value: 256 (0x100) Aug 26 13:28:11.954230: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:28:11.954231: | discarding INTEG=NONE Aug 26 13:28:11.954233: | discarding DH=NONE Aug 26 13:28:11.954234: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.954238: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:11.954240: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Aug 26 13:28:11.954242: | IKEv2 transform ID: ESN_DISABLED (0x0) Aug 26 13:28:11.954244: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.954246: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.954248: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.954249: | emitting length of IKEv2 Proposal Substructure Payload: 32 Aug 26 13:28:11.954251: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:28:11.954253: | discarding INTEG=NONE Aug 26 13:28:11.954254: | discarding DH=NONE Aug 26 13:28:11.954256: | *****emit IKEv2 Proposal Substructure Payload: Aug 26 13:28:11.954258: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:11.954259: | prop #: 2 (0x2) Aug 26 13:28:11.954261: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Aug 26 13:28:11.954262: | spi size: 4 (0x4) Aug 26 13:28:11.954264: | # transforms: 2 (0x2) Aug 26 13:28:11.954266: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:11.954268: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:28:11.954270: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Aug 26 13:28:11.954271: | our spi 47 b9 08 0b Aug 26 13:28:11.954273: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.954274: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.954276: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:11.954277: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 13:28:11.954279: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.954281: | *******emit IKEv2 Attribute Substructure Payload: Aug 26 13:28:11.954283: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:11.954284: | length/value: 128 (0x80) Aug 26 13:28:11.954286: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:28:11.954309: | discarding INTEG=NONE Aug 26 13:28:11.954316: | discarding DH=NONE Aug 26 13:28:11.954318: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.954320: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:11.954323: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Aug 26 13:28:11.954326: | IKEv2 transform ID: ESN_DISABLED (0x0) Aug 26 13:28:11.954328: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.954330: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.954331: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.954333: | emitting length of IKEv2 Proposal Substructure Payload: 32 Aug 26 13:28:11.954335: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:28:11.954337: | discarding DH=NONE Aug 26 13:28:11.954338: | *****emit IKEv2 Proposal Substructure Payload: Aug 26 13:28:11.954340: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:11.954341: | prop #: 3 (0x3) Aug 26 13:28:11.954343: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Aug 26 13:28:11.954344: | spi size: 4 (0x4) Aug 26 13:28:11.954346: | # transforms: 4 (0x4) Aug 26 13:28:11.954348: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:11.954351: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:28:11.954353: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Aug 26 13:28:11.954355: | our spi 47 b9 08 0b Aug 26 13:28:11.954357: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.954358: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.954360: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:11.954361: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 13:28:11.954363: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.954365: | *******emit IKEv2 Attribute Substructure Payload: Aug 26 13:28:11.954366: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:11.954368: | length/value: 256 (0x100) Aug 26 13:28:11.954370: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:28:11.954371: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.954373: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.954374: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:28:11.954378: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 13:28:11.954380: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.954382: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.954383: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.954385: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.954386: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.954388: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:28:11.954390: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 13:28:11.954392: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.954393: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.954395: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.954397: | discarding DH=NONE Aug 26 13:28:11.954398: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.954400: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:11.954401: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Aug 26 13:28:11.954403: | IKEv2 transform ID: ESN_DISABLED (0x0) Aug 26 13:28:11.954405: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.954407: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.954408: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.954410: | emitting length of IKEv2 Proposal Substructure Payload: 48 Aug 26 13:28:11.954412: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:28:11.954413: | discarding DH=NONE Aug 26 13:28:11.954415: | *****emit IKEv2 Proposal Substructure Payload: Aug 26 13:28:11.954416: | last proposal: v2_PROPOSAL_LAST (0x0) Aug 26 13:28:11.954418: | prop #: 4 (0x4) Aug 26 13:28:11.954419: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Aug 26 13:28:11.954421: | spi size: 4 (0x4) Aug 26 13:28:11.954422: | # transforms: 4 (0x4) Aug 26 13:28:11.954424: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:11.954427: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:28:11.954429: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Aug 26 13:28:11.954431: | our spi 47 b9 08 0b Aug 26 13:28:11.954432: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.954434: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.954435: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:11.954437: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 13:28:11.954439: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.954440: | *******emit IKEv2 Attribute Substructure Payload: Aug 26 13:28:11.954442: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:11.954444: | length/value: 128 (0x80) Aug 26 13:28:11.954445: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:28:11.954447: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.954448: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.954450: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:28:11.954451: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 13:28:11.954453: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.954455: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.954457: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.954458: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.954460: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.954462: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:28:11.954463: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 13:28:11.954465: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.954467: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.954469: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.954470: | discarding DH=NONE Aug 26 13:28:11.954472: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:11.954478: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:11.954482: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Aug 26 13:28:11.954485: | IKEv2 transform ID: ESN_DISABLED (0x0) Aug 26 13:28:11.954489: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:11.954492: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:11.954496: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:11.954499: | emitting length of IKEv2 Proposal Substructure Payload: 48 Aug 26 13:28:11.954502: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:28:11.954506: | emitting length of IKEv2 Security Association Payload: 164 Aug 26 13:28:11.954510: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Aug 26 13:28:11.954514: | ****emit IKEv2 Traffic Selector - Initiator - Payload: Aug 26 13:28:11.954518: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:11.954520: | flags: none (0x0) Aug 26 13:28:11.954523: | number of TS: 1 (0x1) Aug 26 13:28:11.954527: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) Aug 26 13:28:11.954533: | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet' Aug 26 13:28:11.954537: | *****emit IKEv2 Traffic Selector: Aug 26 13:28:11.954540: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Aug 26 13:28:11.954544: | IP Protocol ID: 0 (0x0) Aug 26 13:28:11.954546: | start port: 0 (0x0) Aug 26 13:28:11.954550: | end port: 65535 (0xffff) Aug 26 13:28:11.954553: | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector Aug 26 13:28:11.954556: | ipv4 start c0 01 03 d1 Aug 26 13:28:11.954558: | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector Aug 26 13:28:11.954560: | ipv4 end c0 01 03 d1 Aug 26 13:28:11.954561: | emitting length of IKEv2 Traffic Selector: 16 Aug 26 13:28:11.954563: | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 Aug 26 13:28:11.954565: | ****emit IKEv2 Traffic Selector - Responder - Payload: Aug 26 13:28:11.954566: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:11.954568: | flags: none (0x0) Aug 26 13:28:11.954570: | number of TS: 1 (0x1) Aug 26 13:28:11.954572: | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) Aug 26 13:28:11.954575: | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet' Aug 26 13:28:11.954578: | *****emit IKEv2 Traffic Selector: Aug 26 13:28:11.954581: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Aug 26 13:28:11.954584: | IP Protocol ID: 0 (0x0) Aug 26 13:28:11.954587: | start port: 0 (0x0) Aug 26 13:28:11.954590: | end port: 65535 (0xffff) Aug 26 13:28:11.954594: | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector Aug 26 13:28:11.954598: | ipv4 start c0 01 02 17 Aug 26 13:28:11.954602: | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector Aug 26 13:28:11.954604: | ipv4 end c0 01 02 17 Aug 26 13:28:11.954608: | emitting length of IKEv2 Traffic Selector: 16 Aug 26 13:28:11.954612: | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 Aug 26 13:28:11.954615: | Initiator child policy is tunnel mode, NOT sending v2N_USE_TRANSPORT_MODE Aug 26 13:28:11.954618: | Initiator child policy is compress=no, NOT sending v2N_IPCOMP_SUPPORTED Aug 26 13:28:11.954620: | adding 1 bytes of padding (including 1 byte padding-length) Aug 26 13:28:11.954622: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Aug 26 13:28:11.954625: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Aug 26 13:28:11.954626: | emitting length of IKEv2 Encryption Payload: 649 Aug 26 13:28:11.954628: | emitting length of ISAKMP Message: 677 Aug 26 13:28:11.954632: | **parse ISAKMP Message: Aug 26 13:28:11.954634: | initiator cookie: Aug 26 13:28:11.954635: | ec e3 a0 47 70 a7 9c 09 Aug 26 13:28:11.954637: | responder cookie: Aug 26 13:28:11.954639: | 29 2e 29 53 5c 6d 0a 75 Aug 26 13:28:11.954640: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Aug 26 13:28:11.954642: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:28:11.954644: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Aug 26 13:28:11.954646: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Aug 26 13:28:11.954647: | Message ID: 1 (0x1) Aug 26 13:28:11.954649: | length: 677 (0x2a5) Aug 26 13:28:11.954651: | **parse IKEv2 Encryption Payload: Aug 26 13:28:11.954652: | next payload type: ISAKMP_NEXT_v2IDi (0x23) Aug 26 13:28:11.954654: | flags: none (0x0) Aug 26 13:28:11.954655: | length: 649 (0x289) Aug 26 13:28:11.954657: | **emit ISAKMP Message: Aug 26 13:28:11.954659: | initiator cookie: Aug 26 13:28:11.954660: | ec e3 a0 47 70 a7 9c 09 Aug 26 13:28:11.954662: | responder cookie: Aug 26 13:28:11.954663: | 29 2e 29 53 5c 6d 0a 75 Aug 26 13:28:11.954665: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:28:11.954666: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:28:11.954669: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Aug 26 13:28:11.954671: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Aug 26 13:28:11.954673: | Message ID: 1 (0x1) Aug 26 13:28:11.954675: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:28:11.954677: | ***emit IKEv2 Encrypted Fragment: Aug 26 13:28:11.954678: | next payload type: ISAKMP_NEXT_v2IDi (0x23) Aug 26 13:28:11.954680: | flags: none (0x0) Aug 26 13:28:11.954681: | fragment number: 1 (0x1) Aug 26 13:28:11.954683: | total fragments: 2 (0x2) Aug 26 13:28:11.954685: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 35:ISAKMP_NEXT_v2IDi Aug 26 13:28:11.954687: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Aug 26 13:28:11.954689: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Aug 26 13:28:11.954691: | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment Aug 26 13:28:11.954698: | emitting 478 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Aug 26 13:28:11.954700: | cleartext fragment 27 00 00 0c 01 00 00 00 c0 01 03 d1 21 00 01 8c Aug 26 13:28:11.954702: | cleartext fragment 01 00 00 00 35 ef fb a4 93 52 6e 00 01 48 9d 57 Aug 26 13:28:11.954703: | cleartext fragment 8e ad 54 fd 8a 40 7a 25 18 84 c8 b4 fa 44 18 fb Aug 26 13:28:11.954705: | cleartext fragment ea e4 20 24 ba b0 34 2d 2b ab 7c 24 e1 d6 64 f2 Aug 26 13:28:11.954706: | cleartext fragment 5f 62 a5 a3 8f 25 88 ad 12 3c ae 85 a2 72 c9 04 Aug 26 13:28:11.954708: | cleartext fragment 1e 08 94 66 65 61 8c 4f 04 54 c2 77 8d 1d 32 da Aug 26 13:28:11.954710: | cleartext fragment bc 68 5b 08 7c 66 4f 29 6a 84 71 40 d8 e0 1e f8 Aug 26 13:28:11.954711: | cleartext fragment dd 21 39 7e 37 67 6b d3 16 2c 41 c2 8e 83 d9 45 Aug 26 13:28:11.954713: | cleartext fragment d4 bc e3 ff da 75 98 41 60 e1 c5 5a c0 be 7a 13 Aug 26 13:28:11.954714: | cleartext fragment f2 f2 6b 68 aa 35 02 d5 00 04 92 a0 7e ed 9f 13 Aug 26 13:28:11.954716: | cleartext fragment e4 85 9e 21 6c 6f 79 d6 f4 66 fc 19 14 f8 a4 21 Aug 26 13:28:11.954717: | cleartext fragment 1d d1 ce 62 95 b1 43 f0 80 72 49 8d f3 3a 8e f4 Aug 26 13:28:11.954719: | cleartext fragment 24 98 7a be 43 06 0a 7e 3c 00 9f 53 7e 48 e2 d7 Aug 26 13:28:11.954721: | cleartext fragment f1 73 ec 4f 09 34 1f 84 5c 92 26 4c a5 15 ca 07 Aug 26 13:28:11.954722: | cleartext fragment 1c b8 3a 4a 07 68 b8 da 1e bf d4 65 ac 03 68 8e Aug 26 13:28:11.954724: | cleartext fragment c5 52 2e 1d ee 65 4c 29 4a c3 66 95 94 4b 76 11 Aug 26 13:28:11.954725: | cleartext fragment 9c a1 9e fb 71 0e 24 0a 13 17 a9 68 87 c3 c0 d3 Aug 26 13:28:11.954727: | cleartext fragment a2 e7 b0 a4 eb 32 19 46 42 ba 20 1c d3 cb ad 50 Aug 26 13:28:11.954728: | cleartext fragment 54 af 11 d8 7a 78 2b 06 3f c3 8f 67 ab c1 b8 9e Aug 26 13:28:11.954730: | cleartext fragment bd 50 32 51 c0 32 cf db 23 45 63 13 ba 37 98 71 Aug 26 13:28:11.954732: | cleartext fragment c6 8d 13 a0 58 59 bc 26 0d 6d e0 ab ae d3 63 03 Aug 26 13:28:11.954733: | cleartext fragment 46 7e 63 8c 69 04 b0 28 36 f0 2d ec 4c ec 9e 77 Aug 26 13:28:11.954735: | cleartext fragment ae b9 2a 12 d6 fa a7 a0 fb b4 24 1a d9 17 f5 a3 Aug 26 13:28:11.954736: | cleartext fragment 25 22 69 ad f7 03 b3 ef 94 e5 67 7e 9f b9 4e a9 Aug 26 13:28:11.954738: | cleartext fragment bf e7 46 9c fd ff da 23 4d 3f 6c c5 57 f4 c2 42 Aug 26 13:28:11.954739: | cleartext fragment c3 7a d4 cb 03 7c 8c 42 2c 00 00 a4 02 00 00 20 Aug 26 13:28:11.954741: | cleartext fragment 01 03 04 02 47 b9 08 0b 03 00 00 0c 01 00 00 14 Aug 26 13:28:11.954743: | cleartext fragment 80 0e 01 00 00 00 00 08 05 00 00 00 02 00 00 20 Aug 26 13:28:11.954744: | cleartext fragment 02 03 04 02 47 b9 08 0b 03 00 00 0c 01 00 00 14 Aug 26 13:28:11.954746: | cleartext fragment 80 0e 00 80 00 00 00 08 05 00 00 00 02 00 Aug 26 13:28:11.954748: | adding 1 bytes of padding (including 1 byte padding-length) Aug 26 13:28:11.954750: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Aug 26 13:28:11.954752: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Aug 26 13:28:11.954754: | emitting length of IKEv2 Encrypted Fragment: 511 Aug 26 13:28:11.954756: | emitting length of ISAKMP Message: 539 Aug 26 13:28:11.954771: | **emit ISAKMP Message: Aug 26 13:28:11.954773: | initiator cookie: Aug 26 13:28:11.954775: | ec e3 a0 47 70 a7 9c 09 Aug 26 13:28:11.954776: | responder cookie: Aug 26 13:28:11.954777: | 29 2e 29 53 5c 6d 0a 75 Aug 26 13:28:11.954779: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:28:11.954781: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:28:11.954783: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Aug 26 13:28:11.954785: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Aug 26 13:28:11.954787: | Message ID: 1 (0x1) Aug 26 13:28:11.954788: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:28:11.954790: | ***emit IKEv2 Encrypted Fragment: Aug 26 13:28:11.954792: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:11.954793: | flags: none (0x0) Aug 26 13:28:11.954795: | fragment number: 2 (0x2) Aug 26 13:28:11.954796: | total fragments: 2 (0x2) Aug 26 13:28:11.954798: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE Aug 26 13:28:11.954800: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Aug 26 13:28:11.954802: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Aug 26 13:28:11.954804: | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment Aug 26 13:28:11.954806: | emitting 142 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Aug 26 13:28:11.954808: | cleartext fragment 00 30 03 03 04 04 47 b9 08 0b 03 00 00 0c 01 00 Aug 26 13:28:11.954809: | cleartext fragment 00 0c 80 0e 01 00 03 00 00 08 03 00 00 0e 03 00 Aug 26 13:28:11.954811: | cleartext fragment 00 08 03 00 00 0c 00 00 00 08 05 00 00 00 00 00 Aug 26 13:28:11.954812: | cleartext fragment 00 30 04 03 04 04 47 b9 08 0b 03 00 00 0c 01 00 Aug 26 13:28:11.954814: | cleartext fragment 00 0c 80 0e 00 80 03 00 00 08 03 00 00 0e 03 00 Aug 26 13:28:11.954816: | cleartext fragment 00 08 03 00 00 0c 00 00 00 08 05 00 00 00 2d 00 Aug 26 13:28:11.954817: | cleartext fragment 00 18 01 00 00 00 07 00 00 10 00 00 ff ff c0 01 Aug 26 13:28:11.954819: | cleartext fragment 03 d1 c0 01 03 d1 00 00 00 18 01 00 00 00 07 00 Aug 26 13:28:11.954820: | cleartext fragment 00 10 00 00 ff ff c0 01 02 17 c0 01 02 17 Aug 26 13:28:11.954822: | adding 1 bytes of padding (including 1 byte padding-length) Aug 26 13:28:11.954824: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Aug 26 13:28:11.954828: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Aug 26 13:28:11.954829: | emitting length of IKEv2 Encrypted Fragment: 175 Aug 26 13:28:11.954831: | emitting length of ISAKMP Message: 203 Aug 26 13:28:11.954839: | suspend processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 13:28:11.954842: | start processing: state #2 connection "road-east-ikev2" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 13:28:11.954845: | #2 complete_v2_state_transition() md.from_state=PARENT_I1 md.svm.state[from]=PARENT_I1 UNDEFINED->PARENT_I2 with status STF_OK Aug 26 13:28:11.954847: | IKEv2: transition from state STATE_PARENT_I1 to state STATE_PARENT_I2 Aug 26 13:28:11.954850: | child state #2: UNDEFINED(ignore) => PARENT_I2(open IKE SA) Aug 26 13:28:11.954852: | Message ID: updating counters for #2 to 0 after switching state Aug 26 13:28:11.954857: | Message ID: recv #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1->0 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=-1 Aug 26 13:28:11.954861: | Message ID: sent #1.#2 request 1; ike: initiator.sent=0->1 initiator.recv=0 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->1 wip.responder=-1 Aug 26 13:28:11.954864: "road-east-ikev2" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} Aug 26 13:28:11.954872: | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) Aug 26 13:28:11.954874: | sending fragments ... Aug 26 13:28:11.954878: | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) Aug 26 13:28:11.954880: | ec e3 a0 47 70 a7 9c 09 29 2e 29 53 5c 6d 0a 75 Aug 26 13:28:11.954882: | 35 20 23 08 00 00 00 01 00 00 02 1b 23 00 01 ff Aug 26 13:28:11.954883: | 00 01 00 02 db dd 7d 8e 7d c7 0c 70 2e f3 ad e6 Aug 26 13:28:11.954885: | 6e e4 91 31 18 a6 ca 05 6d f4 41 e7 5f 90 81 8e Aug 26 13:28:11.954888: | 05 a5 5b a7 5e a9 e9 3d 53 85 8e 4b db f5 72 e0 Aug 26 13:28:11.954893: | ae 8d e7 32 90 fa 5f 13 32 3d 97 60 bd ab 46 ed Aug 26 13:28:11.954896: | e1 f5 dc 08 cb aa 89 29 4b 8a f8 34 18 e1 cc ac Aug 26 13:28:11.954898: | f5 31 ac 0d 45 95 79 eb c3 ab 41 53 69 ab 95 bf Aug 26 13:28:11.954901: | ec 6f 51 05 ea 91 07 95 15 8a b6 7e 5b 5b 97 f7 Aug 26 13:28:11.954905: | a3 ff b8 13 33 02 a6 06 58 ca e1 0d 98 1e 1b bc Aug 26 13:28:11.954908: | 5c 13 8e b7 8b f7 9a 3a 05 c6 12 50 22 ee 01 e6 Aug 26 13:28:11.954911: | 06 ae 7e 4c 8e 2a da 77 f1 89 1a 49 ce 2f 36 98 Aug 26 13:28:11.954914: | 1c aa 6c 58 5d c7 97 97 fd 3e 9c 43 23 04 ef e4 Aug 26 13:28:11.954917: | 81 12 be 73 1e 94 69 b9 62 9d 1f 5d f0 01 ee 3b Aug 26 13:28:11.954920: | a4 3c 73 5e 43 f7 e5 9e 06 04 ca eb 3f 45 ea e1 Aug 26 13:28:11.954924: | 32 a5 c1 e9 7c b5 22 c0 04 30 00 25 b0 8e eb ec Aug 26 13:28:11.954926: | 3d 63 4f 8f cf 2f a4 b4 75 ad af 23 dd 3e 9a 84 Aug 26 13:28:11.954927: | f2 03 8c 62 8f ea e7 24 47 83 47 f4 59 14 ec d4 Aug 26 13:28:11.954929: | f8 96 94 11 35 35 ff a1 2d c4 f1 df 44 ba 99 15 Aug 26 13:28:11.954931: | 82 c2 b4 39 5a 42 09 40 80 40 30 1e 47 d3 84 c4 Aug 26 13:28:11.954932: | 3c 19 c7 fb a3 49 c1 14 28 fc 94 91 c8 34 92 be Aug 26 13:28:11.954934: | 6b 4a 30 6e 52 dc e8 3c fb 7d f9 23 ce 45 3c fa Aug 26 13:28:11.954935: | e3 3e 86 45 de 71 ff 98 0b ac d8 b5 06 57 c1 08 Aug 26 13:28:11.954937: | 48 85 97 d4 58 5f 71 8c f5 6c 58 64 05 92 2d 1b Aug 26 13:28:11.954938: | 65 27 1b 6d 20 62 48 93 3d 44 7f f1 6e a4 ec 7a Aug 26 13:28:11.954940: | 9c 95 a2 4a b7 00 c7 69 dc a9 62 3b 20 d8 1e 8e Aug 26 13:28:11.954941: | 2e 5a 74 3e 5f 22 c2 a2 bf 6a 6e 2f 02 3c 5a b3 Aug 26 13:28:11.954943: | 51 6e 27 11 b2 19 9f a0 c7 d4 4e be 55 79 62 80 Aug 26 13:28:11.954944: | 6e 32 4c 5c 10 0c 0e 99 5e 0e 26 43 9e fe 42 b1 Aug 26 13:28:11.954946: | c2 fe 2b 51 30 86 85 bf 77 14 00 5c c4 64 de 37 Aug 26 13:28:11.954947: | 96 aa 29 92 d4 27 90 1f 04 5a b2 9e 88 a8 34 bd Aug 26 13:28:11.954949: | 6a 04 90 14 bb 56 c3 82 bc 5d ae 55 0e eb bf 62 Aug 26 13:28:11.954950: | 6e 9f 97 09 82 0e c6 06 31 e2 ab 61 03 0e 0c 22 Aug 26 13:28:11.954952: | 32 87 76 8b e3 20 c8 40 e2 69 56 Aug 26 13:28:11.955012: | sending 203 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) Aug 26 13:28:11.955018: | ec e3 a0 47 70 a7 9c 09 29 2e 29 53 5c 6d 0a 75 Aug 26 13:28:11.955022: | 35 20 23 08 00 00 00 01 00 00 00 cb 00 00 00 af Aug 26 13:28:11.955025: | 00 02 00 02 77 fe aa 64 68 8c 3d 1b 2d 7d b5 ac Aug 26 13:28:11.955028: | f8 05 a4 8f 7b cf 33 bf 8a 48 bd e4 61 de 5b c6 Aug 26 13:28:11.955030: | a4 1d 7f 67 5d b6 04 cc d0 ed 2b c7 a9 24 b2 13 Aug 26 13:28:11.955033: | 6b 43 e1 60 fc f5 89 ec 1b 83 a3 b5 6f 3d ed fa Aug 26 13:28:11.955037: | 4d 16 03 b5 e4 a6 14 a0 6f 49 b2 c9 ac c6 63 26 Aug 26 13:28:11.955040: | 92 22 df 05 2d 41 65 39 dd 6d 5f c4 e8 bd cc 01 Aug 26 13:28:11.955043: | d9 d1 8b 67 03 5e 83 2f d6 90 e4 92 9f 38 c6 22 Aug 26 13:28:11.955046: | 6b c1 09 6e 3e b3 2f 2d dc 3b f1 d4 33 1f 4b 31 Aug 26 13:28:11.955049: | 52 84 fe 73 eb 47 26 f5 07 f2 7d 65 f6 21 ab f3 Aug 26 13:28:11.955052: | 69 76 77 55 d8 fc c6 55 e6 f1 52 cb 87 ae 3b f2 Aug 26 13:28:11.955055: | 76 7b 58 72 f3 90 e9 5e 25 8f 5e Aug 26 13:28:11.955075: | sent 2 fragments Aug 26 13:28:11.955081: | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=2000ms Aug 26 13:28:11.955086: "road-east-ikev2" #2: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds Aug 26 13:28:11.955098: | event_schedule: new EVENT_RETRANSMIT-pe@0x7fdd18002b78 Aug 26 13:28:11.955103: | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #2 Aug 26 13:28:11.955108: | libevent_malloc: new ptr-libevent@0x557280570d48 size 128 Aug 26 13:28:11.955116: | #2 STATE_PARENT_I2: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11377.697563 Aug 26 13:28:11.955121: | resume sending helper answer for #1 suppresed complete_v2_state_transition() Aug 26 13:28:11.955129: | #1 spent 1.19 milliseconds Aug 26 13:28:11.955134: | #1 spent 6.73 milliseconds in resume sending helper answer Aug 26 13:28:11.955140: | stop processing: state #2 connection "road-east-ikev2" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:28:11.955144: | libevent_free: release ptr-libevent@0x7fdd10000f48 Aug 26 13:28:11.960148: | spent 0.003 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:28:11.960173: | *received 65 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) Aug 26 13:28:11.960177: | ec e3 a0 47 70 a7 9c 09 29 2e 29 53 5c 6d 0a 75 Aug 26 13:28:11.960181: | 2e 20 23 20 00 00 00 01 00 00 00 41 29 00 00 25 Aug 26 13:28:11.960183: | d2 4e ba 87 dc 45 2c 52 d4 e0 23 48 40 02 77 51 Aug 26 13:28:11.960186: | b1 8e 81 50 65 de d1 6a 0e 98 23 6b b9 af 53 27 Aug 26 13:28:11.960188: | 7e Aug 26 13:28:11.960193: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:28:11.960197: | **parse ISAKMP Message: Aug 26 13:28:11.960200: | initiator cookie: Aug 26 13:28:11.960203: | ec e3 a0 47 70 a7 9c 09 Aug 26 13:28:11.960206: | responder cookie: Aug 26 13:28:11.960208: | 29 2e 29 53 5c 6d 0a 75 Aug 26 13:28:11.960211: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Aug 26 13:28:11.960215: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:28:11.960218: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Aug 26 13:28:11.960221: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Aug 26 13:28:11.960223: | Message ID: 1 (0x1) Aug 26 13:28:11.960226: | length: 65 (0x41) Aug 26 13:28:11.960229: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) Aug 26 13:28:11.960234: | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response Aug 26 13:28:11.960238: | State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa) Aug 26 13:28:11.960245: | start processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) Aug 26 13:28:11.960248: | State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip) Aug 26 13:28:11.960253: | suspend processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) Aug 26 13:28:11.960258: | start processing: state #2 connection "road-east-ikev2" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) Aug 26 13:28:11.960261: | #2 is idle Aug 26 13:28:11.960263: | #2 idle Aug 26 13:28:11.960266: | unpacking clear payload Aug 26 13:28:11.960269: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Aug 26 13:28:11.960272: | ***parse IKEv2 Encryption Payload: Aug 26 13:28:11.960275: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:28:11.960281: | flags: none (0x0) Aug 26 13:28:11.960284: | length: 37 (0x25) Aug 26 13:28:11.960287: | processing payload: ISAKMP_NEXT_v2SK (len=33) Aug 26 13:28:11.960316: | #2 in state PARENT_I2: sent v2I2, expected v2R2 Aug 26 13:28:11.960333: | #2 ikev2 ISAKMP_v2_IKE_AUTH decrypt success Aug 26 13:28:11.960336: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 13:28:11.960340: | **parse IKEv2 Notify Payload: Aug 26 13:28:11.960343: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:11.960345: | flags: none (0x0) Aug 26 13:28:11.960348: | length: 8 (0x8) Aug 26 13:28:11.960351: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:28:11.960353: | SPI size: 0 (0x0) Aug 26 13:28:11.960356: | Notify Message Type: v2N_AUTHENTICATION_FAILED (0x18) Aug 26 13:28:11.960359: | processing payload: ISAKMP_NEXT_v2N (len=0) Aug 26 13:28:11.960362: | selected state microcode Initiator: process AUTHENTICATION_FAILED AUTH notification Aug 26 13:28:11.960364: | Now let's proceed with state specific processing Aug 26 13:28:11.960367: | calling processor Initiator: process AUTHENTICATION_FAILED AUTH notification Aug 26 13:28:11.960372: "road-east-ikev2" #2: IKE SA authentication request rejected by peer: AUTHENTICATION_FAILED Aug 26 13:28:11.960384: | pstats #1 ikev2.ike failed auth-failed Aug 26 13:28:11.960388: "road-east-ikev2" #2: scheduling retry attempt 1 of an unlimited number, but releasing whack Aug 26 13:28:11.960395: | release_pending_whacks: state #2 fd@23 .st_dev=9 .st_ino=8885863 Aug 26 13:28:11.960400: | close_any(fd@23) (in release_whack() at state.c:654) Aug 26 13:28:11.960408: | close_any(fd@22) (in release_whack() at state.c:654) Aug 26 13:28:11.960412: | release_pending_whacks: IKE SA #1 fd@-1 has pending CHILD SA with socket fd@23 Aug 26 13:28:11.960418: | libevent_free: release ptr-libevent@0x557280570d48 Aug 26 13:28:11.960421: | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fdd18002b78 Aug 26 13:28:11.960425: | event_schedule: new EVENT_RETRANSMIT-pe@0x7fdd18002b78 Aug 26 13:28:11.960429: | inserting event EVENT_RETRANSMIT, timeout in 59.994681 seconds for #2 Aug 26 13:28:11.960433: | libevent_malloc: new ptr-libevent@0x7fdd10000f48 size 128 Aug 26 13:28:11.960437: "road-east-ikev2" #2: STATE_PARENT_I2: suppressing retransmits; will wait 59.994681 seconds for retry Aug 26 13:28:11.960443: | #2 spent 0.0704 milliseconds in processing: Initiator: process AUTHENTICATION_FAILED AUTH notification in ikev2_process_state_packet() Aug 26 13:28:11.960449: | [RE]START processing: state #2 connection "road-east-ikev2" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 13:28:11.960453: | #2 complete_v2_state_transition() PARENT_I2->PARENT_I2 with status STF_IGNORE Aug 26 13:28:11.960458: | stop processing: state #2 connection "road-east-ikev2" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) Aug 26 13:28:11.960463: | #1 spent 0.277 milliseconds in ikev2_process_packet() Aug 26 13:28:11.960467: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) Aug 26 13:28:11.960471: | processing: STOP state #0 (in process_md() at demux.c:382) Aug 26 13:28:11.960474: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:28:11.960479: | spent 0.293 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:28:15.237488: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:15.237512: | FOR_EACH_STATE_... in show_traffic_status (sort_states) Aug 26 13:28:15.237517: | FOR_EACH_STATE_... in sort_states Aug 26 13:28:15.237525: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:15.237532: | spent 0.0529 milliseconds in whack Aug 26 13:28:16.392724: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:16.393038: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:16.393050: | spent 0.337 milliseconds in whack Aug 26 13:28:16.451894: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:16.451921: | FOR_EACH_STATE_... in show_traffic_status (sort_states) Aug 26 13:28:16.451926: | FOR_EACH_STATE_... in sort_states Aug 26 13:28:16.451937: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:16.451945: | spent 0.0594 milliseconds in whack Aug 26 13:28:16.563622: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:16.563939: | FOR_EACH_CONNECTION_... in show_connections_status Aug 26 13:28:16.563947: | FOR_EACH_CONNECTION_... in show_connections_status Aug 26 13:28:16.564015: | FOR_EACH_STATE_... in show_states_status (sort_states) Aug 26 13:28:16.564019: | FOR_EACH_STATE_... in sort_states Aug 26 13:28:16.564043: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:16.564051: | spent 0.438 milliseconds in whack Aug 26 13:28:17.576637: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:17.576664: shutting down Aug 26 13:28:17.576675: | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825) Aug 26 13:28:17.576679: | certs and keys locked by 'free_preshared_secrets' Aug 26 13:28:17.576682: forgetting secrets Aug 26 13:28:17.576688: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 13:28:17.576694: | unreference key: 0x5572802bc818 192.1.3.209 cnt 1-- Aug 26 13:28:17.576701: | start processing: connection "road-east-ikev2" (in delete_connection() at connections.c:189) Aug 26 13:28:17.576707: | close_any(fd@23) Errno 9: Bad file descriptor (in delete_pending() at pending.c:244) Aug 26 13:28:17.576711: | removing pending policy for no connection {0x5572802ad408} Aug 26 13:28:17.576715: | Deleting states for connection - including all other IPsec SA's of this IKE SA Aug 26 13:28:17.576718: | pass 0 Aug 26 13:28:17.576721: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 13:28:17.576724: | state #2 Aug 26 13:28:17.576729: | suspend processing: connection "road-east-ikev2" (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:28:17.576735: | start processing: state #2 connection "road-east-ikev2" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:28:17.576739: | pstats #2 ikev2.child deleted other Aug 26 13:28:17.576746: | #2 spent 0.0704 milliseconds in total Aug 26 13:28:17.576752: | [RE]START processing: state #2 connection "road-east-ikev2" from 192.1.2.23 (in delete_state() at state.c:879) Aug 26 13:28:17.576757: "road-east-ikev2" #2: deleting state (STATE_PARENT_I2) aged 5.628s and NOT sending notification Aug 26 13:28:17.576761: | child state #2: PARENT_I2(open IKE SA) => delete Aug 26 13:28:17.576765: | child state #2: PARENT_I2(open IKE SA) => CHILDSA_DEL(informational) Aug 26 13:28:17.576769: | state #2 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:28:17.576773: | #2 STATE_CHILDSA_DEL: retransmits: cleared Aug 26 13:28:17.576778: | libevent_free: release ptr-libevent@0x7fdd10000f48 Aug 26 13:28:17.576782: | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fdd18002b78 Aug 26 13:28:17.576787: | priority calculation of connection "road-east-ikev2" is 0xfdfdf Aug 26 13:28:17.576796: | delete inbound eroute 192.1.2.23/32:0 --0-> 192.1.3.209/32:0 => unk255.10000@192.1.3.209 (raw_eroute) Aug 26 13:28:17.577181: | raw_eroute result=success Aug 26 13:28:17.577189: | stop processing: connection "road-east-ikev2" (BACKGROUND) (in update_state_connection() at connections.c:4076) Aug 26 13:28:17.577193: | start processing: connection NULL (in update_state_connection() at connections.c:4077) Aug 26 13:28:17.577197: | in connection_discard for connection road-east-ikev2 Aug 26 13:28:17.577201: | State DB: deleting IKEv2 state #2 in CHILDSA_DEL Aug 26 13:28:17.577205: | child state #2: CHILDSA_DEL(informational) => UNDEFINED(ignore) Aug 26 13:28:17.577215: | stop processing: state #2 from 192.1.2.23 (in delete_state() at state.c:1143) Aug 26 13:28:17.577221: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:28:17.577225: | state #1 Aug 26 13:28:17.577231: | start processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:28:17.577234: | pstats #1 ikev2.ike deleted auth-failed Aug 26 13:28:17.577239: | #1 spent 12.7 milliseconds in total Aug 26 13:28:17.577244: | [RE]START processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in delete_state() at state.c:879) Aug 26 13:28:17.577248: "road-east-ikev2" #1: deleting state (STATE_PARENT_I2) aged 5.636s and NOT sending notification Aug 26 13:28:17.577252: | parent state #1: PARENT_I2(open IKE SA) => delete Aug 26 13:28:17.577255: | state #1 requesting EVENT_SA_REPLACE to be deleted Aug 26 13:28:17.577260: | libevent_free: release ptr-libevent@0x7fdd18002888 Aug 26 13:28:17.577263: | free_event_entry: release EVENT_SA_REPLACE-pe@0x557280570ef8 Aug 26 13:28:17.577267: | State DB: IKEv2 state not found (flush_incomplete_children) Aug 26 13:28:17.577271: | picked newest_isakmp_sa #0 for #1 Aug 26 13:28:17.577274: "road-east-ikev2" #1: deleting IKE SA for connection 'road-east-ikev2' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS Aug 26 13:28:17.577278: | add revival: connection 'road-east-ikev2' added to the list and scheduled for 0 seconds Aug 26 13:28:17.577282: | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds Aug 26 13:28:17.577287: | in connection_discard for connection road-east-ikev2 Aug 26 13:28:17.577305: | State DB: deleting IKEv2 state #1 in PARENT_I2 Aug 26 13:28:17.577309: | parent state #1: PARENT_I2(open IKE SA) => UNDEFINED(ignore) Aug 26 13:28:17.577333: | stop processing: state #1 from 192.1.2.23 (in delete_state() at state.c:1143) Aug 26 13:28:17.577362: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:28:17.577365: | pass 1 Aug 26 13:28:17.577368: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 13:28:17.577372: | free hp@0x5572802bc738 Aug 26 13:28:17.577375: | flush revival: connection 'road-east-ikev2' revival flushed Aug 26 13:28:17.577379: | processing: STOP connection NULL (in discard_connection() at connections.c:249) Aug 26 13:28:17.577391: | crl fetch request list locked by 'free_crl_fetch' Aug 26 13:28:17.577394: | crl fetch request list unlocked by 'free_crl_fetch' Aug 26 13:28:17.577400: shutting down interface lo/lo 127.0.0.1:4500 Aug 26 13:28:17.577404: shutting down interface lo/lo 127.0.0.1:500 Aug 26 13:28:17.577408: shutting down interface eth0/eth0 192.1.3.209:4500 Aug 26 13:28:17.577412: shutting down interface eth0/eth0 192.1.3.209:500 Aug 26 13:28:17.577416: | FOR_EACH_STATE_... in delete_states_dead_interfaces Aug 26 13:28:17.577423: | libevent_free: release ptr-libevent@0x5572802ae088 Aug 26 13:28:17.577427: | free_event_entry: release EVENT_NULL-pe@0x5572802b9e58 Aug 26 13:28:17.577438: | libevent_free: release ptr-libevent@0x5572802701a8 Aug 26 13:28:17.577441: | free_event_entry: release EVENT_NULL-pe@0x5572802b9f08 Aug 26 13:28:17.577449: | libevent_free: release ptr-libevent@0x5572802713d8 Aug 26 13:28:17.577453: | free_event_entry: release EVENT_NULL-pe@0x5572802b9fb8 Aug 26 13:28:17.577459: | libevent_free: release ptr-libevent@0x55728026add8 Aug 26 13:28:17.577463: | free_event_entry: release EVENT_NULL-pe@0x5572802ba068 Aug 26 13:28:17.577469: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 13:28:17.579168: | libevent_free: release ptr-libevent@0x5572802ae138 Aug 26 13:28:17.579184: | free_event_entry: release EVENT_NULL-pe@0x5572802a21d8 Aug 26 13:28:17.579191: | libevent_free: release ptr-libevent@0x5572802700f8 Aug 26 13:28:17.579195: | free_event_entry: release EVENT_NULL-pe@0x5572802a1d38 Aug 26 13:28:17.579199: | libevent_free: release ptr-libevent@0x55728029a7d8 Aug 26 13:28:17.579203: | free_event_entry: release EVENT_NULL-pe@0x55728029bfc8 Aug 26 13:28:17.579210: | global timer EVENT_REINIT_SECRET uninitialized Aug 26 13:28:17.579214: | global timer EVENT_SHUNT_SCAN uninitialized Aug 26 13:28:17.579217: | global timer EVENT_PENDING_DDNS uninitialized Aug 26 13:28:17.579220: | global timer EVENT_PENDING_PHASE2 uninitialized Aug 26 13:28:17.579223: | global timer EVENT_CHECK_CRLS uninitialized Aug 26 13:28:17.579227: | global timer EVENT_REVIVE_CONNS uninitialized Aug 26 13:28:17.579230: | global timer EVENT_FREE_ROOT_CERTS uninitialized Aug 26 13:28:17.579234: | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized Aug 26 13:28:17.579237: | global timer EVENT_NAT_T_KEEPALIVE uninitialized Aug 26 13:28:17.579242: | libevent_free: release ptr-libevent@0x5572801fda28 Aug 26 13:28:17.579246: | signal event handler PLUTO_SIGCHLD uninstalled Aug 26 13:28:17.579250: | libevent_free: release ptr-libevent@0x5572802b9798 Aug 26 13:28:17.579253: | signal event handler PLUTO_SIGTERM uninstalled Aug 26 13:28:17.579257: | libevent_free: release ptr-libevent@0x5572802b98a8 Aug 26 13:28:17.579260: | signal event handler PLUTO_SIGHUP uninstalled Aug 26 13:28:17.579264: | libevent_free: release ptr-libevent@0x5572802b9ae8 Aug 26 13:28:17.579267: | signal event handler PLUTO_SIGSYS uninstalled Aug 26 13:28:17.579270: | releasing event base Aug 26 13:28:17.579283: | libevent_free: release ptr-libevent@0x5572802b99b8 Aug 26 13:28:17.579287: | libevent_free: release ptr-libevent@0x55728029c5f8 Aug 26 13:28:17.579299: | libevent_free: release ptr-libevent@0x55728029c5a8 Aug 26 13:28:17.579303: | libevent_free: release ptr-libevent@0x55728026b1d8 Aug 26 13:28:17.579306: | libevent_free: release ptr-libevent@0x55728029c568 Aug 26 13:28:17.579310: | libevent_free: release ptr-libevent@0x5572802b9448 Aug 26 13:28:17.579313: | libevent_free: release ptr-libevent@0x5572802b9718 Aug 26 13:28:17.579316: | libevent_free: release ptr-libevent@0x55728029c7a8 Aug 26 13:28:17.579320: | libevent_free: release ptr-libevent@0x5572802a19c8 Aug 26 13:28:17.579323: | libevent_free: release ptr-libevent@0x5572802a22e8 Aug 26 13:28:17.579326: | libevent_free: release ptr-libevent@0x557280571198 Aug 26 13:28:17.579330: | libevent_free: release ptr-libevent@0x5572802ba0d8 Aug 26 13:28:17.579333: | libevent_free: release ptr-libevent@0x5572802ba028 Aug 26 13:28:17.579336: | libevent_free: release ptr-libevent@0x5572802b9f78 Aug 26 13:28:17.579340: | libevent_free: release ptr-libevent@0x5572802b9ec8 Aug 26 13:28:17.579343: | libevent_free: release ptr-libevent@0x55728056f158 Aug 26 13:28:17.579346: | libevent_free: release ptr-libevent@0x55728056f238 Aug 26 13:28:17.579349: | libevent_free: release ptr-libevent@0x5572801fccd8 Aug 26 13:28:17.579353: | libevent_free: release ptr-libevent@0x5572802b9868 Aug 26 13:28:17.579356: | libevent_free: release ptr-libevent@0x5572802b9758 Aug 26 13:28:17.579360: | libevent_free: release ptr-libevent@0x5572802b9618 Aug 26 13:28:17.579363: | libevent_free: release ptr-libevent@0x5572802b9978 Aug 26 13:28:17.579367: | libevent_free: release ptr-libevent@0x5572802b94e8 Aug 26 13:28:17.579370: | libevent_free: release ptr-libevent@0x55728026c358 Aug 26 13:28:17.579374: | libevent_free: release ptr-libevent@0x55728026c2d8 Aug 26 13:28:17.579377: | libevent_free: release ptr-libevent@0x5572801fd048 Aug 26 13:28:17.579380: | releasing global libevent data Aug 26 13:28:17.579384: | libevent_free: release ptr-libevent@0x55728026aa08 Aug 26 13:28:17.579387: | libevent_free: release ptr-libevent@0x55728026c458 Aug 26 13:28:17.579391: | libevent_free: release ptr-libevent@0x55728026c3d8 Aug 26 13:28:17.579539: leak detective found no leaks