Aug 26 13:28:12.744606: FIPS Product: YES Aug 26 13:28:12.744726: FIPS Kernel: NO Aug 26 13:28:12.744729: FIPS Mode: NO Aug 26 13:28:12.744732: NSS DB directory: sql:/etc/ipsec.d Aug 26 13:28:12.744875: Initializing NSS Aug 26 13:28:12.744882: Opening NSS database "sql:/etc/ipsec.d" read-only Aug 26 13:28:12.772838: NSS initialized Aug 26 13:28:12.772855: NSS crypto library initialized Aug 26 13:28:12.772857: FIPS HMAC integrity support [enabled] Aug 26 13:28:12.772858: FIPS mode disabled for pluto daemon Aug 26 13:28:12.806218: FIPS HMAC integrity verification self-test FAILED Aug 26 13:28:12.806364: libcap-ng support [enabled] Aug 26 13:28:12.806375: Linux audit support [enabled] Aug 26 13:28:12.806593: Linux audit activated Aug 26 13:28:12.806598: Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:16788 Aug 26 13:28:12.806600: core dump dir: /tmp Aug 26 13:28:12.806602: secrets file: /etc/ipsec.secrets Aug 26 13:28:12.806603: leak-detective enabled Aug 26 13:28:12.806604: NSS crypto [enabled] Aug 26 13:28:12.806606: XAUTH PAM support [enabled] Aug 26 13:28:12.806664: | libevent is using pluto's memory allocator Aug 26 13:28:12.806669: Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) Aug 26 13:28:12.806681: | libevent_malloc: new ptr-libevent@0x556a6a57e348 size 40 Aug 26 13:28:12.806686: | libevent_malloc: new ptr-libevent@0x556a6a57e2c8 size 40 Aug 26 13:28:12.806688: | libevent_malloc: new ptr-libevent@0x556a6a57e248 size 40 Aug 26 13:28:12.806690: | creating event base Aug 26 13:28:12.806692: | libevent_malloc: new ptr-libevent@0x556a6a57e9c8 size 56 Aug 26 13:28:12.806695: | libevent_malloc: new ptr-libevent@0x556a6a507748 size 664 Aug 26 13:28:12.806703: | libevent_malloc: new ptr-libevent@0x556a6a5aee68 size 24 Aug 26 13:28:12.806706: | libevent_malloc: new ptr-libevent@0x556a6a5af598 size 384 Aug 26 13:28:12.806715: | libevent_malloc: new ptr-libevent@0x556a6a5af748 size 16 Aug 26 13:28:12.806717: | libevent_malloc: new ptr-libevent@0x556a6a57e1c8 size 40 Aug 26 13:28:12.806719: | libevent_malloc: new ptr-libevent@0x556a6a57e148 size 48 Aug 26 13:28:12.806724: | libevent_realloc: new ptr-libevent@0x556a6a50a868 size 256 Aug 26 13:28:12.806725: | libevent_malloc: new ptr-libevent@0x556a6a5af788 size 16 Aug 26 13:28:12.806729: | libevent_free: release ptr-libevent@0x556a6a57e9c8 Aug 26 13:28:12.806732: | libevent initialized Aug 26 13:28:12.806734: | libevent_realloc: new ptr-libevent@0x556a6a57e9c8 size 64 Aug 26 13:28:12.806737: | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds Aug 26 13:28:12.806751: | init_nat_traversal() initialized with keep_alive=0s Aug 26 13:28:12.806752: NAT-Traversal support [enabled] Aug 26 13:28:12.806754: | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized Aug 26 13:28:12.806759: | global one-shot timer EVENT_FREE_ROOT_CERTS initialized Aug 26 13:28:12.806761: | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds Aug 26 13:28:12.806787: | global one-shot timer EVENT_REVIVE_CONNS initialized Aug 26 13:28:12.806789: | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds Aug 26 13:28:12.806791: | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Aug 26 13:28:12.806823: Encryption algorithms: Aug 26 13:28:12.806829: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c Aug 26 13:28:12.806832: AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b Aug 26 13:28:12.806834: AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a Aug 26 13:28:12.806836: 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des Aug 26 13:28:12.806838: CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} Aug 26 13:28:12.806845: CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia Aug 26 13:28:12.806848: AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c Aug 26 13:28:12.806850: AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b Aug 26 13:28:12.806852: AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a Aug 26 13:28:12.806855: AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr Aug 26 13:28:12.806857: AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes Aug 26 13:28:12.806859: SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent Aug 26 13:28:12.806861: TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish Aug 26 13:28:12.806863: TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh Aug 26 13:28:12.806866: NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac Aug 26 13:28:12.806867: NULL IKEv1: ESP IKEv2: ESP [] Aug 26 13:28:12.806869: CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Aug 26 13:28:12.806874: Hash algorithms: Aug 26 13:28:12.806876: MD5 IKEv1: IKE IKEv2: Aug 26 13:28:12.806878: SHA1 IKEv1: IKE IKEv2: FIPS sha Aug 26 13:28:12.806880: SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 Aug 26 13:28:12.806882: SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 Aug 26 13:28:12.806883: SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 Aug 26 13:28:12.806892: PRF algorithms: Aug 26 13:28:12.806894: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 Aug 26 13:28:12.806896: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 Aug 26 13:28:12.806898: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 Aug 26 13:28:12.806900: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 Aug 26 13:28:12.806902: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 Aug 26 13:28:12.806904: AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Aug 26 13:28:12.806919: Integrity algorithms: Aug 26 13:28:12.806922: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 Aug 26 13:28:12.806924: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 Aug 26 13:28:12.806926: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 Aug 26 13:28:12.806929: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 Aug 26 13:28:12.806931: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 Aug 26 13:28:12.806933: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH Aug 26 13:28:12.806935: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 Aug 26 13:28:12.806937: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac Aug 26 13:28:12.806939: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null Aug 26 13:28:12.806946: DH algorithms: Aug 26 13:28:12.806949: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 Aug 26 13:28:12.806950: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 Aug 26 13:28:12.806952: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 Aug 26 13:28:12.806955: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 Aug 26 13:28:12.806957: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 Aug 26 13:28:12.806959: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 Aug 26 13:28:12.806961: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 Aug 26 13:28:12.806963: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 Aug 26 13:28:12.806965: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 Aug 26 13:28:12.806967: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 Aug 26 13:28:12.806969: DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 Aug 26 13:28:12.806970: testing CAMELLIA_CBC: Aug 26 13:28:12.806972: Camellia: 16 bytes with 128-bit key Aug 26 13:28:12.807057: Camellia: 16 bytes with 128-bit key Aug 26 13:28:12.807076: Camellia: 16 bytes with 256-bit key Aug 26 13:28:12.807094: Camellia: 16 bytes with 256-bit key Aug 26 13:28:12.807111: testing AES_GCM_16: Aug 26 13:28:12.807113: empty string Aug 26 13:28:12.807133: one block Aug 26 13:28:12.807149: two blocks Aug 26 13:28:12.807164: two blocks with associated data Aug 26 13:28:12.807180: testing AES_CTR: Aug 26 13:28:12.807182: Encrypting 16 octets using AES-CTR with 128-bit key Aug 26 13:28:12.807199: Encrypting 32 octets using AES-CTR with 128-bit key Aug 26 13:28:12.807217: Encrypting 36 octets using AES-CTR with 128-bit key Aug 26 13:28:12.807234: Encrypting 16 octets using AES-CTR with 192-bit key Aug 26 13:28:12.807250: Encrypting 32 octets using AES-CTR with 192-bit key Aug 26 13:28:12.807266: Encrypting 36 octets using AES-CTR with 192-bit key Aug 26 13:28:12.807282: Encrypting 16 octets using AES-CTR with 256-bit key Aug 26 13:28:12.807323: Encrypting 32 octets using AES-CTR with 256-bit key Aug 26 13:28:12.807356: Encrypting 36 octets using AES-CTR with 256-bit key Aug 26 13:28:12.807373: testing AES_CBC: Aug 26 13:28:12.807375: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Aug 26 13:28:12.807391: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Aug 26 13:28:12.807408: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Aug 26 13:28:12.807425: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key Aug 26 13:28:12.807445: testing AES_XCBC: Aug 26 13:28:12.807447: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input Aug 26 13:28:12.807521: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input Aug 26 13:28:12.807598: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input Aug 26 13:28:12.807673: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input Aug 26 13:28:12.807749: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input Aug 26 13:28:12.807822: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input Aug 26 13:28:12.807899: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input Aug 26 13:28:12.808063: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) Aug 26 13:28:12.808138: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) Aug 26 13:28:12.808219: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) Aug 26 13:28:12.808382: testing HMAC_MD5: Aug 26 13:28:12.808386: RFC 2104: MD5_HMAC test 1 Aug 26 13:28:12.808493: RFC 2104: MD5_HMAC test 2 Aug 26 13:28:12.808587: RFC 2104: MD5_HMAC test 3 Aug 26 13:28:12.808735: 8 CPU cores online Aug 26 13:28:12.808738: starting up 7 crypto helpers Aug 26 13:28:12.808769: started thread for crypto helper 0 Aug 26 13:28:12.808834: started thread for crypto helper 1 Aug 26 13:28:12.808863: started thread for crypto helper 2 Aug 26 13:28:12.808876: | starting up helper thread 2 Aug 26 13:28:12.808888: started thread for crypto helper 3 Aug 26 13:28:12.808894: | status value returned by setting the priority of this thread (crypto helper 2) 22 Aug 26 13:28:12.808902: | crypto helper 2 waiting (nothing to do) Aug 26 13:28:12.808916: started thread for crypto helper 4 Aug 26 13:28:12.808918: | starting up helper thread 4 Aug 26 13:28:12.808924: | status value returned by setting the priority of this thread (crypto helper 4) 22 Aug 26 13:28:12.808927: | crypto helper 4 waiting (nothing to do) Aug 26 13:28:12.808938: started thread for crypto helper 5 Aug 26 13:28:12.808941: | starting up helper thread 5 Aug 26 13:28:12.808972: | status value returned by setting the priority of this thread (crypto helper 5) 22 Aug 26 13:28:12.808974: | crypto helper 5 waiting (nothing to do) Aug 26 13:28:12.808990: started thread for crypto helper 6 Aug 26 13:28:12.808992: | starting up helper thread 6 Aug 26 13:28:12.809003: | status value returned by setting the priority of this thread (crypto helper 6) 22 Aug 26 13:28:12.808995: | checking IKEv1 state table Aug 26 13:28:12.809023: | MAIN_R0: category: half-open IKE SA flags: 0: Aug 26 13:28:12.809026: | -> MAIN_R1 EVENT_SO_DISCARD Aug 26 13:28:12.809029: | MAIN_I1: category: half-open IKE SA flags: 0: Aug 26 13:28:12.809032: | -> MAIN_I2 EVENT_RETRANSMIT Aug 26 13:28:12.809034: | MAIN_R1: category: open IKE SA flags: 200: Aug 26 13:28:12.809036: | -> MAIN_R2 EVENT_RETRANSMIT Aug 26 13:28:12.809038: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:28:12.809040: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:28:12.809042: | MAIN_I2: category: open IKE SA flags: 0: Aug 26 13:28:12.809044: | -> MAIN_I3 EVENT_RETRANSMIT Aug 26 13:28:12.809046: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:28:12.809048: | -> UNDEFINED EVENT_RETRANSMIT Aug 26 13:28:12.808962: | starting up helper thread 3 Aug 26 13:28:12.809048: | starting up helper thread 0 Aug 26 13:28:12.809061: | status value returned by setting the priority of this thread (crypto helper 3) 22 Aug 26 13:28:12.809050: | MAIN_R2: category: open IKE SA flags: 0: Aug 26 13:28:12.809066: | status value returned by setting the priority of this thread (crypto helper 0) 22 Aug 26 13:28:12.809006: | crypto helper 6 waiting (nothing to do) Aug 26 13:28:12.809068: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:28:12.809081: | crypto helper 3 waiting (nothing to do) Aug 26 13:28:12.809081: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:28:12.809090: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 13:28:12.809093: | MAIN_I3: category: open IKE SA flags: 0: Aug 26 13:28:12.809096: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:28:12.809096: | starting up helper thread 1 Aug 26 13:28:12.809099: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:28:12.809101: | crypto helper 0 waiting (nothing to do) Aug 26 13:28:12.810194: | -> UNDEFINED EVENT_SA_REPLACE Aug 26 13:28:12.810193: | status value returned by setting the priority of this thread (crypto helper 1) 22 Aug 26 13:28:12.810205: | MAIN_R3: category: established IKE SA flags: 200: Aug 26 13:28:12.810210: | crypto helper 1 waiting (nothing to do) Aug 26 13:28:12.810213: | -> UNDEFINED EVENT_NULL Aug 26 13:28:12.810216: | MAIN_I4: category: established IKE SA flags: 0: Aug 26 13:28:12.810218: | -> UNDEFINED EVENT_NULL Aug 26 13:28:12.810220: | AGGR_R0: category: half-open IKE SA flags: 0: Aug 26 13:28:12.810221: | -> AGGR_R1 EVENT_SO_DISCARD Aug 26 13:28:12.810223: | AGGR_I1: category: half-open IKE SA flags: 0: Aug 26 13:28:12.810225: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 13:28:12.810226: | -> AGGR_I2 EVENT_SA_REPLACE Aug 26 13:28:12.810228: | AGGR_R1: category: open IKE SA flags: 200: Aug 26 13:28:12.810230: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 13:28:12.810231: | -> AGGR_R2 EVENT_SA_REPLACE Aug 26 13:28:12.810233: | AGGR_I2: category: established IKE SA flags: 200: Aug 26 13:28:12.810234: | -> UNDEFINED EVENT_NULL Aug 26 13:28:12.810236: | AGGR_R2: category: established IKE SA flags: 0: Aug 26 13:28:12.810238: | -> UNDEFINED EVENT_NULL Aug 26 13:28:12.810239: | QUICK_R0: category: established CHILD SA flags: 0: Aug 26 13:28:12.810241: | -> QUICK_R1 EVENT_RETRANSMIT Aug 26 13:28:12.810246: | QUICK_I1: category: established CHILD SA flags: 0: Aug 26 13:28:12.810248: | -> QUICK_I2 EVENT_SA_REPLACE Aug 26 13:28:12.810249: | QUICK_R1: category: established CHILD SA flags: 0: Aug 26 13:28:12.810251: | -> QUICK_R2 EVENT_SA_REPLACE Aug 26 13:28:12.810253: | QUICK_I2: category: established CHILD SA flags: 200: Aug 26 13:28:12.810254: | -> UNDEFINED EVENT_NULL Aug 26 13:28:12.810256: | QUICK_R2: category: established CHILD SA flags: 0: Aug 26 13:28:12.810257: | -> UNDEFINED EVENT_NULL Aug 26 13:28:12.810259: | INFO: category: informational flags: 0: Aug 26 13:28:12.810261: | -> UNDEFINED EVENT_NULL Aug 26 13:28:12.810262: | INFO_PROTECTED: category: informational flags: 0: Aug 26 13:28:12.810264: | -> UNDEFINED EVENT_NULL Aug 26 13:28:12.810265: | XAUTH_R0: category: established IKE SA flags: 0: Aug 26 13:28:12.810267: | -> XAUTH_R1 EVENT_NULL Aug 26 13:28:12.810269: | XAUTH_R1: category: established IKE SA flags: 0: Aug 26 13:28:12.810270: | -> MAIN_R3 EVENT_SA_REPLACE Aug 26 13:28:12.810272: | MODE_CFG_R0: category: informational flags: 0: Aug 26 13:28:12.810274: | -> MODE_CFG_R1 EVENT_SA_REPLACE Aug 26 13:28:12.810275: | MODE_CFG_R1: category: established IKE SA flags: 0: Aug 26 13:28:12.810277: | -> MODE_CFG_R2 EVENT_SA_REPLACE Aug 26 13:28:12.810279: | MODE_CFG_R2: category: established IKE SA flags: 0: Aug 26 13:28:12.810280: | -> UNDEFINED EVENT_NULL Aug 26 13:28:12.810282: | MODE_CFG_I1: category: established IKE SA flags: 0: Aug 26 13:28:12.810283: | -> MAIN_I4 EVENT_SA_REPLACE Aug 26 13:28:12.810285: | XAUTH_I0: category: established IKE SA flags: 0: Aug 26 13:28:12.810287: | -> XAUTH_I1 EVENT_RETRANSMIT Aug 26 13:28:12.810308: | XAUTH_I1: category: established IKE SA flags: 0: Aug 26 13:28:12.810313: | -> MAIN_I4 EVENT_RETRANSMIT Aug 26 13:28:12.810320: | checking IKEv2 state table Aug 26 13:28:12.810327: | PARENT_I0: category: ignore flags: 0: Aug 26 13:28:12.810331: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) Aug 26 13:28:12.810335: | PARENT_I1: category: half-open IKE SA flags: 0: Aug 26 13:28:12.810338: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) Aug 26 13:28:12.810341: | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) Aug 26 13:28:12.810345: | PARENT_I2: category: open IKE SA flags: 0: Aug 26 13:28:12.810348: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) Aug 26 13:28:12.810352: | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) Aug 26 13:28:12.810355: | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) Aug 26 13:28:12.810358: | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) Aug 26 13:28:12.810361: | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) Aug 26 13:28:12.810364: | PARENT_I3: category: established IKE SA flags: 0: Aug 26 13:28:12.810368: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) Aug 26 13:28:12.810371: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) Aug 26 13:28:12.810374: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) Aug 26 13:28:12.810376: | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) Aug 26 13:28:12.810380: | PARENT_R0: category: half-open IKE SA flags: 0: Aug 26 13:28:12.810383: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) Aug 26 13:28:12.810387: | PARENT_R1: category: half-open IKE SA flags: 0: Aug 26 13:28:12.810390: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) Aug 26 13:28:12.810393: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) Aug 26 13:28:12.810397: | PARENT_R2: category: established IKE SA flags: 0: Aug 26 13:28:12.810400: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) Aug 26 13:28:12.810406: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) Aug 26 13:28:12.810410: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) Aug 26 13:28:12.810413: | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) Aug 26 13:28:12.810417: | V2_CREATE_I0: category: established IKE SA flags: 0: Aug 26 13:28:12.810420: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) Aug 26 13:28:12.810423: | V2_CREATE_I: category: established IKE SA flags: 0: Aug 26 13:28:12.810426: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) Aug 26 13:28:12.810430: | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: Aug 26 13:28:12.810433: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) Aug 26 13:28:12.810437: | V2_REKEY_IKE_I: category: established IKE SA flags: 0: Aug 26 13:28:12.810440: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) Aug 26 13:28:12.810444: | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: Aug 26 13:28:12.810447: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) Aug 26 13:28:12.810451: | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: Aug 26 13:28:12.810455: | V2_CREATE_R: category: established IKE SA flags: 0: Aug 26 13:28:12.810458: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) Aug 26 13:28:12.810462: | V2_REKEY_IKE_R: category: established IKE SA flags: 0: Aug 26 13:28:12.810465: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) Aug 26 13:28:12.810471: | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: Aug 26 13:28:12.810477: | V2_IPSEC_I: category: established CHILD SA flags: 0: Aug 26 13:28:12.810480: | V2_IPSEC_R: category: established CHILD SA flags: 0: Aug 26 13:28:12.810483: | IKESA_DEL: category: established IKE SA flags: 0: Aug 26 13:28:12.810486: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) Aug 26 13:28:12.810489: | CHILDSA_DEL: category: informational flags: 0: Aug 26 13:28:12.810524: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 Aug 26 13:28:12.810898: | Hard-wiring algorithms Aug 26 13:28:12.810905: | adding AES_CCM_16 to kernel algorithm db Aug 26 13:28:12.810911: | adding AES_CCM_12 to kernel algorithm db Aug 26 13:28:12.810913: | adding AES_CCM_8 to kernel algorithm db Aug 26 13:28:12.810916: | adding 3DES_CBC to kernel algorithm db Aug 26 13:28:12.810919: | adding CAMELLIA_CBC to kernel algorithm db Aug 26 13:28:12.810922: | adding AES_GCM_16 to kernel algorithm db Aug 26 13:28:12.810924: | adding AES_GCM_12 to kernel algorithm db Aug 26 13:28:12.810927: | adding AES_GCM_8 to kernel algorithm db Aug 26 13:28:12.810930: | adding AES_CTR to kernel algorithm db Aug 26 13:28:12.810933: | adding AES_CBC to kernel algorithm db Aug 26 13:28:12.810936: | adding SERPENT_CBC to kernel algorithm db Aug 26 13:28:12.810939: | adding TWOFISH_CBC to kernel algorithm db Aug 26 13:28:12.810943: | adding NULL_AUTH_AES_GMAC to kernel algorithm db Aug 26 13:28:12.810946: | adding NULL to kernel algorithm db Aug 26 13:28:12.810949: | adding CHACHA20_POLY1305 to kernel algorithm db Aug 26 13:28:12.810953: | adding HMAC_MD5_96 to kernel algorithm db Aug 26 13:28:12.810956: | adding HMAC_SHA1_96 to kernel algorithm db Aug 26 13:28:12.810959: | adding HMAC_SHA2_512_256 to kernel algorithm db Aug 26 13:28:12.810962: | adding HMAC_SHA2_384_192 to kernel algorithm db Aug 26 13:28:12.810966: | adding HMAC_SHA2_256_128 to kernel algorithm db Aug 26 13:28:12.810969: | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db Aug 26 13:28:12.810972: | adding AES_XCBC_96 to kernel algorithm db Aug 26 13:28:12.810975: | adding AES_CMAC_96 to kernel algorithm db Aug 26 13:28:12.810977: | adding NONE to kernel algorithm db Aug 26 13:28:12.811007: | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes Aug 26 13:28:12.811017: | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds Aug 26 13:28:12.811021: | setup kernel fd callback Aug 26 13:28:12.811025: | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x556a6a5af338 Aug 26 13:28:12.811030: | libevent_malloc: new ptr-libevent@0x556a6a5ad7b8 size 128 Aug 26 13:28:12.811034: | libevent_malloc: new ptr-libevent@0x556a6a5b49a8 size 16 Aug 26 13:28:12.811042: | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x556a6a5b4d18 Aug 26 13:28:12.811046: | libevent_malloc: new ptr-libevent@0x556a6a582558 size 128 Aug 26 13:28:12.811049: | libevent_malloc: new ptr-libevent@0x556a6a5b52c8 size 16 Aug 26 13:28:12.811304: | global one-shot timer EVENT_CHECK_CRLS initialized Aug 26 13:28:12.811318: selinux support is enabled. Aug 26 13:28:12.811969: | unbound context created - setting debug level to 5 Aug 26 13:28:12.812002: | /etc/hosts lookups activated Aug 26 13:28:12.812023: | /etc/resolv.conf usage activated Aug 26 13:28:12.812097: | outgoing-port-avoid set 0-65535 Aug 26 13:28:12.812132: | outgoing-port-permit set 32768-60999 Aug 26 13:28:12.812136: | Loading dnssec root key from:/var/lib/unbound/root.key Aug 26 13:28:12.812261: | Added contents of trusted key file /testing/baseconfigs/all/etc/bind/keys/testing.key to unbound resolver context Aug 26 13:28:12.812266: | Setting up events, loop start Aug 26 13:28:12.812270: | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x556a6a5b51b8 Aug 26 13:28:12.812274: | libevent_malloc: new ptr-libevent@0x556a6a5c1018 size 128 Aug 26 13:28:12.812277: | libevent_malloc: new ptr-libevent@0x556a6a5cc2a8 size 16 Aug 26 13:28:12.812285: | libevent_realloc: new ptr-libevent@0x556a6a5073d8 size 256 Aug 26 13:28:12.812336: | libevent_malloc: new ptr-libevent@0x556a6a5cc348 size 8 Aug 26 13:28:12.812344: | libevent_realloc: new ptr-libevent@0x556a6a5cc388 size 144 Aug 26 13:28:12.812347: | libevent_malloc: new ptr-libevent@0x556a6a508198 size 152 Aug 26 13:28:12.812351: | libevent_malloc: new ptr-libevent@0x556a6a5cc448 size 16 Aug 26 13:28:12.812356: | signal event handler PLUTO_SIGCHLD installed Aug 26 13:28:12.812359: | libevent_malloc: new ptr-libevent@0x556a6a5cc488 size 8 Aug 26 13:28:12.812363: | libevent_malloc: new ptr-libevent@0x556a6a50bdd8 size 152 Aug 26 13:28:12.812366: | signal event handler PLUTO_SIGTERM installed Aug 26 13:28:12.812369: | libevent_malloc: new ptr-libevent@0x556a6a5cc4c8 size 8 Aug 26 13:28:12.812372: | libevent_malloc: new ptr-libevent@0x556a6a5cc508 size 152 Aug 26 13:28:12.812375: | signal event handler PLUTO_SIGHUP installed Aug 26 13:28:12.812379: | libevent_malloc: new ptr-libevent@0x556a6a5cc5d8 size 8 Aug 26 13:28:12.812382: | libevent_realloc: release ptr-libevent@0x556a6a5cc388 Aug 26 13:28:12.812386: | libevent_realloc: new ptr-libevent@0x556a6a5cc618 size 256 Aug 26 13:28:12.812390: | libevent_malloc: new ptr-libevent@0x556a6a5cc748 size 152 Aug 26 13:28:12.812394: | signal event handler PLUTO_SIGSYS installed Aug 26 13:28:12.812803: | created addconn helper (pid:16843) using fork+execve Aug 26 13:28:12.812825: | forked child 16843 Aug 26 13:28:12.813237: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:12.813732: listening for IKE messages Aug 26 13:28:12.816424: | Inspecting interface lo Aug 26 13:28:12.816451: | found lo with address 127.0.0.1 Aug 26 13:28:12.816460: | Inspecting interface eth0 Aug 26 13:28:12.816464: | found eth0 with address 192.1.3.209 Aug 26 13:28:12.816924: Kernel supports NIC esp-hw-offload Aug 26 13:28:12.816947: adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.209:500 Aug 26 13:28:12.817046: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 13:28:12.817053: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 13:28:12.817057: adding interface eth0/eth0 192.1.3.209:4500 Aug 26 13:28:12.817087: adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 Aug 26 13:28:12.817128: | NAT-Traversal: Trying sockopt style NAT-T Aug 26 13:28:12.817133: | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 Aug 26 13:28:12.817137: adding interface lo/lo 127.0.0.1:4500 Aug 26 13:28:12.817231: | no interfaces to sort Aug 26 13:28:12.817237: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 13:28:12.817245: | add_fd_read_event_handler: new ethX-pe@0x556a6a5ccb48 Aug 26 13:28:12.817251: | libevent_malloc: new ptr-libevent@0x556a6a5c0f68 size 128 Aug 26 13:28:12.817256: | libevent_malloc: new ptr-libevent@0x556a6a5ccbb8 size 16 Aug 26 13:28:12.817264: | setup callback for interface lo 127.0.0.1:4500 fd 20 Aug 26 13:28:12.817267: | add_fd_read_event_handler: new ethX-pe@0x556a6a5ccbf8 Aug 26 13:28:12.817271: | libevent_malloc: new ptr-libevent@0x556a6a582608 size 128 Aug 26 13:28:12.817275: | libevent_malloc: new ptr-libevent@0x556a6a5ccc68 size 16 Aug 26 13:28:12.817278: | setup callback for interface lo 127.0.0.1:500 fd 19 Aug 26 13:28:12.817280: | add_fd_read_event_handler: new ethX-pe@0x556a6a5ccca8 Aug 26 13:28:12.817283: | libevent_malloc: new ptr-libevent@0x556a6a584358 size 128 Aug 26 13:28:12.817285: | libevent_malloc: new ptr-libevent@0x556a6a5ccd18 size 16 Aug 26 13:28:12.817298: | setup callback for interface eth0 192.1.3.209:4500 fd 18 Aug 26 13:28:12.817305: | add_fd_read_event_handler: new ethX-pe@0x556a6a5ccd58 Aug 26 13:28:12.817307: | libevent_malloc: new ptr-libevent@0x556a6a5aefd8 size 128 Aug 26 13:28:12.817309: | libevent_malloc: new ptr-libevent@0x556a6a5ccdc8 size 16 Aug 26 13:28:12.817313: | setup callback for interface eth0 192.1.3.209:500 fd 17 Aug 26 13:28:12.817316: | certs and keys locked by 'free_preshared_secrets' Aug 26 13:28:12.817318: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 13:28:12.817343: loading secrets from "/etc/ipsec.secrets" Aug 26 13:28:12.817382: | saving Modulus Aug 26 13:28:12.817389: | saving PublicExponent Aug 26 13:28:12.817430: | computed rsa CKAID 1a 15 cc e8 92 73 43 9c 2b f4 20 2a c1 06 6e f2 Aug 26 13:28:12.817436: | computed rsa CKAID 59 b0 ef 45 Aug 26 13:28:12.817441: loaded private key for keyid: PKK_RSA:AQPHFfpyJ Aug 26 13:28:12.817450: | certs and keys locked by 'process_secret' Aug 26 13:28:12.817455: | certs and keys unlocked by 'process_secret' Aug 26 13:28:12.817467: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:12.817476: | spent 1.3 milliseconds in whack Aug 26 13:28:12.833934: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:12.833957: listening for IKE messages Aug 26 13:28:12.833986: | Inspecting interface lo Aug 26 13:28:12.833991: | found lo with address 127.0.0.1 Aug 26 13:28:12.833993: | Inspecting interface eth0 Aug 26 13:28:12.833996: | found eth0 with address 192.1.3.209 Aug 26 13:28:12.834041: | no interfaces to sort Aug 26 13:28:12.834047: | libevent_free: release ptr-libevent@0x556a6a5c0f68 Aug 26 13:28:12.834050: | free_event_entry: release EVENT_NULL-pe@0x556a6a5ccb48 Aug 26 13:28:12.834052: | add_fd_read_event_handler: new ethX-pe@0x556a6a5ccb48 Aug 26 13:28:12.834054: | libevent_malloc: new ptr-libevent@0x556a6a5c0f68 size 128 Aug 26 13:28:12.834059: | setup callback for interface lo 127.0.0.1:4500 fd 20 Aug 26 13:28:12.834062: | libevent_free: release ptr-libevent@0x556a6a582608 Aug 26 13:28:12.834063: | free_event_entry: release EVENT_NULL-pe@0x556a6a5ccbf8 Aug 26 13:28:12.834065: | add_fd_read_event_handler: new ethX-pe@0x556a6a5ccbf8 Aug 26 13:28:12.834067: | libevent_malloc: new ptr-libevent@0x556a6a582608 size 128 Aug 26 13:28:12.834070: | setup callback for interface lo 127.0.0.1:500 fd 19 Aug 26 13:28:12.834072: | libevent_free: release ptr-libevent@0x556a6a584358 Aug 26 13:28:12.834074: | free_event_entry: release EVENT_NULL-pe@0x556a6a5ccca8 Aug 26 13:28:12.834076: | add_fd_read_event_handler: new ethX-pe@0x556a6a5ccca8 Aug 26 13:28:12.834077: | libevent_malloc: new ptr-libevent@0x556a6a584358 size 128 Aug 26 13:28:12.834084: | setup callback for interface eth0 192.1.3.209:4500 fd 18 Aug 26 13:28:12.834087: | libevent_free: release ptr-libevent@0x556a6a5aefd8 Aug 26 13:28:12.834089: | free_event_entry: release EVENT_NULL-pe@0x556a6a5ccd58 Aug 26 13:28:12.834091: | add_fd_read_event_handler: new ethX-pe@0x556a6a5ccd58 Aug 26 13:28:12.834092: | libevent_malloc: new ptr-libevent@0x556a6a5aefd8 size 128 Aug 26 13:28:12.834095: | setup callback for interface eth0 192.1.3.209:500 fd 17 Aug 26 13:28:12.834097: | certs and keys locked by 'free_preshared_secrets' Aug 26 13:28:12.834099: forgetting secrets Aug 26 13:28:12.834106: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 13:28:12.834116: loading secrets from "/etc/ipsec.secrets" Aug 26 13:28:12.834127: | saving Modulus Aug 26 13:28:12.834129: | saving PublicExponent Aug 26 13:28:12.834149: | computed rsa CKAID 1a 15 cc e8 92 73 43 9c 2b f4 20 2a c1 06 6e f2 Aug 26 13:28:12.834151: | computed rsa CKAID 59 b0 ef 45 Aug 26 13:28:12.834154: loaded private key for keyid: PKK_RSA:AQPHFfpyJ Aug 26 13:28:12.834158: | certs and keys locked by 'process_secret' Aug 26 13:28:12.834160: | certs and keys unlocked by 'process_secret' Aug 26 13:28:12.834167: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:12.834172: | spent 0.247 milliseconds in whack Aug 26 13:28:12.834787: | processing signal PLUTO_SIGCHLD Aug 26 13:28:12.834803: | waitpid returned pid 16843 (exited with status 0) Aug 26 13:28:12.834806: | reaped addconn helper child (status 0) Aug 26 13:28:12.834810: | waitpid returned ECHILD (no child processes left) Aug 26 13:28:12.834813: | spent 0.015 milliseconds in signal handler PLUTO_SIGCHLD Aug 26 13:28:12.899083: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:12.899111: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:28:12.899115: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 13:28:12.899119: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:28:12.899121: | FOR_EACH_CONNECTION_... in foreach_connection_by_alias Aug 26 13:28:12.899126: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:28:12.899133: | Added new connection road-east-ikev2 with policy ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 13:28:12.899137: | No AUTH policy was set - defaulting to RSASIG Aug 26 13:28:12.899199: | ike (phase1) algorithm values: AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31, AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 Aug 26 13:28:12.899204: | from whack: got --esp= Aug 26 13:28:12.899251: | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 Aug 26 13:28:12.899258: | counting wild cards for @road.testing.libreswan.org is 0 Aug 26 13:28:12.899264: | counting wild cards for 192.1.2.23 is 0 Aug 26 13:28:12.899275: | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@(nil): none Aug 26 13:28:12.899278: | new hp@0x556a6a5cf458 Aug 26 13:28:12.899283: added connection description "road-east-ikev2" Aug 26 13:28:12.899304: | ike_life: 90s; ipsec_life: 300s; rekey_margin: 20s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO Aug 26 13:28:12.899315: | 192.1.3.209<192.1.3.209>[@road.testing.libreswan.org]...192.1.2.23<192.1.2.23> Aug 26 13:28:12.899325: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:12.899332: | spent 0.255 milliseconds in whack Aug 26 13:28:12.899399: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:12.899416: add keyid @road.testing.libreswan.org Aug 26 13:28:12.899420: | add pubkey 01 03 c7 15 fa 72 27 70 a4 e1 f3 0a 70 21 f9 0c Aug 26 13:28:12.899423: | add pubkey 3f e2 65 12 87 d9 fd 12 cb af d4 e0 c2 e3 dd 77 Aug 26 13:28:12.899425: | add pubkey a0 ef aa c7 d6 a2 b2 30 f2 64 b0 c5 e6 c7 a7 27 Aug 26 13:28:12.899428: | add pubkey 17 54 7a 8e 32 c9 ac fd bf 8f b3 33 b9 74 74 73 Aug 26 13:28:12.899430: | add pubkey dd 23 83 11 53 d6 d4 91 0e 36 7e 67 fc 89 1e 48 Aug 26 13:28:12.899433: | add pubkey ac e9 da 2e 66 9d 6e 4f e2 98 a7 dc 41 b3 a4 37 Aug 26 13:28:12.899435: | add pubkey f5 07 a9 9c 23 69 83 54 87 7b ea 00 a7 5b ab 2d Aug 26 13:28:12.899437: | add pubkey 41 34 d1 a3 17 1e a7 64 2d 7f ff 45 7a 5d 85 5c Aug 26 13:28:12.899440: | add pubkey 73 dd 63 e7 40 ad eb 71 e6 5f 21 43 80 f5 23 4c Aug 26 13:28:12.899443: | add pubkey 3d 4a 11 2c ca 9a d6 79 c5 c2 51 6e af c3 6e 99 Aug 26 13:28:12.899445: | add pubkey f5 26 1c 67 ee 8a 3e 30 4b c1 93 a7 92 34 36 8c Aug 26 13:28:12.899448: | add pubkey bf e6 d0 d3 fe 78 0b 0a 64 04 44 ca 8c 83 fd f1 Aug 26 13:28:12.899451: | add pubkey 2e b5 00 76 61 a6 de f1 59 67 2b 6d c2 57 e0 f2 Aug 26 13:28:12.899453: | add pubkey 7d 6b 9f d3 46 41 8c 31 c2 fd c4 60 72 08 3b bb Aug 26 13:28:12.899456: | add pubkey 56 fb 01 fc 1d 57 4e cf 7c 0f c4 6f 72 6f 2a 0e Aug 26 13:28:12.899458: | add pubkey f3 30 db a0 80 f9 70 cc bb 07 a9 f9 d7 76 99 63 Aug 26 13:28:12.899461: | add pubkey 4b 6a 0f 1a 37 95 cb 9b ea 17 f7 55 62 6b 8a 83 Aug 26 13:28:12.899463: | add pubkey 05 ff 43 78 57 dd bd 08 85 9c f1 62 35 6e 69 c7 Aug 26 13:28:12.899466: | add pubkey 04 0b 4b c4 1b d2 38 89 8c de 56 d0 c8 2c 51 54 Aug 26 13:28:12.899469: | add pubkey 32 1b 7d 27 dc cd 37 7a 4e cb 1a ec d2 ce 48 ed Aug 26 13:28:12.899471: | add pubkey 43 48 9c 8a fc 30 9f b1 57 1c a9 98 e5 84 93 6c Aug 26 13:28:12.899474: | add pubkey da 4d cc 95 e3 f5 f2 a5 b3 9d 70 ae 24 8d 08 3b Aug 26 13:28:12.899477: | add pubkey 0f 8c e9 5a a5 f0 4d 9c 3c 2f 7f bc 10 95 34 1c Aug 26 13:28:12.899479: | add pubkey 96 74 29 fc ab fb 8f 4b 71 aa 0b 26 b5 f0 32 98 Aug 26 13:28:12.899482: | add pubkey 90 6a fd 31 f5 ab Aug 26 13:28:12.899505: | computed rsa CKAID 1a 15 cc e8 92 73 43 9c 2b f4 20 2a c1 06 6e f2 Aug 26 13:28:12.899509: | computed rsa CKAID 59 b0 ef 45 Aug 26 13:28:12.899520: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:12.899526: | spent 0.131 milliseconds in whack Aug 26 13:28:12.956150: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:12.956175: | old debugging base+cpu-usage + none Aug 26 13:28:12.956177: | base debugging = base+cpu-usage Aug 26 13:28:12.956179: | old impairing none + suppress-retransmits Aug 26 13:28:12.956181: | base impairing = suppress-retransmits Aug 26 13:28:12.956187: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:12.956192: | spent 0.0509 milliseconds in whack Aug 26 13:28:13.067365: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:13.067406: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:13.067412: | spent 0.0551 milliseconds in whack Aug 26 13:28:13.281821: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:13.281899: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:13.281908: | spent 0.0957 milliseconds in whack Aug 26 13:28:13.344173: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:13.344200: | dup_any(fd@16) -> fd@21 (in whack_process() at rcv_whack.c:590) Aug 26 13:28:13.344205: | FOR_EACH_CONNECTION_... in conn_by_name Aug 26 13:28:13.344211: | start processing: connection "road-east-ikev2" (in initiate_a_connection() at initiate.c:186) Aug 26 13:28:13.344215: | connection 'road-east-ikev2' +POLICY_UP Aug 26 13:28:13.344224: | dup_any(fd@21) -> fd@22 (in initiate_a_connection() at initiate.c:342) Aug 26 13:28:13.344227: | FOR_EACH_STATE_... in find_phase1_state Aug 26 13:28:13.344251: | creating state object #1 at 0x556a6a5cf8e8 Aug 26 13:28:13.344255: | State DB: adding IKEv2 state #1 in UNDEFINED Aug 26 13:28:13.344264: | pstats #1 ikev2.ike started Aug 26 13:28:13.344268: | Message ID: init #1: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 Aug 26 13:28:13.344272: | parent state #1: UNDEFINED(ignore) => PARENT_I0(ignore) Aug 26 13:28:13.344278: | Message ID: init_ike #1; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 Aug 26 13:28:13.344287: | suspend processing: connection "road-east-ikev2" (in ikev2_parent_outI1() at ikev2_parent.c:535) Aug 26 13:28:13.344305: | start processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:535) Aug 26 13:28:13.344309: | dup_any(fd@22) -> fd@23 (in ikev2_parent_outI1() at ikev2_parent.c:551) Aug 26 13:28:13.344314: | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-east-ikev2" IKE SA #1 "road-east-ikev2" Aug 26 13:28:13.344319: "road-east-ikev2" #1: initiating v2 parent SA Aug 26 13:28:13.344335: | "road-east-ikev2" #1 start IKEv2 DNS query -- 23.2.1.192.IN-ADDR.ARPA. IN IPSECKEY -- Aug 26 13:28:13.346704: | libevent_malloc: new ptr-libevent@0x556a6a881ef8 size 16 Aug 26 13:28:13.346795: | constructing local IKE proposals for road-east-ikev2 (IKE SA initiator selecting KE) Aug 26 13:28:13.346805: | converting ike_info AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 13:28:13.346814: | ... ikev2_proposal: 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:28:13.346818: | converting ike_info AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 13:28:13.346824: | ... ikev2_proposal: 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:28:13.346828: | converting ike_info AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 13:28:13.346833: | ... ikev2_proposal: 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:28:13.346837: | converting ike_info AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048+MODP3072+MODP4096+MODP8192+DH19+DH20+DH21+DH31 to ikev2 ... Aug 26 13:28:13.346843: | ... ikev2_proposal: 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:28:13.346855: "road-east-ikev2": constructed local IKE proposals for road-east-ikev2 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:28:13.346869: | adding ikev2_outI1 KE work-order 1 for state #1 Aug 26 13:28:13.346874: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x556a6a883bb8 Aug 26 13:28:13.346879: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Aug 26 13:28:13.346888: | libevent_malloc: new ptr-libevent@0x556a6a5cf5a8 size 128 Aug 26 13:28:13.346905: | #1 spent 2.64 milliseconds in ikev2_parent_outI1() Aug 26 13:28:13.346909: | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) Aug 26 13:28:13.346906: | crypto helper 2 resuming Aug 26 13:28:13.346919: | RESET processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in ikev2_parent_outI1() at ikev2_parent.c:610) Aug 26 13:28:13.346944: | crypto helper 2 starting work-order 1 for state #1 Aug 26 13:28:13.346950: | RESET processing: connection "road-east-ikev2" (in ikev2_parent_outI1() at ikev2_parent.c:610) Aug 26 13:28:13.346955: | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 1 Aug 26 13:28:13.346957: | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) Aug 26 13:28:13.347144: | close_any(fd@21) (in initiate_connection() at initiate.c:372) Aug 26 13:28:13.347150: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:13.347156: | spent 2.74 milliseconds in whack Aug 26 13:28:13.347307: | libevent_malloc: new ptr-libevent@0x556a6a883e58 size 16 Aug 26 13:28:13.347457: | libevent_malloc: new ptr-libevent@0x556a6a881e18 size 16 Aug 26 13:28:13.347807: | start processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in idr_ipseckey_fetch_continue() at ikev2_ipseckey.c:519) Aug 26 13:28:13.347819: | IKEv2 DNS query -- 23.2.1.192.IN-ADDR.ARPA. IN IPSECKEY -- returned SERVFAIL cache=no elapsed time 0.003464 Aug 26 13:28:13.347822: | DNSSEC=INSECURE MSG SIZE 52 bytes Aug 26 13:28:13.347826: "road-east-ikev2" #1: IKEv2 DNS query -- 23.2.1.192.IN-ADDR.ARPA. IN IPSECKEY -- returned SERVFAIL rr parse error SERVFAIL elapsed time 0.003464 Aug 26 13:28:13.347838: | RESET processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in idr_ipseckey_fetch_continue() at ikev2_ipseckey.c:541) Aug 26 13:28:13.348017: | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 1 time elapsed 0.001061 seconds Aug 26 13:28:13.348027: | (#1) spent 1.07 milliseconds in crypto helper computing work-order 1: ikev2_outI1 KE (pcr) Aug 26 13:28:13.348031: | crypto helper 2 sending results from work-order 1 for state #1 to event queue Aug 26 13:28:13.348034: | scheduling resume sending helper answer for #1 Aug 26 13:28:13.348039: | libevent_malloc: new ptr-libevent@0x7f6ff0002888 size 128 Aug 26 13:28:13.348047: | crypto helper 2 waiting (nothing to do) Aug 26 13:28:13.348055: | processing resume sending helper answer for #1 Aug 26 13:28:13.348066: | start processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:28:13.348072: | crypto helper 2 replies to request ID 1 Aug 26 13:28:13.348075: | calling continuation function 0x556a6a068b50 Aug 26 13:28:13.348079: | ikev2_parent_outI1_continue for #1 Aug 26 13:28:13.348110: | **emit ISAKMP Message: Aug 26 13:28:13.348114: | initiator cookie: Aug 26 13:28:13.348117: | ef f9 c7 e3 1d 6e e1 4f Aug 26 13:28:13.348120: | responder cookie: Aug 26 13:28:13.348123: | 00 00 00 00 00 00 00 00 Aug 26 13:28:13.348131: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:28:13.348135: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:28:13.348138: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Aug 26 13:28:13.348142: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Aug 26 13:28:13.348145: | Message ID: 0 (0x0) Aug 26 13:28:13.348149: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:28:13.348174: | using existing local IKE proposals for connection road-east-ikev2 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:28:13.348181: | Emitting ikev2_proposals ... Aug 26 13:28:13.348185: | ***emit IKEv2 Security Association Payload: Aug 26 13:28:13.348189: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:13.348192: | flags: none (0x0) Aug 26 13:28:13.348197: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Aug 26 13:28:13.348201: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:28:13.348204: | discarding INTEG=NONE Aug 26 13:28:13.348208: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 13:28:13.348211: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:13.348214: | prop #: 1 (0x1) Aug 26 13:28:13.348217: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:28:13.348220: | spi size: 0 (0x0) Aug 26 13:28:13.348223: | # transforms: 11 (0xb) Aug 26 13:28:13.348227: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:28:13.348231: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348234: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348237: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:13.348240: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 13:28:13.348244: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348248: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 13:28:13.348252: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:13.348255: | length/value: 256 (0x100) Aug 26 13:28:13.348259: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:28:13.348262: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348265: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348268: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:13.348272: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:28:13.348276: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348280: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348284: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348287: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348307: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348310: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:13.348313: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 13:28:13.348318: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348322: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348326: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348329: | discarding INTEG=NONE Aug 26 13:28:13.348332: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348335: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348338: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.348341: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:28:13.348346: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348350: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348356: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348359: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348362: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348365: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.348369: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 13:28:13.348373: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348377: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348380: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348384: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348387: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348390: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.348394: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 13:28:13.348398: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348402: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348406: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348409: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348412: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348415: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.348418: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 13:28:13.348423: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348427: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348430: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348433: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348436: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348440: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.348443: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 13:28:13.348447: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348451: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348455: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348458: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348462: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348465: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.348468: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 13:28:13.348472: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348476: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348480: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348483: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348486: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348489: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.348492: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 13:28:13.348499: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348503: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348507: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348510: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348513: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:13.348516: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.348519: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 13:28:13.348524: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348528: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348532: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348535: | emitting length of IKEv2 Proposal Substructure Payload: 100 Aug 26 13:28:13.348539: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:28:13.348542: | discarding INTEG=NONE Aug 26 13:28:13.348545: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 13:28:13.348548: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:13.348551: | prop #: 2 (0x2) Aug 26 13:28:13.348554: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:28:13.348557: | spi size: 0 (0x0) Aug 26 13:28:13.348560: | # transforms: 11 (0xb) Aug 26 13:28:13.348565: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:13.348569: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:28:13.348572: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348576: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348579: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:13.348582: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 13:28:13.348586: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348590: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 13:28:13.348593: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:13.348596: | length/value: 128 (0x80) Aug 26 13:28:13.348600: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:28:13.348603: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348606: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348609: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:13.348613: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:28:13.348617: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348621: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348624: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348628: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348631: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348634: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:13.348637: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 13:28:13.348642: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348646: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348651: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348654: | discarding INTEG=NONE Aug 26 13:28:13.348657: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348660: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348664: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.348667: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:28:13.348671: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348675: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348679: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348682: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348685: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348688: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.348691: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 13:28:13.348696: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348700: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348703: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348706: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348709: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348713: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.348716: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 13:28:13.348721: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348725: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348728: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348731: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348734: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348738: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.348741: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 13:28:13.348745: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348749: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348752: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348755: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348758: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348762: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.348765: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 13:28:13.348770: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348774: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348778: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348781: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348784: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348787: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.348791: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 13:28:13.348795: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348803: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348807: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348810: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348813: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348816: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.348820: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 13:28:13.348824: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348828: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348832: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348835: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348838: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:13.348841: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.348845: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 13:28:13.348849: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348853: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348857: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348860: | emitting length of IKEv2 Proposal Substructure Payload: 100 Aug 26 13:28:13.348864: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:28:13.348867: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 13:28:13.348871: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:13.348874: | prop #: 3 (0x3) Aug 26 13:28:13.348877: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:28:13.348880: | spi size: 0 (0x0) Aug 26 13:28:13.348883: | # transforms: 13 (0xd) Aug 26 13:28:13.348887: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:13.348891: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:28:13.348894: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348898: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348901: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:13.348904: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 13:28:13.348908: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348912: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 13:28:13.348915: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:13.348918: | length/value: 256 (0x100) Aug 26 13:28:13.348922: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:28:13.348925: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348928: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348931: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:13.348935: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:28:13.348939: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348943: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348946: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348951: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348954: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348957: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:13.348960: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 13:28:13.348965: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348969: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348972: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.348976: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.348979: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348982: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:28:13.348986: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 13:28:13.348990: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.348994: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.348997: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349001: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349004: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349007: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:28:13.349010: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 13:28:13.349014: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349018: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349022: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349025: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349028: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349031: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.349035: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:28:13.349039: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349043: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349047: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349050: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349053: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349056: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.349060: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 13:28:13.349064: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349068: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349071: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349075: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349078: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349081: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.349084: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 13:28:13.349088: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349094: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349098: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349101: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349104: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349108: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.349111: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 13:28:13.349116: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349120: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349123: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349126: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349129: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349133: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.349136: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 13:28:13.349140: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349144: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349148: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349151: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349154: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349157: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.349161: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 13:28:13.349165: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349169: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349173: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349176: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349179: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349183: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.349186: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 13:28:13.349190: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349194: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349198: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349201: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349204: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:13.349207: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.349210: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 13:28:13.349215: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349219: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349222: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349225: | emitting length of IKEv2 Proposal Substructure Payload: 116 Aug 26 13:28:13.349229: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:28:13.349233: | ****emit IKEv2 Proposal Substructure Payload: Aug 26 13:28:13.349238: | last proposal: v2_PROPOSAL_LAST (0x0) Aug 26 13:28:13.349241: | prop #: 4 (0x4) Aug 26 13:28:13.349244: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:28:13.349247: | spi size: 0 (0x0) Aug 26 13:28:13.349250: | # transforms: 13 (0xd) Aug 26 13:28:13.349254: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:13.349258: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:28:13.349262: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349265: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349268: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:13.349271: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 13:28:13.349275: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349279: | ******emit IKEv2 Attribute Substructure Payload: Aug 26 13:28:13.349282: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:13.349285: | length/value: 128 (0x80) Aug 26 13:28:13.349293: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:28:13.349298: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349301: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349304: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:13.349308: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:28:13.349312: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349316: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349320: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349323: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349326: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349329: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:13.349333: | IKEv2 transform ID: PRF_HMAC_SHA2_256 (0x5) Aug 26 13:28:13.349337: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349341: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349344: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349348: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349351: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349354: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:28:13.349357: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 13:28:13.349361: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349366: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349369: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349372: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349376: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349379: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:28:13.349382: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 13:28:13.349387: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349391: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349396: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349399: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349402: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349406: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.349409: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:28:13.349413: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349417: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349421: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349424: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349427: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349430: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.349433: | IKEv2 transform ID: OAKLEY_GROUP_MODP3072 (0xf) Aug 26 13:28:13.349438: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349442: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349446: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349449: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349452: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349455: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.349459: | IKEv2 transform ID: OAKLEY_GROUP_MODP4096 (0x10) Aug 26 13:28:13.349463: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349467: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349470: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349474: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349477: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349480: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.349483: | IKEv2 transform ID: OAKLEY_GROUP_MODP8192 (0x12) Aug 26 13:28:13.349487: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349492: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349495: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349498: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349501: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349504: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.349508: | IKEv2 transform ID: OAKLEY_GROUP_ECP_256 (0x13) Aug 26 13:28:13.349513: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349517: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349520: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349523: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349527: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349530: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.349533: | IKEv2 transform ID: OAKLEY_GROUP_ECP_384 (0x14) Aug 26 13:28:13.349537: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349543: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349546: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349550: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349553: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349556: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.349559: | IKEv2 transform ID: OAKLEY_GROUP_ECP_521 (0x15) Aug 26 13:28:13.349564: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349568: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349571: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349575: | *****emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.349578: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:13.349581: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.349584: | IKEv2 transform ID: OAKLEY_GROUP_CURVE25519 (0x1f) Aug 26 13:28:13.349589: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.349593: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.349596: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.349599: | emitting length of IKEv2 Proposal Substructure Payload: 116 Aug 26 13:28:13.349603: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:28:13.349607: | emitting length of IKEv2 Security Association Payload: 436 Aug 26 13:28:13.349611: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Aug 26 13:28:13.349615: | ***emit IKEv2 Key Exchange Payload: Aug 26 13:28:13.349618: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:13.349621: | flags: none (0x0) Aug 26 13:28:13.349625: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:28:13.349629: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) Aug 26 13:28:13.349633: | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' Aug 26 13:28:13.349638: | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload Aug 26 13:28:13.349642: | ikev2 g^x 0c ec 3c f0 10 d9 ec 9b 26 f2 77 51 16 f7 3c bf Aug 26 13:28:13.349645: | ikev2 g^x 14 dd c8 82 2b ca cb 61 03 52 e9 c5 ee 4d b0 b8 Aug 26 13:28:13.349649: | ikev2 g^x 04 f6 76 9a 15 fd 9d ea 31 54 3e 68 8f 74 64 b8 Aug 26 13:28:13.349652: | ikev2 g^x 3c 85 fd b7 4d d7 d2 3c 20 43 1d 09 b3 0a 95 56 Aug 26 13:28:13.349655: | ikev2 g^x 8c bb 44 c9 ac 67 85 12 30 2c 6d d5 f1 c8 37 40 Aug 26 13:28:13.349658: | ikev2 g^x 4c d9 de 75 5b 8e ab 66 d0 25 bc 96 49 3c 0c 31 Aug 26 13:28:13.349661: | ikev2 g^x 44 be 61 d4 38 f2 1f ed 9e 75 52 45 b2 44 e4 b9 Aug 26 13:28:13.349664: | ikev2 g^x f9 31 24 d6 77 4d c9 29 eb 64 3e 83 8e 00 fb 99 Aug 26 13:28:13.349668: | ikev2 g^x f5 5c 6e 43 9a f2 45 5c d0 9e 80 21 b7 a8 50 f0 Aug 26 13:28:13.349671: | ikev2 g^x 74 a4 ce 09 fe 71 30 06 1d bf ca 56 c6 0f 14 63 Aug 26 13:28:13.349674: | ikev2 g^x 7a b3 5c 82 e6 d4 18 52 12 a4 55 81 04 f3 a4 db Aug 26 13:28:13.349677: | ikev2 g^x bc c4 ba ca e1 c6 59 ab da 0b b8 be 63 9a b6 d6 Aug 26 13:28:13.349681: | ikev2 g^x 2c dd c0 bf 16 5e cc f8 83 bb f4 fc 90 2c 77 07 Aug 26 13:28:13.349684: | ikev2 g^x 1f 87 bd f0 6e 67 bf 54 1f 9f 40 ea 03 86 5d 4f Aug 26 13:28:13.349690: | ikev2 g^x 51 7b 8a df ea 70 d3 e9 00 6e 40 40 f9 e5 82 3f Aug 26 13:28:13.349693: | ikev2 g^x 00 72 e8 43 74 fc 6a 3e a2 72 ed 58 3f 10 4a df Aug 26 13:28:13.349697: | emitting length of IKEv2 Key Exchange Payload: 264 Aug 26 13:28:13.349700: | ***emit IKEv2 Nonce Payload: Aug 26 13:28:13.349703: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:28:13.349706: | flags: none (0x0) Aug 26 13:28:13.349711: | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N Aug 26 13:28:13.349715: | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) Aug 26 13:28:13.349719: | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' Aug 26 13:28:13.349723: | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload Aug 26 13:28:13.349726: | IKEv2 nonce e4 69 8e 65 be 99 41 36 24 c9 0d 5d 61 66 56 21 Aug 26 13:28:13.349729: | IKEv2 nonce 80 59 6a 88 e5 bb b3 21 4a 28 63 85 8e 4a 96 0b Aug 26 13:28:13.349733: | emitting length of IKEv2 Nonce Payload: 36 Aug 26 13:28:13.349736: | Adding a v2N Payload Aug 26 13:28:13.349739: | ***emit IKEv2 Notify Payload: Aug 26 13:28:13.349742: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:13.349745: | flags: none (0x0) Aug 26 13:28:13.349748: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:28:13.349751: | SPI size: 0 (0x0) Aug 26 13:28:13.349755: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Aug 26 13:28:13.349759: | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 13:28:13.349763: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 13:28:13.349767: | emitting length of IKEv2 Notify Payload: 8 Aug 26 13:28:13.349771: | NAT-Traversal support [enabled] add v2N payloads. Aug 26 13:28:13.349775: | natd_hash: rcookie is zero Aug 26 13:28:13.349794: | natd_hash: hasher=0x556a6a13d800(20) Aug 26 13:28:13.349798: | natd_hash: icookie= ef f9 c7 e3 1d 6e e1 4f Aug 26 13:28:13.349801: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Aug 26 13:28:13.349804: | natd_hash: ip= c0 01 03 d1 Aug 26 13:28:13.349807: | natd_hash: port=500 Aug 26 13:28:13.349810: | natd_hash: hash= ea a1 7f d9 74 6c dc 60 6d ad 09 c7 a7 d4 e3 90 Aug 26 13:28:13.349813: | natd_hash: hash= d1 1a 59 db Aug 26 13:28:13.349816: | Adding a v2N Payload Aug 26 13:28:13.349819: | ***emit IKEv2 Notify Payload: Aug 26 13:28:13.349823: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:13.349826: | flags: none (0x0) Aug 26 13:28:13.349829: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:28:13.349832: | SPI size: 0 (0x0) Aug 26 13:28:13.349836: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Aug 26 13:28:13.349840: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 13:28:13.349844: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 13:28:13.349848: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Aug 26 13:28:13.349851: | Notify data ea a1 7f d9 74 6c dc 60 6d ad 09 c7 a7 d4 e3 90 Aug 26 13:28:13.349854: | Notify data d1 1a 59 db Aug 26 13:28:13.349857: | emitting length of IKEv2 Notify Payload: 28 Aug 26 13:28:13.349860: | natd_hash: rcookie is zero Aug 26 13:28:13.349867: | natd_hash: hasher=0x556a6a13d800(20) Aug 26 13:28:13.349870: | natd_hash: icookie= ef f9 c7 e3 1d 6e e1 4f Aug 26 13:28:13.349874: | natd_hash: rcookie= 00 00 00 00 00 00 00 00 Aug 26 13:28:13.349876: | natd_hash: ip= c0 01 02 17 Aug 26 13:28:13.349879: | natd_hash: port=500 Aug 26 13:28:13.349883: | natd_hash: hash= 2a 9b 6d 70 63 6e 9e 4a a0 3d d5 a7 e6 42 76 e1 Aug 26 13:28:13.349885: | natd_hash: hash= 36 5e f5 68 Aug 26 13:28:13.349888: | Adding a v2N Payload Aug 26 13:28:13.349893: | ***emit IKEv2 Notify Payload: Aug 26 13:28:13.349897: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:13.349900: | flags: none (0x0) Aug 26 13:28:13.349903: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:28:13.349906: | SPI size: 0 (0x0) Aug 26 13:28:13.349909: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Aug 26 13:28:13.349914: | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) Aug 26 13:28:13.349918: | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' Aug 26 13:28:13.349921: | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload Aug 26 13:28:13.349925: | Notify data 2a 9b 6d 70 63 6e 9e 4a a0 3d d5 a7 e6 42 76 e1 Aug 26 13:28:13.349928: | Notify data 36 5e f5 68 Aug 26 13:28:13.349931: | emitting length of IKEv2 Notify Payload: 28 Aug 26 13:28:13.349934: | emitting length of ISAKMP Message: 828 Aug 26 13:28:13.349943: | stop processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) Aug 26 13:28:13.349954: | start processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 13:28:13.349959: | #1 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK Aug 26 13:28:13.349963: | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 Aug 26 13:28:13.349968: | parent state #1: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) Aug 26 13:28:13.349972: | Message ID: updating counters for #1 to 4294967295 after switching state Aug 26 13:28:13.349975: | Message ID: IKE #1 skipping update_recv as MD is fake Aug 26 13:28:13.349982: | Message ID: sent #1 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 Aug 26 13:28:13.349986: "road-east-ikev2" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 Aug 26 13:28:13.350000: | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) Aug 26 13:28:13.350009: | sending 828 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) Aug 26 13:28:13.350013: | ef f9 c7 e3 1d 6e e1 4f 00 00 00 00 00 00 00 00 Aug 26 13:28:13.350016: | 21 20 22 08 00 00 00 00 00 00 03 3c 22 00 01 b4 Aug 26 13:28:13.350019: | 02 00 00 64 01 01 00 0b 03 00 00 0c 01 00 00 14 Aug 26 13:28:13.350022: | 80 0e 01 00 03 00 00 08 02 00 00 07 03 00 00 08 Aug 26 13:28:13.350025: | 02 00 00 05 03 00 00 08 04 00 00 0e 03 00 00 08 Aug 26 13:28:13.350028: | 04 00 00 0f 03 00 00 08 04 00 00 10 03 00 00 08 Aug 26 13:28:13.350031: | 04 00 00 12 03 00 00 08 04 00 00 13 03 00 00 08 Aug 26 13:28:13.350034: | 04 00 00 14 03 00 00 08 04 00 00 15 00 00 00 08 Aug 26 13:28:13.350038: | 04 00 00 1f 02 00 00 64 02 01 00 0b 03 00 00 0c Aug 26 13:28:13.350041: | 01 00 00 14 80 0e 00 80 03 00 00 08 02 00 00 07 Aug 26 13:28:13.350044: | 03 00 00 08 02 00 00 05 03 00 00 08 04 00 00 0e Aug 26 13:28:13.350047: | 03 00 00 08 04 00 00 0f 03 00 00 08 04 00 00 10 Aug 26 13:28:13.350050: | 03 00 00 08 04 00 00 12 03 00 00 08 04 00 00 13 Aug 26 13:28:13.350053: | 03 00 00 08 04 00 00 14 03 00 00 08 04 00 00 15 Aug 26 13:28:13.350056: | 00 00 00 08 04 00 00 1f 02 00 00 74 03 01 00 0d Aug 26 13:28:13.350059: | 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 Aug 26 13:28:13.350062: | 02 00 00 07 03 00 00 08 02 00 00 05 03 00 00 08 Aug 26 13:28:13.350066: | 03 00 00 0e 03 00 00 08 03 00 00 0c 03 00 00 08 Aug 26 13:28:13.350069: | 04 00 00 0e 03 00 00 08 04 00 00 0f 03 00 00 08 Aug 26 13:28:13.350072: | 04 00 00 10 03 00 00 08 04 00 00 12 03 00 00 08 Aug 26 13:28:13.350075: | 04 00 00 13 03 00 00 08 04 00 00 14 03 00 00 08 Aug 26 13:28:13.350078: | 04 00 00 15 00 00 00 08 04 00 00 1f 00 00 00 74 Aug 26 13:28:13.350081: | 04 01 00 0d 03 00 00 0c 01 00 00 0c 80 0e 00 80 Aug 26 13:28:13.350086: | 03 00 00 08 02 00 00 07 03 00 00 08 02 00 00 05 Aug 26 13:28:13.350089: | 03 00 00 08 03 00 00 0e 03 00 00 08 03 00 00 0c Aug 26 13:28:13.350092: | 03 00 00 08 04 00 00 0e 03 00 00 08 04 00 00 0f Aug 26 13:28:13.350096: | 03 00 00 08 04 00 00 10 03 00 00 08 04 00 00 12 Aug 26 13:28:13.350099: | 03 00 00 08 04 00 00 13 03 00 00 08 04 00 00 14 Aug 26 13:28:13.350102: | 03 00 00 08 04 00 00 15 00 00 00 08 04 00 00 1f Aug 26 13:28:13.350108: | 28 00 01 08 00 0e 00 00 0c ec 3c f0 10 d9 ec 9b Aug 26 13:28:13.350112: | 26 f2 77 51 16 f7 3c bf 14 dd c8 82 2b ca cb 61 Aug 26 13:28:13.350115: | 03 52 e9 c5 ee 4d b0 b8 04 f6 76 9a 15 fd 9d ea Aug 26 13:28:13.350118: | 31 54 3e 68 8f 74 64 b8 3c 85 fd b7 4d d7 d2 3c Aug 26 13:28:13.350121: | 20 43 1d 09 b3 0a 95 56 8c bb 44 c9 ac 67 85 12 Aug 26 13:28:13.350124: | 30 2c 6d d5 f1 c8 37 40 4c d9 de 75 5b 8e ab 66 Aug 26 13:28:13.350127: | d0 25 bc 96 49 3c 0c 31 44 be 61 d4 38 f2 1f ed Aug 26 13:28:13.350130: | 9e 75 52 45 b2 44 e4 b9 f9 31 24 d6 77 4d c9 29 Aug 26 13:28:13.350133: | eb 64 3e 83 8e 00 fb 99 f5 5c 6e 43 9a f2 45 5c Aug 26 13:28:13.350136: | d0 9e 80 21 b7 a8 50 f0 74 a4 ce 09 fe 71 30 06 Aug 26 13:28:13.350139: | 1d bf ca 56 c6 0f 14 63 7a b3 5c 82 e6 d4 18 52 Aug 26 13:28:13.350143: | 12 a4 55 81 04 f3 a4 db bc c4 ba ca e1 c6 59 ab Aug 26 13:28:13.350146: | da 0b b8 be 63 9a b6 d6 2c dd c0 bf 16 5e cc f8 Aug 26 13:28:13.350149: | 83 bb f4 fc 90 2c 77 07 1f 87 bd f0 6e 67 bf 54 Aug 26 13:28:13.350152: | 1f 9f 40 ea 03 86 5d 4f 51 7b 8a df ea 70 d3 e9 Aug 26 13:28:13.350155: | 00 6e 40 40 f9 e5 82 3f 00 72 e8 43 74 fc 6a 3e Aug 26 13:28:13.350158: | a2 72 ed 58 3f 10 4a df 29 00 00 24 e4 69 8e 65 Aug 26 13:28:13.350161: | be 99 41 36 24 c9 0d 5d 61 66 56 21 80 59 6a 88 Aug 26 13:28:13.350164: | e5 bb b3 21 4a 28 63 85 8e 4a 96 0b 29 00 00 08 Aug 26 13:28:13.350168: | 00 00 40 2e 29 00 00 1c 00 00 40 04 ea a1 7f d9 Aug 26 13:28:13.350171: | 74 6c dc 60 6d ad 09 c7 a7 d4 e3 90 d1 1a 59 db Aug 26 13:28:13.350174: | 00 00 00 1c 00 00 40 05 2a 9b 6d 70 63 6e 9e 4a Aug 26 13:28:13.350177: | a0 3d d5 a7 e6 42 76 e1 36 5e f5 68 Aug 26 13:28:13.350253: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:28:13.350260: | libevent_free: release ptr-libevent@0x556a6a5cf5a8 Aug 26 13:28:13.350264: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x556a6a883bb8 Aug 26 13:28:13.350268: | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=2000ms Aug 26 13:28:13.350272: "road-east-ikev2" #1: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds Aug 26 13:28:13.350282: | event_schedule: new EVENT_RETRANSMIT-pe@0x556a6a883bb8 Aug 26 13:28:13.350286: | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #1 Aug 26 13:28:13.350297: | libevent_malloc: new ptr-libevent@0x556a6a8844b8 size 128 Aug 26 13:28:13.350305: | #1 STATE_PARENT_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11379.092747 Aug 26 13:28:13.350310: | resume sending helper answer for #1 suppresed complete_v2_state_transition() and stole MD Aug 26 13:28:13.350317: | #1 spent 2.17 milliseconds in resume sending helper answer Aug 26 13:28:13.350323: | stop processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:28:13.350327: | libevent_free: release ptr-libevent@0x7f6ff0002888 Aug 26 13:28:13.352555: | spent 0.00277 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:28:13.352579: | *received 437 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) Aug 26 13:28:13.352583: | ef f9 c7 e3 1d 6e e1 4f 57 e2 fa 91 04 f4 bc 57 Aug 26 13:28:13.352587: | 21 20 22 20 00 00 00 00 00 00 01 b5 22 00 00 28 Aug 26 13:28:13.352590: | 00 00 00 24 01 01 00 03 03 00 00 0c 01 00 00 14 Aug 26 13:28:13.352593: | 80 0e 01 00 03 00 00 08 02 00 00 07 00 00 00 08 Aug 26 13:28:13.352598: | 04 00 00 0e 28 00 01 08 00 0e 00 00 e3 48 cd 53 Aug 26 13:28:13.352601: | 29 62 3d c5 e3 b9 08 e6 65 9d 58 5e 95 02 9a de Aug 26 13:28:13.352605: | 20 36 ff c4 00 16 e3 31 78 d7 35 68 5b 2b c1 f2 Aug 26 13:28:13.352608: | af 34 60 f4 f5 1b 09 14 8a 29 bd e7 c3 c3 04 fb Aug 26 13:28:13.352611: | b6 e7 17 5e b7 98 a8 92 da 4e be d0 b4 df c7 1e Aug 26 13:28:13.352614: | 3f 7a 4c d6 e5 8f 2f 71 46 26 e9 5d 4e e8 1a 4b Aug 26 13:28:13.352617: | 6e 35 4e f5 95 ca 53 f8 46 b0 86 a3 ec 44 ae 51 Aug 26 13:28:13.352620: | 43 f3 da f5 8f 88 c6 90 a7 63 e5 df f8 dc 66 9c Aug 26 13:28:13.352623: | ea 49 73 8a d8 c8 b2 22 91 40 76 c1 b3 32 bf 27 Aug 26 13:28:13.352626: | d9 44 40 d3 4e a9 20 a3 ea 28 93 ec 79 7e 7c c0 Aug 26 13:28:13.352629: | 69 a2 29 42 08 31 d2 49 6c 9f f4 6c 8b d6 15 63 Aug 26 13:28:13.352632: | c3 3a b4 34 cc 3c 96 27 cc 6e 46 98 1d ae ff 1b Aug 26 13:28:13.352635: | fb e5 73 1b f8 25 55 61 24 50 1b b1 89 ae 79 c5 Aug 26 13:28:13.352638: | cb 59 1f 23 8d b5 5f 64 d8 68 64 ae 08 8a 0c 15 Aug 26 13:28:13.352641: | 8d 83 63 2e 83 04 4b 0e b4 1f a3 21 da 02 12 99 Aug 26 13:28:13.352644: | 34 f6 59 83 19 6a c4 b3 c9 f9 8e 52 79 43 fd c0 Aug 26 13:28:13.352647: | 00 63 04 27 c4 5b a2 86 40 a9 d7 75 29 00 00 24 Aug 26 13:28:13.352650: | e2 af 34 a2 e3 f7 ff fe a2 72 e1 81 00 58 5f a6 Aug 26 13:28:13.352653: | eb 87 74 3b d9 c1 9d ba e6 dc d2 67 d6 e0 a3 5b Aug 26 13:28:13.352656: | 29 00 00 08 00 00 40 2e 29 00 00 1c 00 00 40 04 Aug 26 13:28:13.352660: | ae fd c7 1c 3c cc f4 36 6f f2 71 a5 3e 29 6f 2a Aug 26 13:28:13.352663: | 6b e1 a2 c5 26 00 00 1c 00 00 40 05 9f 5b 5d d9 Aug 26 13:28:13.352666: | ba 56 4f 77 c6 97 af 90 ca 20 ad 43 99 55 39 ec Aug 26 13:28:13.352669: | 00 00 00 05 04 Aug 26 13:28:13.352675: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:28:13.352679: | **parse ISAKMP Message: Aug 26 13:28:13.352683: | initiator cookie: Aug 26 13:28:13.352686: | ef f9 c7 e3 1d 6e e1 4f Aug 26 13:28:13.352688: | responder cookie: Aug 26 13:28:13.352691: | 57 e2 fa 91 04 f4 bc 57 Aug 26 13:28:13.352694: | next payload type: ISAKMP_NEXT_v2SA (0x21) Aug 26 13:28:13.352698: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:28:13.352701: | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) Aug 26 13:28:13.352705: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Aug 26 13:28:13.352708: | Message ID: 0 (0x0) Aug 26 13:28:13.352711: | length: 437 (0x1b5) Aug 26 13:28:13.352714: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_SA_INIT (34) Aug 26 13:28:13.352718: | I am the IKE SA Original Initiator receiving an IKEv2 IKE_SA_INIT response Aug 26 13:28:13.352723: | State DB: found IKEv2 state #1 in PARENT_I1 (find_v2_ike_sa_by_initiator_spi) Aug 26 13:28:13.352731: | start processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) Aug 26 13:28:13.352737: | [RE]START processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) Aug 26 13:28:13.352740: | #1 is idle Aug 26 13:28:13.352742: | #1 idle Aug 26 13:28:13.352745: | unpacking clear payload Aug 26 13:28:13.352749: | Now let's proceed with payload (ISAKMP_NEXT_v2SA) Aug 26 13:28:13.352752: | ***parse IKEv2 Security Association Payload: Aug 26 13:28:13.352755: | next payload type: ISAKMP_NEXT_v2KE (0x22) Aug 26 13:28:13.352758: | flags: none (0x0) Aug 26 13:28:13.352761: | length: 40 (0x28) Aug 26 13:28:13.352765: | processing payload: ISAKMP_NEXT_v2SA (len=36) Aug 26 13:28:13.352768: | Now let's proceed with payload (ISAKMP_NEXT_v2KE) Aug 26 13:28:13.352771: | ***parse IKEv2 Key Exchange Payload: Aug 26 13:28:13.352774: | next payload type: ISAKMP_NEXT_v2Ni (0x28) Aug 26 13:28:13.352777: | flags: none (0x0) Aug 26 13:28:13.352780: | length: 264 (0x108) Aug 26 13:28:13.352783: | DH group: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:28:13.352788: | processing payload: ISAKMP_NEXT_v2KE (len=256) Aug 26 13:28:13.352791: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni) Aug 26 13:28:13.352794: | ***parse IKEv2 Nonce Payload: Aug 26 13:28:13.352797: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:28:13.352800: | flags: none (0x0) Aug 26 13:28:13.352803: | length: 36 (0x24) Aug 26 13:28:13.352806: | processing payload: ISAKMP_NEXT_v2Ni (len=32) Aug 26 13:28:13.352809: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 13:28:13.352812: | ***parse IKEv2 Notify Payload: Aug 26 13:28:13.352815: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:28:13.352818: | flags: none (0x0) Aug 26 13:28:13.352821: | length: 8 (0x8) Aug 26 13:28:13.352824: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:28:13.352827: | SPI size: 0 (0x0) Aug 26 13:28:13.352831: | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) Aug 26 13:28:13.352834: | processing payload: ISAKMP_NEXT_v2N (len=0) Aug 26 13:28:13.352837: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 13:28:13.352840: | ***parse IKEv2 Notify Payload: Aug 26 13:28:13.352843: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:28:13.352846: | flags: none (0x0) Aug 26 13:28:13.352849: | length: 28 (0x1c) Aug 26 13:28:13.352852: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:28:13.352855: | SPI size: 0 (0x0) Aug 26 13:28:13.352858: | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) Aug 26 13:28:13.352861: | processing payload: ISAKMP_NEXT_v2N (len=20) Aug 26 13:28:13.352864: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 13:28:13.352867: | ***parse IKEv2 Notify Payload: Aug 26 13:28:13.352870: | next payload type: ISAKMP_NEXT_v2CERTREQ (0x26) Aug 26 13:28:13.352873: | flags: none (0x0) Aug 26 13:28:13.352876: | length: 28 (0x1c) Aug 26 13:28:13.352879: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:28:13.352882: | SPI size: 0 (0x0) Aug 26 13:28:13.352885: | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) Aug 26 13:28:13.352888: | processing payload: ISAKMP_NEXT_v2N (len=20) Aug 26 13:28:13.352891: | Now let's proceed with payload (ISAKMP_NEXT_v2CERTREQ) Aug 26 13:28:13.352895: | ***parse IKEv2 Certificate Request Payload: Aug 26 13:28:13.352898: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:13.352901: | flags: none (0x0) Aug 26 13:28:13.352904: | length: 5 (0x5) Aug 26 13:28:13.352907: | ikev2 cert encoding: CERT_X509_SIGNATURE (0x4) Aug 26 13:28:13.352910: | processing payload: ISAKMP_NEXT_v2CERTREQ (len=0) Aug 26 13:28:13.352914: | State DB: re-hashing IKEv2 state #1 IKE SPIi and SPI[ir] Aug 26 13:28:13.352920: | #1 in state PARENT_I1: sent v2I1, expected v2R1 Aug 26 13:28:13.352924: | selected state microcode Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH Aug 26 13:28:13.352927: | Now let's proceed with state specific processing Aug 26 13:28:13.352930: | calling processor Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH Aug 26 13:28:13.352935: | ikev2 parent inR1: calculating g^{xy} in order to send I2 Aug 26 13:28:13.352960: | using existing local IKE proposals for connection road-east-ikev2 (IKE SA initiator accepting remote proposal): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=MODP2048,MODP3072,MODP4096,MODP8192,ECP_256,ECP_384,ECP_521,CURVE25519 Aug 26 13:28:13.352966: | Comparing remote proposals against IKE initiator (accepting) 4 local proposals Aug 26 13:28:13.352970: | local proposal 1 type ENCR has 1 transforms Aug 26 13:28:13.352975: | local proposal 1 type PRF has 2 transforms Aug 26 13:28:13.352978: | local proposal 1 type INTEG has 1 transforms Aug 26 13:28:13.352981: | local proposal 1 type DH has 8 transforms Aug 26 13:28:13.352984: | local proposal 1 type ESN has 0 transforms Aug 26 13:28:13.352989: | local proposal 1 transforms: required: ENCR+PRF+DH; optional: INTEG Aug 26 13:28:13.352992: | local proposal 2 type ENCR has 1 transforms Aug 26 13:28:13.352995: | local proposal 2 type PRF has 2 transforms Aug 26 13:28:13.352998: | local proposal 2 type INTEG has 1 transforms Aug 26 13:28:13.353001: | local proposal 2 type DH has 8 transforms Aug 26 13:28:13.353004: | local proposal 2 type ESN has 0 transforms Aug 26 13:28:13.353008: | local proposal 2 transforms: required: ENCR+PRF+DH; optional: INTEG Aug 26 13:28:13.353012: | local proposal 3 type ENCR has 1 transforms Aug 26 13:28:13.353015: | local proposal 3 type PRF has 2 transforms Aug 26 13:28:13.353018: | local proposal 3 type INTEG has 2 transforms Aug 26 13:28:13.353021: | local proposal 3 type DH has 8 transforms Aug 26 13:28:13.353024: | local proposal 3 type ESN has 0 transforms Aug 26 13:28:13.353028: | local proposal 3 transforms: required: ENCR+PRF+INTEG+DH; optional: none Aug 26 13:28:13.353031: | local proposal 4 type ENCR has 1 transforms Aug 26 13:28:13.353034: | local proposal 4 type PRF has 2 transforms Aug 26 13:28:13.353038: | local proposal 4 type INTEG has 2 transforms Aug 26 13:28:13.353041: | local proposal 4 type DH has 8 transforms Aug 26 13:28:13.353044: | local proposal 4 type ESN has 0 transforms Aug 26 13:28:13.353048: | local proposal 4 transforms: required: ENCR+PRF+INTEG+DH; optional: none Aug 26 13:28:13.353051: | ****parse IKEv2 Proposal Substructure Payload: Aug 26 13:28:13.353055: | last proposal: v2_PROPOSAL_LAST (0x0) Aug 26 13:28:13.353058: | length: 36 (0x24) Aug 26 13:28:13.353060: | prop #: 1 (0x1) Aug 26 13:28:13.353063: | proto ID: IKEv2_SEC_PROTO_IKE (0x1) Aug 26 13:28:13.353066: | spi size: 0 (0x0) Aug 26 13:28:13.353069: | # transforms: 3 (0x3) Aug 26 13:28:13.353073: | Comparing remote proposal 1 containing 3 transforms against local proposal [1..1] of 4 local proposals Aug 26 13:28:13.353077: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:28:13.353080: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.353083: | length: 12 (0xc) Aug 26 13:28:13.353086: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:13.353089: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 13:28:13.353092: | ******parse IKEv2 Attribute Substructure Payload: Aug 26 13:28:13.353096: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:13.353099: | length/value: 256 (0x100) Aug 26 13:28:13.353104: | remote proposal 1 transform 0 (ENCR=AES_GCM_C_256) matches local proposal 1 type 1 (ENCR) transform 0 Aug 26 13:28:13.353107: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:28:13.353111: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.353113: | length: 8 (0x8) Aug 26 13:28:13.353116: | IKEv2 transform type: TRANS_TYPE_PRF (0x2) Aug 26 13:28:13.353119: | IKEv2 transform ID: PRF_HMAC_SHA2_512 (0x7) Aug 26 13:28:13.353124: | remote proposal 1 transform 1 (PRF=HMAC_SHA2_512) matches local proposal 1 type 2 (PRF) transform 0 Aug 26 13:28:13.353128: | *****parse IKEv2 Transform Substructure Payload: Aug 26 13:28:13.353131: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:13.353133: | length: 8 (0x8) Aug 26 13:28:13.353136: | IKEv2 transform type: TRANS_TYPE_DH (0x4) Aug 26 13:28:13.353140: | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) Aug 26 13:28:13.353144: | remote proposal 1 transform 2 (DH=MODP2048) matches local proposal 1 type 4 (DH) transform 0 Aug 26 13:28:13.353149: | remote proposal 1 proposed transforms: ENCR+PRF+DH; matched: ENCR+PRF+DH; unmatched: none Aug 26 13:28:13.353155: | comparing remote proposal 1 containing ENCR+PRF+DH transforms to local proposal 1; required: ENCR+PRF+DH; optional: INTEG; matched: ENCR+PRF+DH Aug 26 13:28:13.353160: | remote proposal 1 matches local proposal 1 Aug 26 13:28:13.353164: | remote accepted the proposal 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512;DH=MODP2048[first-match] Aug 26 13:28:13.353167: | converting proposal to internal trans attrs Aug 26 13:28:13.353186: | natd_hash: hasher=0x556a6a13d800(20) Aug 26 13:28:13.353189: | natd_hash: icookie= ef f9 c7 e3 1d 6e e1 4f Aug 26 13:28:13.353192: | natd_hash: rcookie= 57 e2 fa 91 04 f4 bc 57 Aug 26 13:28:13.353195: | natd_hash: ip= c0 01 03 d1 Aug 26 13:28:13.353198: | natd_hash: port=500 Aug 26 13:28:13.353201: | natd_hash: hash= 9f 5b 5d d9 ba 56 4f 77 c6 97 af 90 ca 20 ad 43 Aug 26 13:28:13.353204: | natd_hash: hash= 99 55 39 ec Aug 26 13:28:13.353210: | natd_hash: hasher=0x556a6a13d800(20) Aug 26 13:28:13.353214: | natd_hash: icookie= ef f9 c7 e3 1d 6e e1 4f Aug 26 13:28:13.353217: | natd_hash: rcookie= 57 e2 fa 91 04 f4 bc 57 Aug 26 13:28:13.353219: | natd_hash: ip= c0 01 02 17 Aug 26 13:28:13.353222: | natd_hash: port=500 Aug 26 13:28:13.353225: | natd_hash: hash= ae fd c7 1c 3c cc f4 36 6f f2 71 a5 3e 29 6f 2a Aug 26 13:28:13.353228: | natd_hash: hash= 6b e1 a2 c5 Aug 26 13:28:13.353232: | NAT_TRAVERSAL encaps using auto-detect Aug 26 13:28:13.353235: | NAT_TRAVERSAL this end is NOT behind NAT Aug 26 13:28:13.353238: | NAT_TRAVERSAL that end is NOT behind NAT Aug 26 13:28:13.353242: | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 Aug 26 13:28:13.353247: | offloading IKEv2 SKEYSEED using prf=HMAC_SHA2_512 integ=NONE cipherkey=AES_GCM_16 Aug 26 13:28:13.353251: | adding ikev2_inR1outI2 KE work-order 2 for state #1 Aug 26 13:28:13.353255: | state #1 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:28:13.353259: | #1 STATE_PARENT_I1: retransmits: cleared Aug 26 13:28:13.353263: | libevent_free: release ptr-libevent@0x556a6a8844b8 Aug 26 13:28:13.353266: | free_event_entry: release EVENT_RETRANSMIT-pe@0x556a6a883bb8 Aug 26 13:28:13.353270: | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x556a6a883bb8 Aug 26 13:28:13.353275: | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 Aug 26 13:28:13.353278: | libevent_malloc: new ptr-libevent@0x7f6ff0002888 size 128 Aug 26 13:28:13.353294: | #1 spent 0.353 milliseconds in processing: Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH in ikev2_process_state_packet() Aug 26 13:28:13.353304: | [RE]START processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 13:28:13.353309: | #1 complete_v2_state_transition() PARENT_I1->PARENT_I2 with status STF_SUSPEND Aug 26 13:28:13.353312: | suspending state #1 and saving MD Aug 26 13:28:13.353315: | #1 is busy; has a suspended MD Aug 26 13:28:13.353320: | [RE]START processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in log_stf_suspend() at ikev2.c:3269) Aug 26 13:28:13.353325: | "road-east-ikev2" #1 complete v2 state STATE_PARENT_I1 transition with STF_SUSPEND suspended from complete_v2_state_transition:3451 Aug 26 13:28:13.353330: | crypto helper 4 resuming Aug 26 13:28:13.353331: | stop processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) Aug 26 13:28:13.353342: | crypto helper 4 starting work-order 2 for state #1 Aug 26 13:28:13.353348: | #1 spent 0.773 milliseconds in ikev2_process_packet() Aug 26 13:28:13.353352: | crypto helper 4 doing compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 Aug 26 13:28:13.353354: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) Aug 26 13:28:13.353358: | processing: STOP state #0 (in process_md() at demux.c:382) Aug 26 13:28:13.353361: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:28:13.353366: | spent 0.791 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:28:13.353888: | calculating skeyseed using prf=sha2_512 integ=none cipherkey-size=32 salt-size=4 Aug 26 13:28:13.354166: | crypto helper 4 finished compute dh (V2) (ikev2_inR1outI2 KE); request ID 2 time elapsed 0.000814 seconds Aug 26 13:28:13.354174: | (#1) spent 0.821 milliseconds in crypto helper computing work-order 2: ikev2_inR1outI2 KE (pcr) Aug 26 13:28:13.354176: | crypto helper 4 sending results from work-order 2 for state #1 to event queue Aug 26 13:28:13.354178: | scheduling resume sending helper answer for #1 Aug 26 13:28:13.354181: | libevent_malloc: new ptr-libevent@0x7f6fe8000f48 size 128 Aug 26 13:28:13.354187: | crypto helper 4 waiting (nothing to do) Aug 26 13:28:13.354194: | processing resume sending helper answer for #1 Aug 26 13:28:13.354203: | start processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in resume_handler() at server.c:797) Aug 26 13:28:13.354208: | crypto helper 4 replies to request ID 2 Aug 26 13:28:13.354211: | calling continuation function 0x556a6a068b50 Aug 26 13:28:13.354215: | ikev2_parent_inR1outI2_continue for #1: calculating g^{xy}, sending I2 Aug 26 13:28:13.354221: | creating state object #2 at 0x556a6a887168 Aug 26 13:28:13.354225: | State DB: adding IKEv2 state #2 in UNDEFINED Aug 26 13:28:13.354229: | pstats #2 ikev2.child started Aug 26 13:28:13.354233: | duplicating state object #1 "road-east-ikev2" as #2 for IPSEC SA Aug 26 13:28:13.354239: | #2 setting local endpoint to 192.1.3.209:500 from #1.st_localport (in duplicate_state() at state.c:1484) Aug 26 13:28:13.354247: | Message ID: init_child #1.#2; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=0->-1 Aug 26 13:28:13.354253: | Message ID: switch-from #1 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=0->-1 wip.responder=-1 Aug 26 13:28:13.354259: | Message ID: switch-to #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->0 wip.responder=-1 Aug 26 13:28:13.354262: | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted Aug 26 13:28:13.354266: | libevent_free: release ptr-libevent@0x7f6ff0002888 Aug 26 13:28:13.354270: | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x556a6a883bb8 Aug 26 13:28:13.354273: | event_schedule: new EVENT_SA_REPLACE-pe@0x556a6a883bb8 Aug 26 13:28:13.354278: | inserting event EVENT_SA_REPLACE, timeout in 60 seconds for #1 Aug 26 13:28:13.354281: | libevent_malloc: new ptr-libevent@0x7f6ff0002888 size 128 Aug 26 13:28:13.354286: | parent state #1: PARENT_I1(half-open IKE SA) => PARENT_I2(open IKE SA) Aug 26 13:28:13.354297: | **emit ISAKMP Message: Aug 26 13:28:13.354301: | initiator cookie: Aug 26 13:28:13.354304: | ef f9 c7 e3 1d 6e e1 4f Aug 26 13:28:13.354306: | responder cookie: Aug 26 13:28:13.354309: | 57 e2 fa 91 04 f4 bc 57 Aug 26 13:28:13.354312: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:28:13.354316: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:28:13.354319: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Aug 26 13:28:13.354322: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Aug 26 13:28:13.354325: | Message ID: 1 (0x1) Aug 26 13:28:13.354329: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:28:13.354333: | ***emit IKEv2 Encryption Payload: Aug 26 13:28:13.354336: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:13.354339: | flags: none (0x0) Aug 26 13:28:13.354344: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encryption Payload (46:ISAKMP_NEXT_v2SK) Aug 26 13:28:13.354348: | next payload chain: saving location 'IKEv2 Encryption Payload'.'next payload type' in 'reply packet' Aug 26 13:28:13.354352: | emitting 8 zero bytes of IV into IKEv2 Encryption Payload Aug 26 13:28:13.354361: | IKEv2 CERT: send a certificate? Aug 26 13:28:13.354364: | IKEv2 CERT: no certificate to send Aug 26 13:28:13.354367: | IDr payload will NOT be sent Aug 26 13:28:13.354382: | ****emit IKEv2 Identification - Initiator - Payload: Aug 26 13:28:13.354386: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:13.354389: | flags: none (0x0) Aug 26 13:28:13.354393: | ID type: ID_FQDN (0x2) Aug 26 13:28:13.354399: | next payload chain: setting previous 'IKEv2 Encryption Payload'.'next payload type' to current IKEv2 Identification - Initiator - Payload (35:ISAKMP_NEXT_v2IDi) Aug 26 13:28:13.354404: | next payload chain: saving location 'IKEv2 Identification - Initiator - Payload'.'next payload type' in 'reply packet' Aug 26 13:28:13.354408: | emitting 26 raw bytes of my identity into IKEv2 Identification - Initiator - Payload Aug 26 13:28:13.354412: | my identity 72 6f 61 64 2e 74 65 73 74 69 6e 67 2e 6c 69 62 Aug 26 13:28:13.354415: | my identity 72 65 73 77 61 6e 2e 6f 72 67 Aug 26 13:28:13.354418: | emitting length of IKEv2 Identification - Initiator - Payload: 34 Aug 26 13:28:13.354427: | not sending INITIAL_CONTACT Aug 26 13:28:13.354431: | ****emit IKEv2 Authentication Payload: Aug 26 13:28:13.354435: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:13.354437: | flags: none (0x0) Aug 26 13:28:13.354441: | auth method: IKEv2_AUTH_RSA (0x1) Aug 26 13:28:13.354445: | next payload chain: setting previous 'IKEv2 Identification - Initiator - Payload'.'next payload type' to current IKEv2 Authentication Payload (39:ISAKMP_NEXT_v2AUTH) Aug 26 13:28:13.354449: | next payload chain: saving location 'IKEv2 Authentication Payload'.'next payload type' in 'reply packet' Aug 26 13:28:13.354457: | started looking for secret for @road.testing.libreswan.org->192.1.2.23 of kind PKK_RSA Aug 26 13:28:13.354461: | actually looking for secret for @road.testing.libreswan.org->192.1.2.23 of kind PKK_RSA Aug 26 13:28:13.354466: | line 1: key type PKK_RSA(@road.testing.libreswan.org) to type PKK_RSA Aug 26 13:28:13.354471: | 1: compared key (none) to @road.testing.libreswan.org / 192.1.2.23 -> 002 Aug 26 13:28:13.354475: | 2: compared key (none) to @road.testing.libreswan.org / 192.1.2.23 -> 002 Aug 26 13:28:13.354478: | line 1: match=002 Aug 26 13:28:13.354482: | match 002 beats previous best_match 000 match=0x556a6a4dab58 (line=1) Aug 26 13:28:13.354486: | concluding with best_match=002 best=0x556a6a4dab58 (lineno=1) Aug 26 13:28:13.364173: | #1 spent 9.63 milliseconds in ikev2_calculate_rsa_hash() calling sign_hash_RSA() Aug 26 13:28:13.364196: | emitting 388 raw bytes of rsa signature into IKEv2 Authentication Payload Aug 26 13:28:13.364201: | rsa signature ac 09 71 13 ed 37 b6 e0 47 e4 2d c4 44 ac 2b 9a Aug 26 13:28:13.364204: | rsa signature 6e 41 23 5a 44 3f d4 6e 36 49 25 ca 43 0a 91 44 Aug 26 13:28:13.364208: | rsa signature 7b b6 bd 37 d8 3b 44 84 76 c6 5d df d0 6d 96 99 Aug 26 13:28:13.364211: | rsa signature 95 24 d7 cc a6 d6 62 a5 fa 33 ca 7f 1f cc 8d 6e Aug 26 13:28:13.364214: | rsa signature f3 24 92 3f 01 0b 21 ad 3b 84 8a eb 3e 75 d9 d2 Aug 26 13:28:13.364217: | rsa signature 85 94 df c3 e2 6c 3d 8d 49 82 95 37 d3 74 73 a2 Aug 26 13:28:13.364220: | rsa signature e7 93 21 c9 36 4d 0a 1b 65 08 20 a9 3e 5b 8c cc Aug 26 13:28:13.364223: | rsa signature bd 57 db 9a b1 e5 a0 54 8e 05 43 60 2c 66 e4 e5 Aug 26 13:28:13.364226: | rsa signature d7 b8 b9 c7 71 9a b5 33 48 2e ec 55 b4 be 92 c6 Aug 26 13:28:13.364229: | rsa signature a0 92 c5 6d cb 7b bb ee cd b9 b1 f1 9b 4b a2 c8 Aug 26 13:28:13.364231: | rsa signature 64 54 00 3c a8 1a 31 92 73 22 04 35 2c 0f f7 6b Aug 26 13:28:13.364234: | rsa signature 0a e7 f8 cf 88 8e 30 a9 56 37 e2 d7 ed 4c 23 a5 Aug 26 13:28:13.364237: | rsa signature c5 8b 8d 91 ad 6c 43 ef eb bd 9a 38 fb a0 62 62 Aug 26 13:28:13.364240: | rsa signature 7a a0 3a 90 ea e4 b4 5d 29 c2 45 a0 ae ce 67 12 Aug 26 13:28:13.364243: | rsa signature 62 da 05 40 78 c0 38 54 df 16 0c 61 5f 0b d9 89 Aug 26 13:28:13.364246: | rsa signature 07 ec 93 36 a6 76 4f 07 e1 10 2b 2c 5f 78 08 c6 Aug 26 13:28:13.364249: | rsa signature 1a 17 4d d9 91 35 92 dc 6b 94 81 31 c8 cb 4d fd Aug 26 13:28:13.364252: | rsa signature ac 38 0e c6 e0 fc 43 f9 fb ec d8 2f 6f b0 72 0d Aug 26 13:28:13.364255: | rsa signature bb 39 3b 5c d1 75 75 46 2d 90 44 a6 80 ed 67 12 Aug 26 13:28:13.364258: | rsa signature a2 77 d3 c1 68 72 1b 99 2e 1e 6a be 5f 6d e7 cc Aug 26 13:28:13.364265: | rsa signature 2d dc 42 da ff e5 93 36 e5 3e d2 9e b4 94 5a 4b Aug 26 13:28:13.364268: | rsa signature 2e 29 34 ef 1b ad 2e 2c 8a 6a fc 03 7a 80 85 b6 Aug 26 13:28:13.364271: | rsa signature 37 f0 70 39 13 a3 36 a6 02 da 12 22 4e 87 ee ed Aug 26 13:28:13.364274: | rsa signature ef 2d 1f 7c cf ad 25 89 61 4a 96 8c f0 6b 29 9d Aug 26 13:28:13.364277: | rsa signature 21 09 7d 46 Aug 26 13:28:13.364283: | #1 spent 9.79 milliseconds in ikev2_calculate_rsa_hash() Aug 26 13:28:13.364287: | emitting length of IKEv2 Authentication Payload: 396 Aug 26 13:28:13.364296: | getting first pending from state #1 Aug 26 13:28:13.364320: | netlink_get_spi: allocated 0xcb1ff682 for esp.0@192.1.3.209 Aug 26 13:28:13.364326: | constructing ESP/AH proposals with all DH removed for road-east-ikev2 (IKE SA initiator emitting ESP/AH proposals) Aug 26 13:28:13.364334: | converting proposal AES_GCM_16_256-NONE to ikev2 ... Aug 26 13:28:13.364342: | ... ikev2_proposal: 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED Aug 26 13:28:13.364346: | converting proposal AES_GCM_16_128-NONE to ikev2 ... Aug 26 13:28:13.364351: | ... ikev2_proposal: 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED Aug 26 13:28:13.364355: | converting proposal AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... Aug 26 13:28:13.364361: | ... ikev2_proposal: 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Aug 26 13:28:13.364365: | converting proposal AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 to ikev2 ... Aug 26 13:28:13.364370: | ... ikev2_proposal: 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Aug 26 13:28:13.364380: "road-east-ikev2": constructed local ESP/AH proposals for road-east-ikev2 (IKE SA initiator emitting ESP/AH proposals): 1:ESP:ENCR=AES_GCM_C_256;INTEG=NONE;DH=NONE;ESN=DISABLED 2:ESP:ENCR=AES_GCM_C_128;INTEG=NONE;DH=NONE;ESN=DISABLED 3:ESP:ENCR=AES_CBC_256;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED 4:ESP:ENCR=AES_CBC_128;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128;DH=NONE;ESN=DISABLED Aug 26 13:28:13.364393: | Emitting ikev2_proposals ... Aug 26 13:28:13.364398: | ****emit IKEv2 Security Association Payload: Aug 26 13:28:13.364402: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:13.364405: | flags: none (0x0) Aug 26 13:28:13.364410: | next payload chain: setting previous 'IKEv2 Authentication Payload'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) Aug 26 13:28:13.364414: | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' Aug 26 13:28:13.364418: | discarding INTEG=NONE Aug 26 13:28:13.364420: | discarding DH=NONE Aug 26 13:28:13.364424: | *****emit IKEv2 Proposal Substructure Payload: Aug 26 13:28:13.364427: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:13.364430: | prop #: 1 (0x1) Aug 26 13:28:13.364434: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Aug 26 13:28:13.364437: | spi size: 4 (0x4) Aug 26 13:28:13.364440: | # transforms: 2 (0x2) Aug 26 13:28:13.364443: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:28:13.364447: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Aug 26 13:28:13.364451: | our spi cb 1f f6 82 Aug 26 13:28:13.364454: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.364457: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.364461: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:13.364464: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 13:28:13.364468: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.364471: | *******emit IKEv2 Attribute Substructure Payload: Aug 26 13:28:13.364475: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:13.364480: | length/value: 256 (0x100) Aug 26 13:28:13.364484: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:28:13.364487: | discarding INTEG=NONE Aug 26 13:28:13.364490: | discarding DH=NONE Aug 26 13:28:13.364493: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.364496: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:13.364499: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Aug 26 13:28:13.364502: | IKEv2 transform ID: ESN_DISABLED (0x0) Aug 26 13:28:13.364506: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.364510: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.364513: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.364516: | emitting length of IKEv2 Proposal Substructure Payload: 32 Aug 26 13:28:13.364520: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:28:13.364523: | discarding INTEG=NONE Aug 26 13:28:13.364525: | discarding DH=NONE Aug 26 13:28:13.364528: | *****emit IKEv2 Proposal Substructure Payload: Aug 26 13:28:13.364531: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:13.364534: | prop #: 2 (0x2) Aug 26 13:28:13.364537: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Aug 26 13:28:13.364540: | spi size: 4 (0x4) Aug 26 13:28:13.364543: | # transforms: 2 (0x2) Aug 26 13:28:13.364547: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:13.364550: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:28:13.364554: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Aug 26 13:28:13.364557: | our spi cb 1f f6 82 Aug 26 13:28:13.364560: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.364563: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.364566: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:13.364569: | IKEv2 transform ID: AES_GCM_C (0x14) Aug 26 13:28:13.364573: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.364576: | *******emit IKEv2 Attribute Substructure Payload: Aug 26 13:28:13.364579: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:13.364582: | length/value: 128 (0x80) Aug 26 13:28:13.364586: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:28:13.364589: | discarding INTEG=NONE Aug 26 13:28:13.364591: | discarding DH=NONE Aug 26 13:28:13.364594: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.364597: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:13.364600: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Aug 26 13:28:13.364604: | IKEv2 transform ID: ESN_DISABLED (0x0) Aug 26 13:28:13.364607: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.364611: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.364614: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.364617: | emitting length of IKEv2 Proposal Substructure Payload: 32 Aug 26 13:28:13.364621: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:28:13.364624: | discarding DH=NONE Aug 26 13:28:13.364627: | *****emit IKEv2 Proposal Substructure Payload: Aug 26 13:28:13.364630: | last proposal: v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:13.364633: | prop #: 3 (0x3) Aug 26 13:28:13.364638: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Aug 26 13:28:13.364642: | spi size: 4 (0x4) Aug 26 13:28:13.364645: | # transforms: 4 (0x4) Aug 26 13:28:13.364648: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:13.364651: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:28:13.364655: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Aug 26 13:28:13.364658: | our spi cb 1f f6 82 Aug 26 13:28:13.364661: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.364664: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.364667: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:13.364670: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 13:28:13.364673: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.364677: | *******emit IKEv2 Attribute Substructure Payload: Aug 26 13:28:13.364680: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:13.364683: | length/value: 256 (0x100) Aug 26 13:28:13.364686: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:28:13.364689: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.364692: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.364695: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:28:13.364698: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 13:28:13.364702: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.364706: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.364709: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.364712: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.364715: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.364718: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:28:13.364721: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 13:28:13.364725: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.364728: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.364732: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.364735: | discarding DH=NONE Aug 26 13:28:13.364738: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.364741: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:13.364744: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Aug 26 13:28:13.364747: | IKEv2 transform ID: ESN_DISABLED (0x0) Aug 26 13:28:13.364751: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.364754: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.364757: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.364761: | emitting length of IKEv2 Proposal Substructure Payload: 48 Aug 26 13:28:13.364764: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:28:13.364767: | discarding DH=NONE Aug 26 13:28:13.364770: | *****emit IKEv2 Proposal Substructure Payload: Aug 26 13:28:13.364773: | last proposal: v2_PROPOSAL_LAST (0x0) Aug 26 13:28:13.364776: | prop #: 4 (0x4) Aug 26 13:28:13.364779: | proto ID: IKEv2_SEC_PROTO_ESP (0x3) Aug 26 13:28:13.364782: | spi size: 4 (0x4) Aug 26 13:28:13.364786: | # transforms: 4 (0x4) Aug 26 13:28:13.364790: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is v2_PROPOSAL_NON_LAST (0x2) Aug 26 13:28:13.364794: | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' Aug 26 13:28:13.364798: | emitting 4 raw bytes of our spi into IKEv2 Proposal Substructure Payload Aug 26 13:28:13.364800: | our spi cb 1f f6 82 Aug 26 13:28:13.364803: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.364807: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.364810: | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) Aug 26 13:28:13.364813: | IKEv2 transform ID: AES_CBC (0xc) Aug 26 13:28:13.364816: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.364820: | *******emit IKEv2 Attribute Substructure Payload: Aug 26 13:28:13.364823: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) Aug 26 13:28:13.364826: | length/value: 128 (0x80) Aug 26 13:28:13.364829: | emitting length of IKEv2 Transform Substructure Payload: 12 Aug 26 13:28:13.364832: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.364835: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.364839: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:28:13.364841: | IKEv2 transform ID: AUTH_HMAC_SHA2_512_256 (0xe) Aug 26 13:28:13.364845: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.364849: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.364852: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.364855: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.364858: | last transform: v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.364861: | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) Aug 26 13:28:13.364864: | IKEv2 transform ID: AUTH_HMAC_SHA2_256_128 (0xc) Aug 26 13:28:13.364868: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.364871: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.364874: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.364877: | discarding DH=NONE Aug 26 13:28:13.364880: | ******emit IKEv2 Transform Substructure Payload: Aug 26 13:28:13.364883: | last transform: v2_TRANSFORM_LAST (0x0) Aug 26 13:28:13.364885: | IKEv2 transform type: TRANS_TYPE_ESN (0x5) Aug 26 13:28:13.364888: | IKEv2 transform ID: ESN_DISABLED (0x0) Aug 26 13:28:13.364892: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) Aug 26 13:28:13.364896: | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' Aug 26 13:28:13.364899: | emitting length of IKEv2 Transform Substructure Payload: 8 Aug 26 13:28:13.364902: | emitting length of IKEv2 Proposal Substructure Payload: 48 Aug 26 13:28:13.364905: | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 Aug 26 13:28:13.364908: | emitting length of IKEv2 Security Association Payload: 164 Aug 26 13:28:13.364912: | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 Aug 26 13:28:13.364916: | ****emit IKEv2 Traffic Selector - Initiator - Payload: Aug 26 13:28:13.364919: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:13.364922: | flags: none (0x0) Aug 26 13:28:13.364927: | number of TS: 1 (0x1) Aug 26 13:28:13.364931: | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Traffic Selector - Initiator - Payload (44:ISAKMP_NEXT_v2TSi) Aug 26 13:28:13.364935: | next payload chain: saving location 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' in 'reply packet' Aug 26 13:28:13.364938: | *****emit IKEv2 Traffic Selector: Aug 26 13:28:13.364941: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Aug 26 13:28:13.364944: | IP Protocol ID: 0 (0x0) Aug 26 13:28:13.364947: | start port: 0 (0x0) Aug 26 13:28:13.364950: | end port: 65535 (0xffff) Aug 26 13:28:13.364954: | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector Aug 26 13:28:13.364957: | ipv4 start c0 01 03 d1 Aug 26 13:28:13.364961: | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector Aug 26 13:28:13.364964: | ipv4 end c0 01 03 d1 Aug 26 13:28:13.364967: | emitting length of IKEv2 Traffic Selector: 16 Aug 26 13:28:13.364970: | emitting length of IKEv2 Traffic Selector - Initiator - Payload: 24 Aug 26 13:28:13.364973: | ****emit IKEv2 Traffic Selector - Responder - Payload: Aug 26 13:28:13.364976: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:13.364979: | flags: none (0x0) Aug 26 13:28:13.364982: | number of TS: 1 (0x1) Aug 26 13:28:13.364985: | next payload chain: setting previous 'IKEv2 Traffic Selector - Initiator - Payload'.'next payload type' to current IKEv2 Traffic Selector - Responder - Payload (45:ISAKMP_NEXT_v2TSr) Aug 26 13:28:13.364988: | next payload chain: saving location 'IKEv2 Traffic Selector - Responder - Payload'.'next payload type' in 'reply packet' Aug 26 13:28:13.364991: | *****emit IKEv2 Traffic Selector: Aug 26 13:28:13.364994: | TS type: IKEv2_TS_IPV4_ADDR_RANGE (0x7) Aug 26 13:28:13.364997: | IP Protocol ID: 0 (0x0) Aug 26 13:28:13.364999: | start port: 0 (0x0) Aug 26 13:28:13.365002: | end port: 65535 (0xffff) Aug 26 13:28:13.365006: | emitting 4 raw bytes of ipv4 start into IKEv2 Traffic Selector Aug 26 13:28:13.365008: | ipv4 start c0 01 02 17 Aug 26 13:28:13.365012: | emitting 4 raw bytes of ipv4 end into IKEv2 Traffic Selector Aug 26 13:28:13.365015: | ipv4 end c0 01 02 17 Aug 26 13:28:13.365018: | emitting length of IKEv2 Traffic Selector: 16 Aug 26 13:28:13.365021: | emitting length of IKEv2 Traffic Selector - Responder - Payload: 24 Aug 26 13:28:13.365024: | Initiator child policy is tunnel mode, NOT sending v2N_USE_TRANSPORT_MODE Aug 26 13:28:13.365027: | Initiator child policy is compress=no, NOT sending v2N_IPCOMP_SUPPORTED Aug 26 13:28:13.365031: | adding 1 bytes of padding (including 1 byte padding-length) Aug 26 13:28:13.365035: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encryption Payload Aug 26 13:28:13.365039: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encryption Payload Aug 26 13:28:13.365042: | emitting length of IKEv2 Encryption Payload: 671 Aug 26 13:28:13.365045: | emitting length of ISAKMP Message: 699 Aug 26 13:28:13.365051: | **parse ISAKMP Message: Aug 26 13:28:13.365054: | initiator cookie: Aug 26 13:28:13.365057: | ef f9 c7 e3 1d 6e e1 4f Aug 26 13:28:13.365060: | responder cookie: Aug 26 13:28:13.365063: | 57 e2 fa 91 04 f4 bc 57 Aug 26 13:28:13.365066: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Aug 26 13:28:13.365070: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:28:13.365073: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Aug 26 13:28:13.365076: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Aug 26 13:28:13.365079: | Message ID: 1 (0x1) Aug 26 13:28:13.365082: | length: 699 (0x2bb) Aug 26 13:28:13.365086: | **parse IKEv2 Encryption Payload: Aug 26 13:28:13.365089: | next payload type: ISAKMP_NEXT_v2IDi (0x23) Aug 26 13:28:13.365092: | flags: none (0x0) Aug 26 13:28:13.365094: | length: 671 (0x29f) Aug 26 13:28:13.365098: | **emit ISAKMP Message: Aug 26 13:28:13.365101: | initiator cookie: Aug 26 13:28:13.365105: | ef f9 c7 e3 1d 6e e1 4f Aug 26 13:28:13.365108: | responder cookie: Aug 26 13:28:13.365111: | 57 e2 fa 91 04 f4 bc 57 Aug 26 13:28:13.365114: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:28:13.365117: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:28:13.365120: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Aug 26 13:28:13.365123: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Aug 26 13:28:13.365126: | Message ID: 1 (0x1) Aug 26 13:28:13.365129: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:28:13.365133: | ***emit IKEv2 Encrypted Fragment: Aug 26 13:28:13.365136: | next payload type: ISAKMP_NEXT_v2IDi (0x23) Aug 26 13:28:13.365139: | flags: none (0x0) Aug 26 13:28:13.365142: | fragment number: 1 (0x1) Aug 26 13:28:13.365145: | total fragments: 2 (0x2) Aug 26 13:28:13.365149: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 35:ISAKMP_NEXT_v2IDi Aug 26 13:28:13.365153: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Aug 26 13:28:13.365156: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Aug 26 13:28:13.365160: | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment Aug 26 13:28:13.365170: | emitting 478 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Aug 26 13:28:13.365174: | cleartext fragment 27 00 00 22 02 00 00 00 72 6f 61 64 2e 74 65 73 Aug 26 13:28:13.365177: | cleartext fragment 74 69 6e 67 2e 6c 69 62 72 65 73 77 61 6e 2e 6f Aug 26 13:28:13.365180: | cleartext fragment 72 67 21 00 01 8c 01 00 00 00 ac 09 71 13 ed 37 Aug 26 13:28:13.365183: | cleartext fragment b6 e0 47 e4 2d c4 44 ac 2b 9a 6e 41 23 5a 44 3f Aug 26 13:28:13.365186: | cleartext fragment d4 6e 36 49 25 ca 43 0a 91 44 7b b6 bd 37 d8 3b Aug 26 13:28:13.365189: | cleartext fragment 44 84 76 c6 5d df d0 6d 96 99 95 24 d7 cc a6 d6 Aug 26 13:28:13.365192: | cleartext fragment 62 a5 fa 33 ca 7f 1f cc 8d 6e f3 24 92 3f 01 0b Aug 26 13:28:13.365195: | cleartext fragment 21 ad 3b 84 8a eb 3e 75 d9 d2 85 94 df c3 e2 6c Aug 26 13:28:13.365198: | cleartext fragment 3d 8d 49 82 95 37 d3 74 73 a2 e7 93 21 c9 36 4d Aug 26 13:28:13.365201: | cleartext fragment 0a 1b 65 08 20 a9 3e 5b 8c cc bd 57 db 9a b1 e5 Aug 26 13:28:13.365204: | cleartext fragment a0 54 8e 05 43 60 2c 66 e4 e5 d7 b8 b9 c7 71 9a Aug 26 13:28:13.365207: | cleartext fragment b5 33 48 2e ec 55 b4 be 92 c6 a0 92 c5 6d cb 7b Aug 26 13:28:13.365210: | cleartext fragment bb ee cd b9 b1 f1 9b 4b a2 c8 64 54 00 3c a8 1a Aug 26 13:28:13.365213: | cleartext fragment 31 92 73 22 04 35 2c 0f f7 6b 0a e7 f8 cf 88 8e Aug 26 13:28:13.365216: | cleartext fragment 30 a9 56 37 e2 d7 ed 4c 23 a5 c5 8b 8d 91 ad 6c Aug 26 13:28:13.365219: | cleartext fragment 43 ef eb bd 9a 38 fb a0 62 62 7a a0 3a 90 ea e4 Aug 26 13:28:13.365222: | cleartext fragment b4 5d 29 c2 45 a0 ae ce 67 12 62 da 05 40 78 c0 Aug 26 13:28:13.365225: | cleartext fragment 38 54 df 16 0c 61 5f 0b d9 89 07 ec 93 36 a6 76 Aug 26 13:28:13.365228: | cleartext fragment 4f 07 e1 10 2b 2c 5f 78 08 c6 1a 17 4d d9 91 35 Aug 26 13:28:13.365231: | cleartext fragment 92 dc 6b 94 81 31 c8 cb 4d fd ac 38 0e c6 e0 fc Aug 26 13:28:13.365234: | cleartext fragment 43 f9 fb ec d8 2f 6f b0 72 0d bb 39 3b 5c d1 75 Aug 26 13:28:13.365236: | cleartext fragment 75 46 2d 90 44 a6 80 ed 67 12 a2 77 d3 c1 68 72 Aug 26 13:28:13.365240: | cleartext fragment 1b 99 2e 1e 6a be 5f 6d e7 cc 2d dc 42 da ff e5 Aug 26 13:28:13.365243: | cleartext fragment 93 36 e5 3e d2 9e b4 94 5a 4b 2e 29 34 ef 1b ad Aug 26 13:28:13.365245: | cleartext fragment 2e 2c 8a 6a fc 03 7a 80 85 b6 37 f0 70 39 13 a3 Aug 26 13:28:13.365248: | cleartext fragment 36 a6 02 da 12 22 4e 87 ee ed ef 2d 1f 7c cf ad Aug 26 13:28:13.365251: | cleartext fragment 25 89 61 4a 96 8c f0 6b 29 9d 21 09 7d 46 2c 00 Aug 26 13:28:13.365256: | cleartext fragment 00 a4 02 00 00 20 01 03 04 02 cb 1f f6 82 03 00 Aug 26 13:28:13.365259: | cleartext fragment 00 0c 01 00 00 14 80 0e 01 00 00 00 00 08 05 00 Aug 26 13:28:13.365262: | cleartext fragment 00 00 02 00 00 20 02 03 04 02 cb 1f f6 82 Aug 26 13:28:13.365265: | adding 1 bytes of padding (including 1 byte padding-length) Aug 26 13:28:13.365269: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Aug 26 13:28:13.365273: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Aug 26 13:28:13.365275: | emitting length of IKEv2 Encrypted Fragment: 511 Aug 26 13:28:13.365279: | emitting length of ISAKMP Message: 539 Aug 26 13:28:13.365300: | **emit ISAKMP Message: Aug 26 13:28:13.365304: | initiator cookie: Aug 26 13:28:13.365307: | ef f9 c7 e3 1d 6e e1 4f Aug 26 13:28:13.365310: | responder cookie: Aug 26 13:28:13.365313: | 57 e2 fa 91 04 f4 bc 57 Aug 26 13:28:13.365318: | next payload type: ISAKMP_NEXT_NONE (0x0) Aug 26 13:28:13.365322: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:28:13.365325: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Aug 26 13:28:13.365328: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) Aug 26 13:28:13.365331: | Message ID: 1 (0x1) Aug 26 13:28:13.365334: | next payload chain: saving message location 'ISAKMP Message'.'next payload type' Aug 26 13:28:13.365337: | ***emit IKEv2 Encrypted Fragment: Aug 26 13:28:13.365341: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:13.365344: | flags: none (0x0) Aug 26 13:28:13.365347: | fragment number: 2 (0x2) Aug 26 13:28:13.365350: | total fragments: 2 (0x2) Aug 26 13:28:13.365353: | next payload chain: using supplied v2SKF 'IKEv2 Encrypted Fragment'.'next payload type' value 0:ISAKMP_NEXT_v2NONE Aug 26 13:28:13.365357: | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Encrypted Fragment (53:ISAKMP_NEXT_v2SKF) Aug 26 13:28:13.365360: | next payload chain: saving location 'IKEv2 Encrypted Fragment'.'next payload type' in 'reply frag packet' Aug 26 13:28:13.365364: | emitting 8 zero bytes of IV into IKEv2 Encrypted Fragment Aug 26 13:28:13.365368: | emitting 164 raw bytes of cleartext fragment into IKEv2 Encrypted Fragment Aug 26 13:28:13.365372: | cleartext fragment 03 00 00 0c 01 00 00 14 80 0e 00 80 00 00 00 08 Aug 26 13:28:13.365375: | cleartext fragment 05 00 00 00 02 00 00 30 03 03 04 04 cb 1f f6 82 Aug 26 13:28:13.365378: | cleartext fragment 03 00 00 0c 01 00 00 0c 80 0e 01 00 03 00 00 08 Aug 26 13:28:13.365381: | cleartext fragment 03 00 00 0e 03 00 00 08 03 00 00 0c 00 00 00 08 Aug 26 13:28:13.365384: | cleartext fragment 05 00 00 00 00 00 00 30 04 03 04 04 cb 1f f6 82 Aug 26 13:28:13.365387: | cleartext fragment 03 00 00 0c 01 00 00 0c 80 0e 00 80 03 00 00 08 Aug 26 13:28:13.365390: | cleartext fragment 03 00 00 0e 03 00 00 08 03 00 00 0c 00 00 00 08 Aug 26 13:28:13.365393: | cleartext fragment 05 00 00 00 2d 00 00 18 01 00 00 00 07 00 00 10 Aug 26 13:28:13.365396: | cleartext fragment 00 00 ff ff c0 01 03 d1 c0 01 03 d1 00 00 00 18 Aug 26 13:28:13.365399: | cleartext fragment 01 00 00 00 07 00 00 10 00 00 ff ff c0 01 02 17 Aug 26 13:28:13.365402: | cleartext fragment c0 01 02 17 Aug 26 13:28:13.365405: | adding 1 bytes of padding (including 1 byte padding-length) Aug 26 13:28:13.365409: | emitting 1 0x00 repeated bytes of padding and length into IKEv2 Encrypted Fragment Aug 26 13:28:13.365412: | emitting 16 zero bytes of length of truncated HMAC/KEY into IKEv2 Encrypted Fragment Aug 26 13:28:13.365415: | emitting length of IKEv2 Encrypted Fragment: 197 Aug 26 13:28:13.365418: | emitting length of ISAKMP Message: 225 Aug 26 13:28:13.365431: | suspend processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 13:28:13.365437: | start processing: state #2 connection "road-east-ikev2" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 13:28:13.365445: | #2 complete_v2_state_transition() md.from_state=PARENT_I1 md.svm.state[from]=PARENT_I1 UNDEFINED->PARENT_I2 with status STF_OK Aug 26 13:28:13.365449: | IKEv2: transition from state STATE_PARENT_I1 to state STATE_PARENT_I2 Aug 26 13:28:13.365454: | child state #2: UNDEFINED(ignore) => PARENT_I2(open IKE SA) Aug 26 13:28:13.365458: | Message ID: updating counters for #2 to 0 after switching state Aug 26 13:28:13.365464: | Message ID: recv #1.#2 response 0; ike: initiator.sent=0 initiator.recv=-1->0 responder.sent=-1 responder.recv=-1; child: wip.initiator=0->-1 wip.responder=-1 Aug 26 13:28:13.365471: | Message ID: sent #1.#2 request 1; ike: initiator.sent=0->1 initiator.recv=0 responder.sent=-1 responder.recv=-1; child: wip.initiator=-1->1 wip.responder=-1 Aug 26 13:28:13.365477: "road-east-ikev2" #2: STATE_PARENT_I2: sent v2I2, expected v2R2 {auth=IKEv2 cipher=AES_GCM_16_256 integ=n/a prf=HMAC_SHA2_512 group=MODP2048} Aug 26 13:28:13.365489: | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) Aug 26 13:28:13.365493: | sending fragments ... Aug 26 13:28:13.365501: | sending 539 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) Aug 26 13:28:13.365504: | ef f9 c7 e3 1d 6e e1 4f 57 e2 fa 91 04 f4 bc 57 Aug 26 13:28:13.365506: | 35 20 23 08 00 00 00 01 00 00 02 1b 23 00 01 ff Aug 26 13:28:13.365509: | 00 01 00 02 87 bd c6 a6 1e ff 5e 70 2b cb 82 8b Aug 26 13:28:13.365512: | 80 d8 21 7d 1e 6a 6e 33 a7 4f 35 be 8b 96 27 d8 Aug 26 13:28:13.365515: | af 09 6c 27 f8 b7 f3 9c 3b 72 f6 4c 22 38 f5 80 Aug 26 13:28:13.365518: | 35 d8 36 19 44 dc f2 22 cf 14 5f a1 bb 0e 00 ae Aug 26 13:28:13.365521: | bd 7d 73 8c 6c ab 39 09 28 d9 d1 e5 e7 97 58 80 Aug 26 13:28:13.365524: | 79 8f 82 f4 e1 6e 20 c6 b0 64 1a b6 c8 28 39 77 Aug 26 13:28:13.365527: | 84 3e 6c 69 c0 ba 71 e1 78 34 ad f2 ea d2 7d 88 Aug 26 13:28:13.365530: | 1f f8 d3 91 c9 89 7c fc 55 bb bc eb 94 45 7a ba Aug 26 13:28:13.365533: | 9b 1e 9e 30 6c b7 07 2f dd ce fa 9e a9 4f e8 92 Aug 26 13:28:13.365535: | b6 d6 69 93 f6 35 f9 b2 c9 f2 fd 9c 12 5c f1 0d Aug 26 13:28:13.365538: | 1f 1c 64 df 88 4b ac ff 33 a6 be 34 c7 9c 04 e4 Aug 26 13:28:13.365541: | 00 6c b3 64 25 c5 85 a6 fe 69 92 60 f5 d1 9f bc Aug 26 13:28:13.365544: | d4 e2 87 01 8a c3 20 ad 3a 80 27 4c db 18 0a 6e Aug 26 13:28:13.365547: | 61 60 e5 eb a9 52 35 10 81 ac ce aa bf 6b eb b4 Aug 26 13:28:13.365550: | 31 f6 a6 fb bf 9f 3d 67 65 a0 c0 61 56 fd c0 b1 Aug 26 13:28:13.365553: | 5e 15 c0 72 67 6f 92 44 3a ea 36 ba df b7 9b 85 Aug 26 13:28:13.365556: | 44 cf ca ba dd 9b bc 4d fb 40 59 d0 f9 41 a0 b1 Aug 26 13:28:13.365559: | 90 fa 4d 03 f0 90 cb 00 d9 fd f2 27 f4 0d 8e a9 Aug 26 13:28:13.365561: | 06 46 3a 0c 37 40 13 27 fc 3c 63 2d 38 88 c2 b2 Aug 26 13:28:13.365564: | 4c ee b9 94 ff 13 dd 64 c3 40 ff ba 2f dd d7 8b Aug 26 13:28:13.365567: | 80 4c 22 bc 26 ea e8 2a 4f 91 b8 27 f1 2e 3d 44 Aug 26 13:28:13.365570: | 74 12 88 bf ee 8a 4e d7 1d 62 28 03 f9 69 45 cb Aug 26 13:28:13.365573: | 04 b3 0c 9f 7c 9e 8f f6 bb 34 ef ac d3 fb 90 12 Aug 26 13:28:13.365576: | 83 87 db 90 e5 e2 9c dc 45 1f 73 04 e2 5b 3f a8 Aug 26 13:28:13.365579: | 61 9f fd 59 ce aa a3 fc 6b 65 95 25 86 4d a6 5e Aug 26 13:28:13.365582: | 11 43 70 37 af 56 d7 19 7c d5 2f 50 11 c4 a4 ac Aug 26 13:28:13.365584: | 60 99 89 f5 d5 e8 5f 2e 0a 0d fd 55 0f 92 86 bb Aug 26 13:28:13.365587: | 23 6a 92 1b b6 7c c4 11 b4 65 a1 9b 28 65 dd 78 Aug 26 13:28:13.365590: | 72 ea 2b 62 80 39 d3 f0 14 41 99 2a 16 0a 20 a2 Aug 26 13:28:13.365593: | 85 71 dc 79 f6 99 8c c1 2c 93 5f a9 6c d3 2e e7 Aug 26 13:28:13.365596: | 19 4e 58 b7 1a c8 2d 1a 27 5a 1a f8 4a 38 c6 75 Aug 26 13:28:13.365599: | 17 e0 85 db 3c bd e8 9a 85 b2 bf Aug 26 13:28:13.365660: | sending 225 bytes for STATE_PARENT_I1 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #1) Aug 26 13:28:13.365664: | ef f9 c7 e3 1d 6e e1 4f 57 e2 fa 91 04 f4 bc 57 Aug 26 13:28:13.365670: | 35 20 23 08 00 00 00 01 00 00 00 e1 00 00 00 c5 Aug 26 13:28:13.365673: | 00 02 00 02 5c 18 5f 75 63 19 53 f5 9f a1 79 98 Aug 26 13:28:13.365676: | 21 ef 76 6d 97 0c d1 e9 9f c0 39 92 fb 40 6f 24 Aug 26 13:28:13.365679: | e4 2c 26 87 85 3b 57 e0 9a cb 34 2c 94 f9 2a eb Aug 26 13:28:13.365681: | b6 d2 b7 99 cb 66 c0 2c 83 3e 84 df ef 85 7c 71 Aug 26 13:28:13.365684: | 8c d2 60 b0 5c 4a 29 17 f2 68 06 7b 83 48 e2 42 Aug 26 13:28:13.365687: | 69 de eb 1a 0d a9 42 e1 42 d7 23 27 0b 9e a1 5a Aug 26 13:28:13.365690: | 1f b4 c5 bc 25 ba 93 4c f8 75 30 5e 4d b0 7d 04 Aug 26 13:28:13.365693: | 3e 8b 44 cd 27 4c a0 28 70 88 14 1a e7 07 ce a6 Aug 26 13:28:13.365696: | ad 8e 5d 62 2c 03 4e e5 55 b7 f0 50 ea 6b 9a 68 Aug 26 13:28:13.365699: | 6b f4 41 fa 69 a2 cf 8d 5a 48 1e 90 f0 b7 80 b9 Aug 26 13:28:13.365702: | 79 33 2d e4 88 0d 3d ec 27 14 1c 39 9b 7f e2 bd Aug 26 13:28:13.365704: | 21 15 98 90 cf 80 1f a8 d8 72 c9 a9 06 d6 36 9c Aug 26 13:28:13.365707: | 11 Aug 26 13:28:13.365724: | sent 2 fragments Aug 26 13:28:13.365729: | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=2000ms Aug 26 13:28:13.365733: "road-east-ikev2" #2: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds Aug 26 13:28:13.365744: | event_schedule: new EVENT_RETRANSMIT-pe@0x7f6ff0002b78 Aug 26 13:28:13.365749: | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #2 Aug 26 13:28:13.365753: | libevent_malloc: new ptr-libevent@0x556a6a8838b8 size 128 Aug 26 13:28:13.365761: | #2 STATE_PARENT_I2: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11379.108208 Aug 26 13:28:13.365766: | resume sending helper answer for #1 suppresed complete_v2_state_transition() Aug 26 13:28:13.365773: | #1 spent 1.44 milliseconds Aug 26 13:28:13.365778: | #1 spent 11.5 milliseconds in resume sending helper answer Aug 26 13:28:13.365784: | stop processing: state #2 connection "road-east-ikev2" from 192.1.2.23 (in resume_handler() at server.c:833) Aug 26 13:28:13.365789: | libevent_free: release ptr-libevent@0x7f6fe8000f48 Aug 26 13:28:13.370213: | spent 0.00291 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() Aug 26 13:28:13.370232: | *received 65 bytes from 192.1.2.23:500 on eth0 (192.1.3.209:500) Aug 26 13:28:13.370235: | ef f9 c7 e3 1d 6e e1 4f 57 e2 fa 91 04 f4 bc 57 Aug 26 13:28:13.370237: | 2e 20 23 20 00 00 00 01 00 00 00 41 29 00 00 25 Aug 26 13:28:13.370238: | ea 4b d4 1b 12 5e 96 29 33 69 e3 a2 10 de 88 ca Aug 26 13:28:13.370240: | 0a 72 57 97 5d 1b 81 a9 7a 02 44 c4 f6 b1 98 ff Aug 26 13:28:13.370241: | a4 Aug 26 13:28:13.370244: | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) Aug 26 13:28:13.370247: | **parse ISAKMP Message: Aug 26 13:28:13.370249: | initiator cookie: Aug 26 13:28:13.370250: | ef f9 c7 e3 1d 6e e1 4f Aug 26 13:28:13.370252: | responder cookie: Aug 26 13:28:13.370253: | 57 e2 fa 91 04 f4 bc 57 Aug 26 13:28:13.370255: | next payload type: ISAKMP_NEXT_v2SK (0x2e) Aug 26 13:28:13.370257: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) Aug 26 13:28:13.370259: | exchange type: ISAKMP_v2_IKE_AUTH (0x23) Aug 26 13:28:13.370261: | flags: ISAKMP_FLAG_v2_MSG_RESPONSE (0x20) Aug 26 13:28:13.370262: | Message ID: 1 (0x1) Aug 26 13:28:13.370264: | length: 65 (0x41) Aug 26 13:28:13.370266: | processing version=2.0 packet with exchange type=ISAKMP_v2_IKE_AUTH (35) Aug 26 13:28:13.370268: | I am the IKE SA Original Initiator receiving an IKEv2 IKE_AUTH response Aug 26 13:28:13.370271: | State DB: found IKEv2 state #1 in PARENT_I2 (find_v2_ike_sa) Aug 26 13:28:13.370276: | start processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2016) Aug 26 13:28:13.370278: | State DB: found IKEv2 state #2 in PARENT_I2 (find_v2_sa_by_initiator_wip) Aug 26 13:28:13.370281: | suspend processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) Aug 26 13:28:13.370286: | start processing: state #2 connection "road-east-ikev2" from 192.1.2.23 (in ike_process_packet() at ikev2.c:2062) Aug 26 13:28:13.370292: | #2 is idle Aug 26 13:28:13.370295: | #2 idle Aug 26 13:28:13.370297: | unpacking clear payload Aug 26 13:28:13.370298: | Now let's proceed with payload (ISAKMP_NEXT_v2SK) Aug 26 13:28:13.370300: | ***parse IKEv2 Encryption Payload: Aug 26 13:28:13.370302: | next payload type: ISAKMP_NEXT_v2N (0x29) Aug 26 13:28:13.370304: | flags: none (0x0) Aug 26 13:28:13.370306: | length: 37 (0x25) Aug 26 13:28:13.370307: | processing payload: ISAKMP_NEXT_v2SK (len=33) Aug 26 13:28:13.370309: | #2 in state PARENT_I2: sent v2I2, expected v2R2 Aug 26 13:28:13.370322: | #2 ikev2 ISAKMP_v2_IKE_AUTH decrypt success Aug 26 13:28:13.370324: | Now let's proceed with payload (ISAKMP_NEXT_v2N) Aug 26 13:28:13.370326: | **parse IKEv2 Notify Payload: Aug 26 13:28:13.370327: | next payload type: ISAKMP_NEXT_v2NONE (0x0) Aug 26 13:28:13.370329: | flags: none (0x0) Aug 26 13:28:13.370331: | length: 8 (0x8) Aug 26 13:28:13.370332: | Protocol ID: PROTO_v2_RESERVED (0x0) Aug 26 13:28:13.370334: | SPI size: 0 (0x0) Aug 26 13:28:13.370336: | Notify Message Type: v2N_AUTHENTICATION_FAILED (0x18) Aug 26 13:28:13.370337: | processing payload: ISAKMP_NEXT_v2N (len=0) Aug 26 13:28:13.370339: | selected state microcode Initiator: process AUTHENTICATION_FAILED AUTH notification Aug 26 13:28:13.370341: | Now let's proceed with state specific processing Aug 26 13:28:13.370343: | calling processor Initiator: process AUTHENTICATION_FAILED AUTH notification Aug 26 13:28:13.370346: "road-east-ikev2" #2: IKE SA authentication request rejected by peer: AUTHENTICATION_FAILED Aug 26 13:28:13.370354: | pstats #1 ikev2.ike failed auth-failed Aug 26 13:28:13.370357: "road-east-ikev2" #2: scheduling retry attempt 1 of an unlimited number, but releasing whack Aug 26 13:28:13.370362: | release_pending_whacks: state #2 fd@23 .st_dev=9 .st_ino=8890022 Aug 26 13:28:13.370365: | close_any(fd@23) (in release_whack() at state.c:654) Aug 26 13:28:13.370370: | close_any(fd@22) (in release_whack() at state.c:654) Aug 26 13:28:13.370373: | release_pending_whacks: IKE SA #1 fd@-1 has pending CHILD SA with socket fd@23 Aug 26 13:28:13.370379: | libevent_free: release ptr-libevent@0x556a6a8838b8 Aug 26 13:28:13.370385: | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f6ff0002b78 Aug 26 13:28:13.370388: | event_schedule: new EVENT_RETRANSMIT-pe@0x7f6ff0002b78 Aug 26 13:28:13.370392: | inserting event EVENT_RETRANSMIT, timeout in 59.995366 seconds for #2 Aug 26 13:28:13.370396: | libevent_malloc: new ptr-libevent@0x7f6fe8000f48 size 128 Aug 26 13:28:13.370400: "road-east-ikev2" #2: STATE_PARENT_I2: suppressing retransmits; will wait 59.995366 seconds for retry Aug 26 13:28:13.370405: | #2 spent 0.0584 milliseconds in processing: Initiator: process AUTHENTICATION_FAILED AUTH notification in ikev2_process_state_packet() Aug 26 13:28:13.370411: | [RE]START processing: state #2 connection "road-east-ikev2" from 192.1.2.23 (in complete_v2_state_transition() at ikev2.c:3379) Aug 26 13:28:13.370414: | #2 complete_v2_state_transition() PARENT_I2->PARENT_I2 with status STF_IGNORE Aug 26 13:28:13.370419: | stop processing: state #2 connection "road-east-ikev2" from 192.1.2.23 (in ikev2_process_packet() at ikev2.c:2018) Aug 26 13:28:13.370423: | #1 spent 0.196 milliseconds in ikev2_process_packet() Aug 26 13:28:13.370428: | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) Aug 26 13:28:13.370432: | processing: STOP state #0 (in process_md() at demux.c:382) Aug 26 13:28:13.370435: | processing: STOP connection NULL (in process_md() at demux.c:383) Aug 26 13:28:13.370439: | spent 0.211 milliseconds in comm_handle_cb() reading and processing packet Aug 26 13:28:16.645423: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:16.645450: | FOR_EACH_STATE_... in show_traffic_status (sort_states) Aug 26 13:28:16.645455: | FOR_EACH_STATE_... in sort_states Aug 26 13:28:16.645462: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:16.645469: | spent 0.0569 milliseconds in whack Aug 26 13:28:17.837740: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:17.837778: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:17.837784: | spent 0.162 milliseconds in whack Aug 26 13:28:17.893232: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:17.893656: | FOR_EACH_STATE_... in show_traffic_status (sort_states) Aug 26 13:28:17.893668: | FOR_EACH_STATE_... in sort_states Aug 26 13:28:17.893679: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:17.893700: | spent 0.452 milliseconds in whack Aug 26 13:28:18.004865: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:18.005187: | FOR_EACH_CONNECTION_... in show_connections_status Aug 26 13:28:18.005193: | FOR_EACH_CONNECTION_... in show_connections_status Aug 26 13:28:18.005236: | FOR_EACH_STATE_... in show_states_status (sort_states) Aug 26 13:28:18.005239: | FOR_EACH_STATE_... in sort_states Aug 26 13:28:18.005257: | close_any(fd@16) (in whack_process() at rcv_whack.c:700) Aug 26 13:28:18.005265: | spent 0.409 milliseconds in whack Aug 26 13:28:18.902458: | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) Aug 26 13:28:18.902477: shutting down Aug 26 13:28:18.902486: | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825) Aug 26 13:28:18.902490: | certs and keys locked by 'free_preshared_secrets' Aug 26 13:28:18.902493: forgetting secrets Aug 26 13:28:18.902499: | certs and keys unlocked by 'free_preshared_secrets' Aug 26 13:28:18.902502: | unreference key: 0x556a6a4dac48 @road.testing.libreswan.org cnt 1-- Aug 26 13:28:18.902506: | start processing: connection "road-east-ikev2" (in delete_connection() at connections.c:189) Aug 26 13:28:18.902511: | close_any(fd@23) Errno 9: Bad file descriptor (in delete_pending() at pending.c:244) Aug 26 13:28:18.902512: | removing pending policy for no connection {0x556a6a4daa58} Aug 26 13:28:18.902514: | Deleting states for connection - including all other IPsec SA's of this IKE SA Aug 26 13:28:18.902516: | pass 0 Aug 26 13:28:18.902518: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 13:28:18.902520: | state #2 Aug 26 13:28:18.902522: | suspend processing: connection "road-east-ikev2" (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:28:18.902526: | start processing: state #2 connection "road-east-ikev2" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:28:18.902528: | pstats #2 ikev2.child deleted other Aug 26 13:28:18.902532: | #2 spent 0.0584 milliseconds in total Aug 26 13:28:18.902535: | [RE]START processing: state #2 connection "road-east-ikev2" from 192.1.2.23 (in delete_state() at state.c:879) Aug 26 13:28:18.902538: "road-east-ikev2" #2: deleting state (STATE_PARENT_I2) aged 5.548s and NOT sending notification Aug 26 13:28:18.902541: | child state #2: PARENT_I2(open IKE SA) => delete Aug 26 13:28:18.902543: | child state #2: PARENT_I2(open IKE SA) => CHILDSA_DEL(informational) Aug 26 13:28:18.902546: | state #2 requesting EVENT_RETRANSMIT to be deleted Aug 26 13:28:18.902548: | #2 STATE_CHILDSA_DEL: retransmits: cleared Aug 26 13:28:18.902551: | libevent_free: release ptr-libevent@0x7f6fe8000f48 Aug 26 13:28:18.902553: | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f6ff0002b78 Aug 26 13:28:18.902556: | priority calculation of connection "road-east-ikev2" is 0xfdfdf Aug 26 13:28:18.902562: | delete inbound eroute 192.1.2.23/32:0 --0-> 192.1.3.209/32:0 => unk255.10000@192.1.3.209 (raw_eroute) Aug 26 13:28:18.902578: | raw_eroute result=success Aug 26 13:28:18.902583: | stop processing: connection "road-east-ikev2" (BACKGROUND) (in update_state_connection() at connections.c:4076) Aug 26 13:28:18.902585: | start processing: connection NULL (in update_state_connection() at connections.c:4077) Aug 26 13:28:18.902587: | in connection_discard for connection road-east-ikev2 Aug 26 13:28:18.902589: | State DB: deleting IKEv2 state #2 in CHILDSA_DEL Aug 26 13:28:18.902591: | child state #2: CHILDSA_DEL(informational) => UNDEFINED(ignore) Aug 26 13:28:18.902594: | stop processing: state #2 from 192.1.2.23 (in delete_state() at state.c:1143) Aug 26 13:28:18.902598: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:28:18.902600: | state #1 Aug 26 13:28:18.902603: | start processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) Aug 26 13:28:18.902605: | pstats #1 ikev2.ike deleted auth-failed Aug 26 13:28:18.902607: | #1 spent 19.1 milliseconds in total Aug 26 13:28:18.902610: | [RE]START processing: state #1 connection "road-east-ikev2" from 192.1.2.23 (in delete_state() at state.c:879) Aug 26 13:28:18.902612: "road-east-ikev2" #1: deleting state (STATE_PARENT_I2) aged 5.558s and NOT sending notification Aug 26 13:28:18.902614: | parent state #1: PARENT_I2(open IKE SA) => delete Aug 26 13:28:18.902616: | state #1 requesting EVENT_SA_REPLACE to be deleted Aug 26 13:28:18.902618: | libevent_free: release ptr-libevent@0x7f6ff0002888 Aug 26 13:28:18.902620: | free_event_entry: release EVENT_SA_REPLACE-pe@0x556a6a883bb8 Aug 26 13:28:18.902622: | State DB: IKEv2 state not found (flush_incomplete_children) Aug 26 13:28:18.902624: | picked newest_isakmp_sa #0 for #1 Aug 26 13:28:18.902626: "road-east-ikev2" #1: deleting IKE SA for connection 'road-east-ikev2' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS Aug 26 13:28:18.902628: | add revival: connection 'road-east-ikev2' added to the list and scheduled for 0 seconds Aug 26 13:28:18.902630: | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds Aug 26 13:28:18.902633: | in connection_discard for connection road-east-ikev2 Aug 26 13:28:18.902635: | State DB: deleting IKEv2 state #1 in PARENT_I2 Aug 26 13:28:18.902637: | parent state #1: PARENT_I2(open IKE SA) => UNDEFINED(ignore) Aug 26 13:28:18.902653: | stop processing: state #1 from 192.1.2.23 (in delete_state() at state.c:1143) Aug 26 13:28:18.902665: | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) Aug 26 13:28:18.902667: | pass 1 Aug 26 13:28:18.902669: | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete Aug 26 13:28:18.902672: | free hp@0x556a6a5cf458 Aug 26 13:28:18.902674: | flush revival: connection 'road-east-ikev2' revival flushed Aug 26 13:28:18.902676: | processing: STOP connection NULL (in discard_connection() at connections.c:249) Aug 26 13:28:18.902682: | crl fetch request list locked by 'free_crl_fetch' Aug 26 13:28:18.902684: | crl fetch request list unlocked by 'free_crl_fetch' Aug 26 13:28:18.902690: shutting down interface lo/lo 127.0.0.1:4500 Aug 26 13:28:18.902692: shutting down interface lo/lo 127.0.0.1:500 Aug 26 13:28:18.902694: shutting down interface eth0/eth0 192.1.3.209:4500 Aug 26 13:28:18.902696: shutting down interface eth0/eth0 192.1.3.209:500 Aug 26 13:28:18.902699: | FOR_EACH_STATE_... in delete_states_dead_interfaces Aug 26 13:28:18.902704: | libevent_free: release ptr-libevent@0x556a6a5c0f68 Aug 26 13:28:18.902706: | free_event_entry: release EVENT_NULL-pe@0x556a6a5ccb48 Aug 26 13:28:18.902714: | libevent_free: release ptr-libevent@0x556a6a582608 Aug 26 13:28:18.902716: | free_event_entry: release EVENT_NULL-pe@0x556a6a5ccbf8 Aug 26 13:28:18.902721: | libevent_free: release ptr-libevent@0x556a6a584358 Aug 26 13:28:18.902722: | free_event_entry: release EVENT_NULL-pe@0x556a6a5ccca8 Aug 26 13:28:18.902727: | libevent_free: release ptr-libevent@0x556a6a5aefd8 Aug 26 13:28:18.902729: | free_event_entry: release EVENT_NULL-pe@0x556a6a5ccd58 Aug 26 13:28:18.902734: | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations Aug 26 13:28:18.903087: | libevent_free: release ptr-libevent@0x556a6a5c1018 Aug 26 13:28:18.903092: | free_event_entry: release EVENT_NULL-pe@0x556a6a5b51b8 Aug 26 13:28:18.903096: | libevent_free: release ptr-libevent@0x556a6a582558 Aug 26 13:28:18.903098: | free_event_entry: release EVENT_NULL-pe@0x556a6a5b4d18 Aug 26 13:28:18.903101: | libevent_free: release ptr-libevent@0x556a6a5ad7b8 Aug 26 13:28:18.903102: | free_event_entry: release EVENT_NULL-pe@0x556a6a5af338 Aug 26 13:28:18.903104: | global timer EVENT_REINIT_SECRET uninitialized Aug 26 13:28:18.903106: | global timer EVENT_SHUNT_SCAN uninitialized Aug 26 13:28:18.903108: | global timer EVENT_PENDING_DDNS uninitialized Aug 26 13:28:18.903109: | global timer EVENT_PENDING_PHASE2 uninitialized Aug 26 13:28:18.903111: | global timer EVENT_CHECK_CRLS uninitialized Aug 26 13:28:18.903113: | global timer EVENT_REVIVE_CONNS uninitialized Aug 26 13:28:18.903114: | global timer EVENT_FREE_ROOT_CERTS uninitialized Aug 26 13:28:18.903116: | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized Aug 26 13:28:18.903117: | global timer EVENT_NAT_T_KEEPALIVE uninitialized Aug 26 13:28:18.903122: | libevent_free: release ptr-libevent@0x556a6a508198 Aug 26 13:28:18.903123: | signal event handler PLUTO_SIGCHLD uninstalled Aug 26 13:28:18.903126: | libevent_free: release ptr-libevent@0x556a6a50bdd8 Aug 26 13:28:18.903127: | signal event handler PLUTO_SIGTERM uninstalled Aug 26 13:28:18.903129: | libevent_free: release ptr-libevent@0x556a6a5cc508 Aug 26 13:28:18.903131: | signal event handler PLUTO_SIGHUP uninstalled Aug 26 13:28:18.903133: | libevent_free: release ptr-libevent@0x556a6a5cc748 Aug 26 13:28:18.903135: | signal event handler PLUTO_SIGSYS uninstalled Aug 26 13:28:18.903136: | releasing event base Aug 26 13:28:18.903146: | libevent_free: release ptr-libevent@0x556a6a5cc618 Aug 26 13:28:18.903148: | libevent_free: release ptr-libevent@0x556a6a5af598 Aug 26 13:28:18.903150: | libevent_free: release ptr-libevent@0x556a6a5aee68 Aug 26 13:28:18.903152: | libevent_free: release ptr-libevent@0x556a6a57e9c8 Aug 26 13:28:18.903154: | libevent_free: release ptr-libevent@0x556a6a5af748 Aug 26 13:28:18.903156: | libevent_free: release ptr-libevent@0x556a6a5cc2a8 Aug 26 13:28:18.903158: | libevent_free: release ptr-libevent@0x556a6a5cc448 Aug 26 13:28:18.903159: | libevent_free: release ptr-libevent@0x556a6a5af788 Aug 26 13:28:18.903161: | libevent_free: release ptr-libevent@0x556a6a5b49a8 Aug 26 13:28:18.903162: | libevent_free: release ptr-libevent@0x556a6a5b52c8 Aug 26 13:28:18.903164: | libevent_free: release ptr-libevent@0x556a6a883e58 Aug 26 13:28:18.903166: | libevent_free: release ptr-libevent@0x556a6a5ccdc8 Aug 26 13:28:18.903167: | libevent_free: release ptr-libevent@0x556a6a5ccd18 Aug 26 13:28:18.903169: | libevent_free: release ptr-libevent@0x556a6a5ccc68 Aug 26 13:28:18.903170: | libevent_free: release ptr-libevent@0x556a6a5ccbb8 Aug 26 13:28:18.903172: | libevent_free: release ptr-libevent@0x556a6a881e18 Aug 26 13:28:18.903173: | libevent_free: release ptr-libevent@0x556a6a881ef8 Aug 26 13:28:18.903175: | libevent_free: release ptr-libevent@0x556a6a50a868 Aug 26 13:28:18.903177: | libevent_free: release ptr-libevent@0x556a6a5cc4c8 Aug 26 13:28:18.903178: | libevent_free: release ptr-libevent@0x556a6a5cc488 Aug 26 13:28:18.903180: | libevent_free: release ptr-libevent@0x556a6a5cc348 Aug 26 13:28:18.903181: | libevent_free: release ptr-libevent@0x556a6a5cc5d8 Aug 26 13:28:18.903183: | libevent_free: release ptr-libevent@0x556a6a5073d8 Aug 26 13:28:18.903185: | libevent_free: release ptr-libevent@0x556a6a57e1c8 Aug 26 13:28:18.903187: | libevent_free: release ptr-libevent@0x556a6a57e148 Aug 26 13:28:18.903188: | libevent_free: release ptr-libevent@0x556a6a507748 Aug 26 13:28:18.903190: | releasing global libevent data Aug 26 13:28:18.903192: | libevent_free: release ptr-libevent@0x556a6a57e348 Aug 26 13:28:18.903194: | libevent_free: release ptr-libevent@0x556a6a57e2c8 Aug 26 13:28:18.903197: | libevent_free: release ptr-libevent@0x556a6a57e248 Aug 26 13:28:18.903323: leak detective found no leaks